Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2020-10768 (GCVE-0-2020-10768)
Vulnerability from cvelistv5
Published
2020-09-15 23:13
Modified
2024-08-04 11:14
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being 'force disabled' when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.
References
► | URL | Tags | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Linux Kernel | kernel |
Version: before 5.8-rc1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:14:15.299Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4d8df8cbb9156b0a0ab3f802b80cb5db57acc0bf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10768" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "kernel", "vendor": "Linux Kernel", "versions": [ { "status": "affected", "version": "before 5.8-rc1" } ] } ], "descriptions": [ { "lang": "en", "value": "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-440", "description": "CWE-440", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-09-15T23:13:30", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4d8df8cbb9156b0a0ab3f802b80cb5db57acc0bf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10768" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2020-10768", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "kernel", "version": { "version_data": [ { "version_value": "before 5.8-rc1" } ] } } ] }, "vendor_name": "Linux Kernel" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality." } ] }, "impact": { "cvss": [ [ { "vectorString": "5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-440" } ] } ] }, "references": { "reference_data": [ { "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4d8df8cbb9156b0a0ab3f802b80cb5db57acc0bf", "refsource": "MISC", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4d8df8cbb9156b0a0ab3f802b80cb5db57acc0bf" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10768", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10768" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2020-10768", "datePublished": "2020-09-15T23:13:30", "dateReserved": "2020-03-20T00:00:00", "dateUpdated": "2024-08-04T11:14:15.299Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2020-10768\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2020-09-16T00:15:11.943\",\"lastModified\":\"2024-11-21T04:56:01.830\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.\"},{\"lang\":\"es\",\"value\":\"Se encontr\u00f3 un fallo en el kernel de Linux versiones anteriores a 5.8-rc1 en la funci\u00f3n prctl(), donde puede ser usado para habilitar la especulaci\u00f3n de rama indirecta despu\u00e9s de haber sido deshabilitada.\u0026#xa0;Esta llamada reporta incorrectamente que est\u00e1 \\\"force disabled\\\" cuando no lo est\u00e1 y abre el sistema a ataques de Spectre v2.\u0026#xa0;La mayor amenaza de esta vulnerabilidad es la confidencialidad\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":2.1,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-440\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.8.0\",\"matchCriteriaId\":\"4B3B9FFD-856C-4B58-ADD4-EE58BA12ECB4\"}]}]}],\"references\":[{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10768\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4d8df8cbb9156b0a0ab3f802b80cb5db57acc0bf\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10768\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4d8df8cbb9156b0a0ab3f802b80cb5db57acc0bf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}" } }
opensuse-su-2020:1153-1
Vulnerability from csaf_opensuse
Published
2020-08-06 10:21
Modified
2020-08-06 10:21
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The openSUSE Leap 15.1 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2019-16746: An issue was discovered in net/wireless/nl80211.c where it did not check the length of variable elements in a beacon head, leading to a buffer overflow (bnc#1152107 1173659).
- CVE-2019-20810: go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c did not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586 (bnc#1172458).
- CVE-2019-20908: An issue was discovered in drivers/firmware/efi/efi.c where Incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032 (bnc#1173567).
- CVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).
- CVE-2020-10135: Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key (bnc#1171988).
- CVE-2020-10766: Fixed rogue cross-process SSBD shutdown. Linux scheduler logical bug allowed an attacker to turn off the SSBD protection. (bnc#1172781).
- CVE-2020-10767: Fixed indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available. (bnc#1172782).
- CVE-2020-10768: Fixed indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command. (bnc#1172783).
- CVE-2020-10769: A buffer over-read flaw was found in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm's module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash. This flaw allowed a local attacker with user privileges to cause a denial of service (bnc#1173265).
- CVE-2020-10773: Fixed a kernel stack information leak on s390/s390x. (bnc#1172999).
- CVE-2020-10781: A zram sysfs resource consumption was fixed. (bnc#1173074).
- CVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails (bnc#1171732).
- CVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).
- CVE-2020-13974: drivers/tty/vt/keyboard.c had an integer overflow if k_ascii was called several times in a row, aka CID-b86dab054059. (bnc#1172775).
- CVE-2020-14331: Fixed a buffer over write in vgacon_scroll (bnc#1174205).
- CVE-2020-14331: Fixed an out of bounds write to the vgacon scrollback buffer (bsc#1174205).
- CVE-2020-14416: A race condition in tty->disc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).
- CVE-2020-15393: usbtest_disconnect in drivers/usb/misc/usbtest.c has a memory leak, aka CID-28ebeb8db770 (bnc#1173514).
- CVE-2020-15780: An issue was discovered in drivers/acpi/acpi_configfs.c where injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30 (bnc#1173573).
- CVE-2020-16166: The Linux kernel allowed remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c (bnc#1174757).
The following non-security bugs were fixed:
- ACPI: GED: add support for _Exx / _Lxx handler methods (bsc#1111666).
- ACPI: GED: use correct trigger type field in _Exx / _Lxx handling (bsc#1111666).
- ACPI: NFIT: Fix unlock on error in scrub_show() (bsc#1171753).
- ACPI: PM: Avoid using power resources if there are none for D0 (bsc#1051510).
- ACPI: sysfs: Fix pm_profile_attr type (bsc#1111666).
- ACPI: video: Use native backlight on Acer Aspire 5783z (bsc#1111666).
- ACPI: video: Use native backlight on Acer TravelMate 5735Z (bsc#1111666).
- ALSA: es1688: Add the missed snd_card_free() (bsc#1051510).
- ALSA: hda: Add ElkhartLake HDMI codec vid (bsc#1111666).
- ALSA: hda: add sienna_cichlid audio asic id for sienna_cichlid up (bsc#1111666).
- ALSA: hda: fix NULL pointer dereference during suspend (git-fixes).
- ALSA: hda/hdmi - enable runtime pm for newer AMD display audio (bsc#1111666).
- ALSA: hda - let hs_mic be picked ahead of hp_mic (bsc#1111666).
- ALSA: hda/realtek - add a pintbl quirk for several Lenovo machines (bsc#1111666).
- ALSA: hda/realtek - Add LED class support for micmute LED (bsc#1111666).
- ALSA: hda/realtek: Add mute LED and micmute LED support for HP systems (bsc#1111666).
- ALSA: hda/realtek - Add quirk for Lenovo Carbon X1 8th gen (bsc#1111666).
- ALSA: hda/realtek - Add quirk for MSI GE63 laptop (bsc#1111666).
- ALSA: hda/realtek - Add quirk for MSI GL63 (bsc#1111666).
- ALSA: hda/realtek - change to suitable link model for ASUS platform (bsc#1111666).
- ALSA: hda/realtek - Check headset type by unplug and resume (bsc#1111666).
- ALSA: hda/realtek - Enable audio jacks of Acer vCopperbox with ALC269VC (bsc#1111666).
- ALSA: hda/realtek: Enable headset mic of Acer C20-820 with ALC269VC (bsc#1111666).
- ALSA: hda/realtek: Enable headset mic of Acer TravelMate B311R-31 with ALC256 (bsc#1111666).
- ALSA: hda/realtek: Enable headset mic of Acer Veriton N4660G with ALC269VC (bsc#1111666).
- ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G14(G401) series with ALC289 (bsc#1111666).
- ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G15(GA502) series with ALC289 (bsc#1111666).
- ALSA: hda/realtek - Enable micmute LED on and HP system (bsc#1111666).
- ALSA: hda/realtek - Enable Speaker for ASUS UX533 and UX534 (bsc#1111666).
- ALSA: hda/realtek - Enable Speaker for ASUS UX563 (bsc#1111666).
- ALSA: hda/realtek: Fix add a 'ultra_low_power' function for intel reference board (alc256) (bsc#1111666).
- ALSA: hda/realtek: Fixed ALC298 sound bug by adding quirk for Samsung Notebook Pen S (bsc#1111666).
- ALSA: hda/realtek - Fixed HP right speaker no sound (bsc#1111666).
- ALSA: hda/realtek - Fix Lenovo Thinkpad X1 Carbon 7th quirk subdevice id (bsc#1111666).
- ALSA: hda/realtek - Fix unused variable warning w/o CONFIG_LEDS_TRIGGER_AUDIO (bsc#1111666).
- ALSA: hda/realtek - Introduce polarity for micmute LED GPIO (bsc#1111666).
- ALSA: hda/realtek: typo_fix: enable headset mic of ASUS ROG Zephyrus G14(GA401) series with ALC289 (bsc#1111666).
- ALSA: hda: Workaround for spurious wakeups on some Intel platforms (git-fixes).
- ALSA: lx6464es - add support for LX6464ESe pci express variant (bsc#1111666).
- ALSA: opl3: fix infoleak in opl3 (bsc#1111666).
- ALSA: pcm: disallow linking stream to itself (bsc#1111666).
- ALSA: usb-audio: Add duplex sound support for USB devices using implicit feedback (bsc#1111666).
- ALSA: usb-audio: Add Pioneer DJ DJM-900NXS2 support (bsc#1111666).
- ALSA: usb-audio: add quirk for MacroSilicon MS2109 (bsc#1111666).
- ALSA: usb-audio: Add vendor, product and profile name for HP Thunderbolt Dock (bsc#1111666).
- ALSA: usb-audio: Clean up quirk entries with macros (bsc#1111666).
- ALSA: usb-audio: Fix inconsistent card PM state after resume (bsc#1111666).
- ALSA: usb-audio: Fix packet size calculation (bsc#1111666).
- ALSA: usb-audio: Fix racy list management in output queue (bsc#1111666).
- ALSA: usb-audio: Improve frames size computation (bsc#1111666).
- ALSA: usb-audio: Manage auto-pm of all bundled interfaces (bsc#1111666).
- ALSA: usb-audio: Use the new macro for HP Dock rename quirks (bsc#1111666).
- amdgpu: a NULL ->mm does not mean a thread is a kthread (git-fixes).
- arm64: map FDT as RW for early_init_dt_scan() (jsc#SLE-12423).
- ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb (bsc#1111666).
- ath9k: Fix use-after-free Read in ath9k_wmi_ctrl_rx (bsc#1111666).
- ath9k: Fix use-after-free Write in ath9k_htc_rx_msg (bsc#1111666).
- ath9x: Fix stack-out-of-bounds Write in ath9k_hif_usb_rx_cb (bsc#1111666).
- ax25: fix setsockopt(SO_BINDTODEVICE) (networking-stable-20_05_27).
- b43: Fix connection problem with WPA3 (bsc#1111666).
- b43_legacy: Fix connection problem with WPA3 (bsc#1111666).
- bcache: Fix an error code in bch_dump_read() (git fixes (block drivers)).
- be2net: fix link failure after ethtool offline test (git-fixes).
- block: Fix use-after-free in blkdev_get() (bsc#1174843).
- block: nr_sects_write(): Disable preemption on seqcount write (bsc#1173818).
- block: remove QUEUE_FLAG_STACKABLE (git fixes (block drivers)).
- block: sed-opal: fix sparse warning: convert __be64 data (git fixes (block drivers)).
- Bluetooth: Add SCO fallback for invalid LMP parameters error (bsc#1111666).
- bnxt_en: Fix AER reset logic on 57500 chips (git-fixes).
- bnxt_en: Fix ethtool selftest crash under error conditions (git-fixes).
- bnxt_en: Fix handling FRAG_ERR when NVM_INSTALL_UPDATE cmd fails (git-fixes).
- bnxt_en: Fix ipv6 RFS filter matching logic (git-fixes).
- bnxt_en: fix NULL dereference in case SR-IOV configuration fails (git-fixes).
- bnxt_en: Fix VF anti-spoof filter setup (networking-stable-20_05_12).
- bnxt_en: Fix VLAN acceleration handling in bnxt_fix_features() (networking-stable-20_05_12).
- bnxt_en: Improve AER slot reset (networking-stable-20_05_12).
- brcmfmac: fix wrong location to get firmware feature (bsc#1111666).
- brcmfmac: Transform compatible string for FW loading (bsc#1169771).
- btrfs: add assertions for tree == inode->io_tree to extent IO helpers (bsc#1174438).
- btrfs: add new helper btrfs_lock_and_flush_ordered_range (bsc#1174438).
- btrfs: Always use a cached extent_state in btrfs_lock_and_flush_ordered_range (bsc#1174438).
- btrfs: change timing for qgroup reserved space for ordered extents to fix reserved space leak (bsc#1172247).
- btrfs: do not zero f_bavail if we have available space (bsc#1168081).
- btrfs: drop argument tree from btrfs_lock_and_flush_ordered_range (bsc#1174438).
- btrfs: file: reserve qgroup space after the hole punch range is locked (bsc#1172247).
- btrfs: fix extent_state leak in btrfs_lock_and_flush_ordered_range (bsc#1174438).
- btrfs: fix failure of RWF_NOWAIT write into prealloc extent beyond eof (bsc#1174438).
- btrfs: fix hang on snapshot creation after RWF_NOWAIT write (bsc#1174438).
- btrfs: fix RWF_NOWAIT write not failling when we need to cow (bsc#1174438).
- btrfs: fix RWF_NOWAIT writes blocking on extent locks and waiting for IO (bsc#1174438).
- btrfs: inode: move qgroup reserved space release to the callers of insert_reserved_file_extent() (bsc#1172247).
- btrfs: inode: refactor the parameters of insert_reserved_file_extent() (bsc#1172247).
- btrfs: make btrfs_ordered_extent naming consistent with btrfs_file_extent_item (bsc#1172247).
- btrfs: qgroup: allow to unreserve range without releasing other ranges (bsc#1120163).
- btrfs: qgroup: Fix a bug that prevents qgroup to be re-enabled after disable (bsc#1172247).
- btrfs: qgroup: fix data leak caused by race between writeback and truncate (bsc#1172247).
- btrfs: qgroup: remove ASYNC_COMMIT mechanism in favor of reserve retry-after-EDQUOT (bsc#1120163).
- btrfs: qgroup: try to flush qgroup space when we get -EDQUOT (bsc#1120163).
- btrfs: Return EAGAIN if we can't start no snpashot write in check_can_nocow (bsc#1174438).
- btrfs: use correct count in btrfs_file_write_iter() (bsc#1174438).
- btrfs: Use newly introduced btrfs_lock_and_flush_ordered_range (bsc#1174438).
- btrfs: volumes: Remove ENOSPC-prone btrfs_can_relocate() (bsc#1171124).
- bus: hisi_lpc: Add .remove method to avoid driver unbind crash (bsc#1174658).
- bus: hisi_lpc: Do not fail probe for unrecognised child devices (bsc#1174658).
- bus: hisi_lpc: Unregister logical PIO range to avoid potential use-after-free (bsc#1174658).
- bus: sunxi-rsb: Return correct data when mixing 16-bit and 8-bit reads (bsc#1111666).
- carl9170: remove P2P_GO support (bsc#1111666).
- cdc-acm: Add DISABLE_ECHO quirk for Microchip/SMSC chip (git-fixes).
- CDC-ACM: heed quirk also in error handling (git-fixes).
- ceph: convert mdsc->cap_dirty to a per-session list (bsc#1167104).
- ceph: request expedited service on session's last cap flush (bsc#1167104).
- cgroup, blkcg: Prepare some symbols for module and !CONFIG_CGROUP usages (bsc#1173857).
- char/random: Add a newline at the end of the file (jsc#SLE-12423).
- cifs: get rid of unused parameter in reconn_setup_dfs_targets() (bsc#1144333).
- cifs: handle hostnames that resolve to same ip in failover (bsc#1144333 bsc#1161016).
- cifs: set up next DFS target before generic_ip_connect() (bsc#1144333 bsc#1161016).
- clk: bcm2835: Fix return type of bcm2835_register_gate (bsc#1051510).
- clk: clk-flexgen: fix clock-critical handling (bsc#1051510).
- clk: sunxi: Fix incorrect usage of round_down() (bsc#1051510).
- clocksource: dw_apb_timer: Make CPU-affiliation being optional (bsc#1111666).
- compat_ioctl: block: handle BLKREPORTZONE/BLKRESETZONE (git fixes (block drivers)).
- compat_ioctl: block: handle Persistent Reservations (git fixes (block drivers)).
- config: arm64: enable CONFIG_IOMMU_DEFAULT_PASSTHROUGH References: bsc#1174549
- copy_{to,from}_user(): consolidate object size checks (git fixes).
- crypto: algboss - do not wait during notifier callback (bsc#1111666).
- crypto: algif_skcipher - Cap recv SG list at ctx->used (bsc#1111666).
- crypto: caam - update xts sector size for large input length (bsc#1111666).
- crypto: cavium/nitrox - Fix 'nitrox_get_first_device()' when ndevlist is fully iterated (bsc#1111666).
- crypto: cavium/nitrox - Fix 'nitrox_get_first_device()' when ndevlist is fully iterated (git-fixes).
- crypto/chcr: fix for ccm(aes) failed test (bsc#1111666).
- crypto: chelsio/chtls: properly set tp->lsndtime (bsc#1111666).
- crypto: rockchip - fix scatterlist nents error (git-fixes).
- crypto: stm32/crc32 - fix ext4 chksum BUG_ON() (git-fixes).
- crypto: talitos - check AES key size (git-fixes).
- crypto: talitos - fix ablkcipher for CONFIG_VMAP_STACK (git-fixes).
- crypto: talitos - fix IPsec cipher in length (git-fixes).
- crypto: talitos - reorder code in talitos_edesc_alloc() (git-fixes).
- crypto: virtio: Fix src/dst scatterlist calculation in __virtio_crypto_skcipher_do_req() (git-fixes).
- debugfs: Check module state before warning in {full/open}_proxy_open() (bsc#1173746).
- devinet: fix memleak in inetdev_init() (networking-stable-20_06_07).
- /dev/mem: Add missing memory barriers for devmem_inode (git-fixes).
- /dev/mem: Revoke mappings when a driver claims the region (git-fixes).
- dlm: remove BUG() before panic() (bsc#1174844).
- dmaengine: tegra210-adma: Fix an error handling path in 'tegra_adma_probe()' (bsc#1111666).
- dm btree: increase rebalance threshold in __rebalance2() (git fixes (block drivers)).
- dm cache: fix a crash due to incorrect work item cancelling (git fixes (block drivers)).
- dm crypt: fix benbi IV constructor crash if used in authenticated mode (git fixes (block drivers)).
- dm: fix potential for q->make_request_fn NULL pointer (git fixes (block drivers)).
- dm space map common: fix to ensure new block isn't already in use (git fixes (block drivers)).
- dm: various cleanups to md->queue initialization code (git fixes).
- dm verity fec: fix hash block number in verity_fec_decode (git fixes (block drivers)).
- dm verity fec: fix memory leak in verity_fec_dtr (git fixes (block drivers)).
- dpaa_eth: fix usage as DSA master, try 3 (networking-stable-20_05_27).
- driver-core, libnvdimm: Let device subsystems add local lockdep coverage (bsc#1171753)
- Drivers: hv: Change flag to write log level in panic msg to false (bsc#1170617, bsc#1170618).
- drivers: soc: ti: knav_qmss_queue: Make knav_gp_range_ops static (bsc#1051510).
- drm: amd/display: fix Kconfig help text (bsc#1113956) * only fix DEBUG_KERNEL_DC
- drm: bridge: adv7511: Extend list of audio sample rates (bsc#1111666).
- drm/dp_mst: Increase ACT retry timeout to 3s (bsc#1113956) * context changes
- drm: encoder_slave: fix refcouting error for modules (bsc#1111666).
- drm: encoder_slave: fix refcouting error for modules (bsc#1114279)
- drm/i915/icl+: Fix hotplug interrupt disabling after storm detection (bsc#1112178)
- drm/i915: Whitelist context-local timestamp in the gen9 cmdparser (bsc#1111666).
- drm/mediatek: Check plane visibility in atomic_update (bsc#1113956) * context changes
- drm/msm/dpu: fix error return code in dpu_encoder_init (bsc#1111666).
- drm: panel-orientation-quirks: Add quirk for Asus T101HA panel (bsc#1111666).
- drm: panel-orientation-quirks: Use generic orientation-data for Acer S1003 (bsc#1111666).
- drm/qxl: Use correct notify port address when creating cursor ring (bsc#1113956)
- drm/radeon: fix double free (bsc#1113956)
- drm/radeon: fix fb_div check in ni_init_smc_spll_table() (bsc#1113956)
- drm/sun4i: hdmi ddc clk: Fix size of m divider (bsc#1111666).
- drm/tegra: hub: Do not enable orphaned window group (bsc#1111666).
- drm/vkms: Hold gem object while still in-use (bsc#1113956) * context changes
- e1000: Distribute switch variables for initialization (bsc#1111666).
- e1000e: Disable TSO for buffer overrun workaround (bsc#1051510).
- e1000e: Do not wake up the system via WOL if device wakeup is disabled (bsc#1051510).
- e1000e: Relax condition to trigger reset for ME workaround (bsc#1111666).
- EDAC/amd64: Read back the scrub rate PCI register on F15h (bsc#1114279).
- efi/memreserve: deal with memreserve entries in unmapped memory (bsc#1174685).
- efi/random: Increase size of firmware supplied randomness (jsc#SLE-12423).
- efi/random: Treat EFI_RNG_PROTOCOL output as bootloader randomness (jsc#SLE-12423).
- efi: READ_ONCE rng seed size before munmap (jsc#SLE-12423).
- efi: Reorder pr_notice() with add_device_randomness() call (jsc#SLE-12423).
- evm: Check also if *tfm is an error pointer in init_desc() (bsc#1051510).
- evm: Fix a small race in init_desc() (bsc#1051510).
- ext4: fix a data race at inode->i_blocks (bsc#1171835).
- ext4: fix EXT_MAX_EXTENT/INDEX to check for zeroed eh_max (bsc#1174840).
- ext4: fix partial cluster initialization when splitting extent (bsc#1173839).
- ext4: fix race between ext4_sync_parent() and rename() (bsc#1173838).
- ext4, jbd2: ensure panic by fix a race between jbd2 abort and ext4 error handlers (bsc#1173833).
- extcon: adc-jack: Fix an error handling path in 'adc_jack_probe()' (bsc#1051510).
- fanotify: fix ignore mask logic for events on child and on dir (bsc#1172719).
- fat: do not allow to mount if the FAT length == 0 (bsc#1174845).
- fdt: add support for rng-seed (jsc#SLE-12423).
- fdt: Update CRC check for rng-seed (jsc#SLE-12423).
- firmware: imx: scu: Fix corruption of header (git-fixes).
- firmware: imx: scu: Fix possible memory leak in imx_scu_probe() (bsc#1111666).
- fix multiplication overflow in copy_fdtable() (bsc#1173825).
- Fix Patch-mainline tag in the previous zram fix patch
- fpga: dfl: fix bug in port reset handshake (git-fixes).
- fq_codel: fix TCA_FQ_CODEL_DROP_BATCH_SIZE sanity checks (networking-stable-20_05_12).
- gpiolib: Document that GPIO line names are not globally unique (bsc#1051510).
- gpu: host1x: Detach driver on unregister (bsc#1111666).
- gpu: ipu-v3: pre: do not trigger update if buffer address does not change (bsc#1111666).
- HID: hiddev: fix mess in hiddev_open() (git-fixes).
- HID: magicmouse: do not set up autorepeat (git-fixes).
- HID: sony: Fix for broken buttons on DS3 USB dongles (bsc#1051510).
- HISI LPC: Re-Add ACPI child enumeration support (bsc#1174658).
- HISI LPC: Stop using MFD APIs (bsc#1174658).
- hv_netvsc: Fix netvsc_start_xmit's return type (git-fixes).
- hwmon: (acpi_power_meter) Fix potential memory leak in acpi_power_meter_add() (bsc#1111666).
- hwmon: (emc2103) fix unable to change fan pwm1_enable attribute (bsc#1111666).
- hwmon: (max6697) Make sure the OVERT mask is set correctly (bsc#1111666).
- i2c: algo-pca: Add 0x78 as SCL stuck low status for PCA9665 (bsc#1111666).
- i2c: eg20t: Load module automatically if ID matches (bsc#1111666).
- i2c: mlxcpld: check correct size of maximum RECV_LEN packet (bsc#1111666).
- i40e: reduce stack usage in i40e_set_fc (git-fixes).
- IB/hfi1: Do not destroy hfi1_wq when the device is shut down (bsc#1174409).
- IB/hfi1: Do not destroy link_wq when the device is shut down (bsc#1174409).
- ibmveth: Fix max MTU limit (bsc#1173428 ltc#186397).
- ibmvnic: continue to init in CRQ reset returns H_CLOSED (bsc#1173280 ltc#185369).
- ibmvnic: Flush existing work items before device removal (bsc#1065729).
- ibmvnic: Harden device login requests (bsc#1170011 ltc#183538).
- iio: buffer: Do not allow buffers without any channels enabled to be activated (bsc#1051510).
- iio:health:afe4404 Fix timestamp alignment and prevent data leak (bsc#1111666).
- iio:humidity:hdc100x Fix alignment and data leak issues (bsc#1111666).
- iio:magnetometer:ak8974: Fix alignment and data leak issues (bsc#1111666).
- iio: mma8452: Add missed iio_device_unregister() call in mma8452_probe() (bsc#1111666).
- iio: pressure: bmp280: Tolerate IRQ before registering (bsc#1051510).
- iio:pressure:ms5611 Fix buffer element alignment (bsc#1111666).
- iio: pressure: zpa2326: handle pm_runtime_get_sync failure (bsc#1111666).
- ima: Directly assign the ima_default_policy pointer to ima_rules (bsc#1051510).
- ima: Fix ima digest hash table key calculation (bsc#1051510).
- include/asm-generic/topology.h: guard cpumask_of_node() macro argument (bsc#1148868).
- input: i8042 - add Lenovo XiaoXin Air 12 to i8042 nomux list (bsc#1111666).
- input: i8042 - Remove special PowerPC handling (git-fixes).
- input: synaptics - add a second working PNP_ID for Lenovo T470s (bsc#1111666).
- intel_idle: Graceful probe failure when MWAIT is disabled (bsc#1174115).
- intel_th: Fix a NULL dereference when hub driver is not loaded (bsc#1111666).
- io-mapping: indicate mapping failure (git-fixes).
- ipvlan: call dev_change_flags when ipvlan mode is reset (git-fixes).
- ixgbevf: Remove limit of 10 entries for unicast filter list (git-fixes).
- jbd2: avoid leaking transaction credits when unreserving handle (bsc#1173845).
- jbd2: Preserve kABI when adding j_abort_mutex (bsc#1173833).
- kabi: hv: prevent struct device_node to become defined (bsc#1172871).
- kabi: ppc64le: prevent struct dma_map_ops to become defined (jsc#SLE-12423).
- kABI: protect struct mlx5_cmd_work_ent (kabi).
- kABI: reintroduce inet_hashtables.h include to l2tp_ip (kabi).
- kernfs: fix barrier usage in __kernfs_new_node() (bsc#1111666).
- kvm: nVMX: Do not reread VMCS-agnostic state when switching VMCS (bsc#1114279).
- kvm: nVMX: Skip IBPB when switching between vmcs01 and vmcs02 (bsc#1114279).
- kvm: x86: Fix APIC page invalidation race (bsc#1174122).
- kvm: x86: Fix L1TF mitigation for shadow MMU (bsc#1171904).
- kvm: x86/mmu: Set mmio_value to '0' if reserved #PF can't be generated (bsc#1171904).
- kvm: x86: only do L1TF workaround on affected processors (bsc#1171904).
- l2tp: add sk_family checks to l2tp_validate_socket (networking-stable-20_06_07).
- l2tp: do not use inet_hash()/inet_unhash() (networking-stable-20_06_07).
- libceph: do not omit recovery_deletes in target_copy() (bsc#1174113).
- libceph: ignore pool overlay and cache logic on redirects (bsc#1173146).
- lib: logic_pio: Add logic_pio_unregister_range() (bsc#1174658).
- lib: logic_pio: Avoid possible overlap for unregistering regions (bsc#1174658).
- lib: logic_pio: Fix RCU usage (bsc#1174658).
- libnvdimm/bus: Fix wait_nvdimm_bus_probe_idle() ABBA deadlock (bsc#1171753).
- libnvdimm/bus: Prepare the nd_ioctl() path to be re-entrant (bsc#1171753).
- libnvdimm/bus: Stop holding nvdimm_bus_list_mutex over __nd_ioctl() (bsc#1171753).
- libnvdimm: cover up changes in struct nvdimm_bus (bsc#1171753).
- libnvdimm: cover up nd_pfn_sb changes (bsc#1171759).
- libnvdimm/dax: Pick the right alignment default when creating dax devices (bsc#1171759).
- libnvdimm/label: Remove the dpa align check (bsc#1171759).
- libnvdimm/of_pmem: Provide a unique name for bus provider (bsc#1171739).
- libnvdimm/pfn_dev: Add a build check to make sure we notice when struct page size change (bsc#1171743).
- libnvdimm/pfn_dev: Add page size and struct page size to pfn superblock (bsc#1171759).
- libnvdimm/pfn: Prevent raw mode fallback if pfn-infoblock valid (bsc#1171743).
- libnvdimm/pmem: Advance namespace seed for specific probe errors (bsc#1171743).
- libnvdimm/region: Initialize bad block for volatile namespaces (bnc#1151927 5.3.6).
- libnvdimm/region: Rewrite _probe_success() to _advance_seeds() (bsc#1171743).
- libnvdimm: Use PAGE_SIZE instead of SZ_4K for align check (bsc#1171759).
- livepatch: Apply vmlinux-specific KLP relocations early (bsc#1071995).
- livepatch: Disallow vmlinux.ko (bsc#1071995).
- livepatch: Make klp_apply_object_relocs static (bsc#1071995).
- livepatch: Prevent module-specific KLP rela sections from referencing vmlinux symbols (bsc#1071995).
- livepatch: Remove .klp.arch (bsc#1071995).
- loop: replace kill_bdev with invalidate_bdev (bsc#1173820).
- lpfc_debugfs: get rid of pointless access_ok() (bsc#1172687 bsc#1171530).
- lpfc: Synchronize NVME transport and lpfc driver devloss_tmo (bcs#1173060).
- mac80211: add option for setting control flags (bsc#1111666).
- mac80211: set IEEE80211_TX_CTRL_PORT_CTRL_PROTO for nl80211 TX (bsc#1111666).
- mailbox: imx: Disable the clock on devm_mbox_controller_register() failure (git-fixes).
- md: Avoid namespace collision with bitmap API (git fixes (block drivers)).
- mdraid: fix read/write bytes accounting (bsc#1172537).
- md: use memalloc scope APIs in mddev_suspend()/mddev_resume() (bsc#1166985)).
- media: cec: silence shift wrapping warning in __cec_s_log_addrs() (git-fixes).
- media: si2157: Better check for running tuner in init (bsc#1111666).
- mlxsw: core: Do not use WQ_MEM_RECLAIM for mlxsw ordered workqueue (git-fixes).
- mlxsw: core: Do not use WQ_MEM_RECLAIM for mlxsw workqueue (git-fixes).
- mlxsw: pci: Return error on PCI reset timeout (git-fixes).
- mlxsw: spectrum_acl_tcam: Position vchunk in a vregion list properly (networking-stable-20_05_12).
- mlxsw: spectrum: Disallow prio-tagged packets when PVID is removed (git-fixes).
- mlxsw: spectrum_dpipe: Add missing error path (git-fixes).
- mlxsw: spectrum: Prevent force of 56G (git-fixes).
- mlxsw: spectrum_router: Refresh nexthop neighbour when it becomes dead (git-fixes).
- mlxsw: spectrum_router: Remove inappropriate usage of WARN_ON() (git-fixes).
- mlxsw: spectrum_switchdev: Add MDB entries in prepare phase (git-fixes).
- mlxsw: spectrum_switchdev: Do not treat static FDB entries as sticky (git-fixes).
- mmc: block: Fix request completion in the CQE timeout path (bsc#1111666).
- mmc: block: Fix use-after-free issue for rpmb (bsc#1111666).
- mmc: fix compilation of user API (bsc#1051510).
- mmc: sdhci: do not enable card detect interrupt for gpio cd type (bsc#1111666).
- mmc: sdhci-msm: Set SDHCI_QUIRK_MULTIBLOCK_READ_ACMD12 quirk (bsc#1111666).
- Move kabi patch into the right place
- Move upstreamed lpfc patches into sorted section
- mvpp2: remove misleading comment (git-fixes).
- net: be more gentle about silly gso requests coming from user (networking-stable-20_06_07).
- net: check untrusted gso_size at kernel entry (networking-stable-20_06_07).
- net/cxgb4: Check the return from t4_query_params properly (git-fixes).
- net: dsa: bcm_sf2: Fix node reference count (git-fixes).
- net: dsa: loop: Add module soft dependency (networking-stable-20_05_16).
- net: dsa: mt7530: fix roaming from DSA user ports (networking-stable-20_05_27).
- net: ena: add intr_moder_rx_interval to struct ena_com_dev and use it (git-fixes).
- net: ena: add missing ethtool TX timestamping indication (git-fixes).
- net: ena: avoid memory access violation by validating req_id properly (git-fixes).
- net: ena: do not wake up tx queue when down (git-fixes).
- net: ena: ena-com.c: prevent NULL pointer dereference (git-fixes).
- net: ena: ethtool: use correct value for crc32 hash (git-fixes).
- net: ena: fix continuous keep-alive resets (git-fixes).
- net: ena: fix corruption of dev_idx_to_host_tbl (git-fixes).
- net: ena: fix default tx interrupt moderation interval (git-fixes).
- net: ena: fix incorrect default RSS key (git-fixes).
- net: ena: fix incorrectly saving queue numbers when setting RSS indirection table (git-fixes).
- net: ena: fix issues in setting interrupt moderation params in ethtool (git-fixes).
- net: ena: fix potential crash when rxfh key is NULL (git-fixes).
- net: ena: fix retrieval of nonadaptive interrupt moderation intervals (git-fixes).
- net: ena: fix uses of round_jiffies() (git-fixes).
- net: ena: make ena rxfh support ETH_RSS_HASH_NO_CHANGE (git-fixes).
- net: ena: reimplement set/get_coalesce() (git-fixes).
- net: ena: rss: do not allocate key when not supported (git-fixes).
- net: ena: rss: fix failure to get indirection table (git-fixes).
- net: ena: rss: store hash function as values and not bits (git-fixes).
- netfilter: connlabels: prefer static lock initialiser (git-fixes).
- netfilter: ctnetlink: netns exit must wait for callbacks (bsc#1169795).
- netfilter: not mark a spinlock as __read_mostly (git-fixes).
- net: fix a potential recursive NETDEV_FEAT_CHANGE (networking-stable-20_05_16).
- net: hns3: add autoneg and change speed support for fibre port (bsc#1174070).
- net: hns3: add support for FEC encoding control (bsc#1174070).
- net: hns3: add support for multiple media type (bsc#1174070).
- net: hns3: fix a not link up issue when fibre port supports autoneg (bsc#1174070).
- net: hns3: fix for FEC configuration (bsc#1174070).
- net: hns3: fix port capbility updating issue (bsc#1174070).
- net: hns3: fix port setting handle for fibre port (bsc#1174070).
- net: hns3: fix selftest fail issue for fibre port with autoneg on (bsc#1174070).
- net: hns3: restore the MAC autoneg state after reset (bsc#1174070).
- net: inet_csk: Fix so_reuseport bind-address cache in tb->fast* (networking-stable-20_05_27).
- net: ipip: fix wrong address family in init error path (networking-stable-20_05_27).
- net: ipvlan: Fix ipvlan device tso disabled while NETIF_F_IP_CSUM is set (git-fixes).
- net: macsec: preserve ingress frame ordering (networking-stable-20_05_12).
- net/mlx4_core: drop useless LIST_HEAD (git-fixes).
- net/mlx4_core: fix a memory leak bug (git-fixes).
- net/mlx4_core: Fix use of ENOSPC around mlx4_counter_alloc() (networking-stable-20_05_12).
- net/mlx5: Add command entry handling completion (networking-stable-20_05_27).
- net/mlx5: Avoid panic when setting vport rate (git-fixes).
- net/mlx5: Continue driver initialization despite debugfs failure (git-fixes).
- net/mlx5e: ethtool, Fix a typo in WOL function names (git-fixes).
- net/mlx5e: Fix traffic duplication in ethtool steering (git-fixes).
- net/mlx5e: Remove unnecessary clear_bit()s (git-fixes).
- net/mlx5e: Update netdev txq on completions during closure (networking-stable-20_05_27).
- net/mlx5: Fix command entry leak in Internal Error State (networking-stable-20_05_12).
- net/mlx5: Fix crash upon suspend/resume (networking-stable-20_06_07).
- net/mlx5: Fix forced completion access non initialized command entry (networking-stable-20_05_12).
- net: mvmdio: allow up to four clocks to be specified for orion-mdio (git-fixes).
- net: mvpp2: prs: Do not override the sign bit in SRAM parser shift (git-fixes).
- net: phy: fix aneg restart in phy_ethtool_set_eee (networking-stable-20_05_16).
- netprio_cgroup: Fix unlimited memory leak of v2 cgroups (networking-stable-20_05_16).
- net: qede: stop adding events on an already destroyed workqueue (git-fixes).
- net: qed: fix excessive QM ILT lines consumption (git-fixes).
- net: qed: fix NVMe login fails over VFs (git-fixes).
- net: qrtr: Fix passing invalid reference to qrtr_local_enqueue() (networking-stable-20_05_27).
- net: revert 'net: get rid of an signed integer overflow in ip_idents_reserve()' (networking-stable-20_05_27).
- net sched: fix reporting the first-time use timestamp (networking-stable-20_05_27).
- net: stricter validation of untrusted gso packets (networking-stable-20_05_12).
- net/tls: Fix sk_psock refcnt leak in bpf_exec_tx_verdict() (networking-stable-20_05_12).
- net/tls: Fix sk_psock refcnt leak when in tls_data_ready() (networking-stable-20_05_12).
- net: usb: qmi_wwan: add support for DW5816e (networking-stable-20_05_12).
- net: usb: qmi_wwan: add Telit 0x1050 composition (networking-stable-20_06_07).
- net: usb: qmi_wwan: add Telit LE910C1-EUX composition (networking-stable-20_06_07).
- net: vmxnet3: fix possible buffer overflow caused by bad DMA value in vmxnet3_get_rss() (bsc#1172484).
- nfp: bpf: fix code-gen bug on BPF_ALU | BPF_XOR | BPF_K (git-fixes).
- NFS: Fix an RCU lock leak in nfs4_refresh_delegation_stateid() (bsc#1170592).
- NFSv4: Retry CLOSE and DELEGRETURN on NFS4ERR_OLD_STATEID (bsc#1170592).
- nilfs2: fix null pointer dereference at nilfs_segctor_do_construct() (bsc#1173857).
- nl80211: fix NL80211_ATTR_CHANNEL_WIDTH attribute type (bsc#1111666).
- nvdimm: Avoid race between probe and reading device attributes (bsc#1170442).
- nvme: check for NVME_CTRL_LIVE in nvme_report_ns_ids() (bcs#1171558 bsc#1159058).
- nvme: do not update multipath disk information if the controller is down (bcs#1171558 bsc#1159058).
- nvme: fail cancelled commands with NVME_SC_HOST_PATH_ERROR (bsc#1158983 bsc#1172538).
- nvme-fc: Fail transport errors with NVME_SC_HOST_PATH (bsc#1158983 bsc#1172538).
- nvme-tcp: fail command with NVME_SC_HOST_PATH_ERROR send failed (bsc#1158983 bsc#1172538).
- objtool: Clean instruction state before each function validation (bsc#1169514).
- objtool: Ignore empty alternatives (bsc#1169514).
- ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).
- ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).
- ocfs2: load global_inode_alloc (bsc#1172963).
- ocfs2: no need try to truncate file beyond i_size (bsc#1171841).
- overflow: Fix -Wtype-limits compilation warnings (git fixes).
- overflow.h: Add arithmetic shift helper (git fixes).
- p54usb: add AirVasT USB stick device-id (bsc#1051510).
- padata: ensure the reorder timer callback runs on the correct CPU (git-fixes).
- padata: reorder work kABI fixup (git-fixes).
- PCI/AER: Remove HEST/FIRMWARE_FIRST parsing for AER ownership (bsc#1174356).
- PCI/AER: Use only _OSC to determine AER ownership (bsc#1174356).
- PCI: Allow pci_resize_resource() for devices on root bus (bsc#1051510).
- PCI: Fix pci_register_host_bridge() device_register() error handling (bsc#1051510).
- PCI: Fix 'try' semantics of bus and slot reset (git-fixes).
- PCI: Generalize multi-function power dependency device links (bsc#1111666).
- PCI: hv: Change pci_protocol_version to per-hbus (bsc#1172871, bsc#1172872).
- PCI: hv: Fix the PCI HyperV probe failure path to release resource properly (bsc#1172871, bsc#1172872).
- PCI: hv: Introduce hv_msi_entry (bsc#1172871, bsc#1172872).
- PCI: hv: Move hypercall related definitions into tlfs header (bsc#1172871, bsc#1172872).
- PCI: hv: Move retarget related structures into tlfs header (bsc#1172871, bsc#1172872).
- PCI: hv: Reorganize the code in preparation of hibernation (bsc#1172871, bsc#1172872).
- PCI: hv: Retry PCI bus D0 entry on invalid device state (bsc#1172871, bsc#1172872).
- PCI: pciehp: Fix indefinite wait on sysfs requests (git-fixes).
- PCI: pciehp: Support interrupts sent from D3hot (git-fixes).
- PCI: Program MPS for RCiEP devices (bsc#1051510).
- PCI/PTM: Inherit Switch Downstream Port PTM settings from Upstream Port (bsc#1051510).
- pci: Revive pci_dev __aer_firmware_first* fields for kABI (bsc#1174356).
- pcm_native: result of put_user() needs to be checked (bsc#1111666).
- perf/x86/amd: Constrain Large Increment per Cycle events (git-fixes).
- perf/x86/amd/ibs: Fix reading of the IBS OpData register and thus precise RIP validity (git-fixes).
- perf/x86/amd/ibs: Fix sample bias for dispatched micro-ops (git-fixes).
- perf/x86/amd/ibs: Handle erratum #420 only on the affected CPU family (10h) (git-fixes).
- perf/x86/amd/iommu: Make the 'amd_iommu_attr_groups' symbol static (git-fixes).
- perf/x86/amd/uncore: Do not set 'ThreadMask' and 'SliceMask' for non-L3 PMCs (git-fixes stable).
- perf/x86/amd/uncore: Set the thread mask for F17h L3 PMCs (git-fixes).
- perf/x86/amd/uncore: Set ThreadMask and SliceMask for L3 Cache perf events (git-fixes stable).
- perf/x86: Enable free running PEBS for REGS_USER/INTR (git-fixes).
- perf/x86: Fix incorrect PEBS_REGS (git-fixes).
- perf/x86/intel: Add generic branch tracing check to intel_pmu_has_bts() (git-fixes).
- perf/x86/intel: Add proper condition to run sched_task callbacks (git-fixes).
- perf/x86/intel/bts: Fix the use of page_private() (git-fixes).
- perf/x86/intel: Fix PT PMI handling (git-fixes).
- perf/x86/intel: Move branch tracing setup to the Intel-specific source file (git-fixes).
- perf/x86/intel/uncore: Add Node ID mask (git-fixes).
- perf/x86/intel/uncore: Fix PCI BDF address of M3UPI on SKX (git-fixes).
- perf/x86/intel/uncore: Handle invalid event coding for free-running counter (git-fixes).
- perf/x86/uncore: Fix event group support (git-fixes).
- pid: Improve the comment about waiting in zap_pid_ns_processes (git fixes)).
- pinctrl: freescale: imx: Fix an error handling path in 'imx_pinctrl_probe()' (bsc#1051510).
- pinctrl: imxl: Fix an error handling path in 'imx1_pinctrl_core_probe()' (bsc#1051510).
- pinctrl: samsung: Save/restore eint_mask over suspend for EINT_TYPE GPIOs (bsc#1051510).
- platform/x86: dell-laptop: do not register micmute LED if there is no token (bsc#1111666).
- platform/x86: hp-wmi: Convert simple_strtoul() to kstrtou32() (bsc#1111666).
- PM / Domains: Allow genpd users to specify default active wakeup behavior (git-fixes).
- pnp: Use list_for_each_entry() instead of open coding (git fixes).
- powerpc/64s: Do not let DT CPU features set FSCR_DSCR (bsc#1065729).
- powerpc/64s: Save FSCR to init_task.thread.fscr after feature init (bsc#1065729).
- powerpc/book3s64: Export has_transparent_hugepage() related functions (bsc#1171759).
- powerpc/book3s64/pkeys: Fix pkey_access_permitted() for execute disable pkey (bsc#1065729).
- powerpc/fadump: fix race between pstore write and fadump crash trigger (bsc#1168959 ltc#185010).
- powerpc-mm-Remove-kvm-radix-prefetch-workaround-for-.patch
- powerpc/xive: Clear the page tables for the ESB IO mapping (bsc#1085030).
- powerpc-xmon-don-t-access-ASDR-in-VMs.patch
- powerpc/xmon: Reset RCU and soft lockup watchdogs (bsc#1065729).
- power: supply: bq24257_charger: Replace depends on REGMAP_I2C with select (bsc#1051510).
- power: supply: lp8788: Fix an error handling path in 'lp8788_charger_probe()' (bsc#1051510).
- power: supply: smb347-charger: IRQSTAT_D is volatile (bsc#1051510).
- power: vexpress: add suppress_bind_attrs to true (bsc#1111666).
- pppoe: only process PADT targeted at local interfaces (networking-stable-20_05_16).
- propagate_one(): mnt_set_mountpoint() needs mount_lock (bsc#1174841).
- qed: reduce maximum stack frame size (git-fixes).
- qlcnic: fix missing release in qlcnic_83xx_interrupt_test (git-fixes).
- r8152: support additional Microsoft Surface Ethernet Adapter variant (networking-stable-20_05_27).
- raid5: remove gfp flags from scribble_alloc() (bsc#1166985).
- RDMA/efa: Fix setting of wrong bit in get/set_feature commands (bsc#1111666)
- RDMA/efa: Set maximum pkeys device attribute (bsc#1111666)
- RDMA/efa: Support remote read access in MR registration (bsc#1111666)
- RDMA/efa: Unified getters/setters for device structs bitmask access (bsc#1111666)
- README.BRANCH: Add Takashi Iwai as primary maintainer.
- regmap: debugfs: Do not sleep while atomic for fast_io regmaps (bsc#1111666).
- Revert 'bcache: ignore pending signals when creating gc and allocator thread' (git fixes (block drivers)).
- Revert commit e918e570415c ('tpm_tis: Remove the HID IFX0102') (bsc#1111666).
- Revert 'dm crypt: use WQ_HIGHPRI for the IO and crypt workqueues' (git fixes (block drivers)).
- Revert 'ipv6: add mtu lock check in __ip6_rt_update_pmtu' (networking-stable-20_05_16).
- Revert pciehp patches that broke booting (bsc#1174887)
- Revert 'thermal: mediatek: fix register index error' (bsc#1111666).
- Revert 'tools lib traceevent: Remove unneeded qsort and uses memmove'
- rtnetlink: Fix memory(net_device) leak when ->newlink fails (git-fixes).
- s390/bpf: Maintain 8-byte stack alignment (bsc#1169194).
- s390: fix syscall_get_error for compat processes (git-fixes).
- s390/qdio: consistently restore the IRQ handler (git-fixes).
- s390/qdio: lock device while installing IRQ handler (git-fixes).
- s390/qdio: put thinint indicator after early error (git-fixes).
- s390/qdio: tear down thinint indicator after early error (git-fixes).
- s390/qeth: fix error handling for isolation mode cmds (git-fixes).
- sch_choke: avoid potential panic in choke_reset() (networking-stable-20_05_12).
- sch_sfq: validate silly quantum values (networking-stable-20_05_12).
- scripts/git_sort/git_sort.py: add bluetooth/bluetooth-next.git repository
- scsi: aacraid: fix a signedness bug (bsc#1174296).
- scsi: hisi_sas: fix calls to dma_set_mask_and_coherent() (bsc#1174296).
- scsi: ibmvscsi: Do not send host info in adapter info MAD after LPM (bsc#1172759 ltc#184814).
- scsi: lpfc: Add an internal trace log buffer (bsc#1172687 bsc#1171530).
- scsi: lpfc: Add blk_io_poll support for latency improvment (bsc#1172687 bsc#1171530).
- scsi: lpfc: Add support to display if adapter dumps are available (bsc#1172687 bsc#1171530).
- scsi: lpfc: Allow applications to issue Common Set Features mailbox command (bsc#1172687 bsc#1171530).
- scsi: lpfc: Avoid another null dereference in lpfc_sli4_hba_unset() (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix inconsistent indenting (bsc#1158983).
- scsi: lpfc: Fix interrupt assignments when multiple vectors are supported on same CPU (bsc#1158983).
- scsi: lpfc: Fix kdump hang on PPC (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix language in 0373 message to reflect non-error message (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix less-than-zero comparison of unsigned value (bsc#1158983).
- scsi: lpfc: Fix missing MDS functionality (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix NVMe rport deregister and registration during ADISC (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix oops due to overrun when reading SLI3 data (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix shost refcount mismatch when deleting vport (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix stack trace seen while setting rrq active (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix unused assignment in lpfc_sli4_bsg_link_diag_test (bsc#1172687 bsc#1171530).
- scsi: lpfc: Update lpfc version to 12.8.0.2 (bsc#1158983).
- scsi: megaraid_sas: Fix a compilation warning (bsc#1174296).
- scsi: mpt3sas: Fix double free in attach error handling (bsc#1174296).
- scsi: qedf: Add port_id getter (bsc#1150660).
- scsi: qla2xxx: Fix a condition in qla2x00_find_all_fabric_devs() (bsc#1174296).
- scsi: qla2xxx: Set NVMe status code for failed NVMe FCP request (bsc#1158983).
- sctp: Do not add the shutdown timer if its already been added (networking-stable-20_05_27).
- sctp: Start shutdown on association restart if in SHUTDOWN-SENT state and socket is closed (networking-stable-20_05_27).
- spi: dw: use 'smp_mb()' to avoid sending spi data error (bsc#1051510).
- spi: fix initial SPI_SR value in spi-fsl-dspi (bsc#1111666).
- spi: pxa2xx: Apply CS clk quirk to BXT (bsc#1111666).
- spi: spidev: fix a race between spidev_release and spidev_remove (bsc#1111666).
- spi: spi-mem: Fix Dual/Quad modes on Octal-capable devices (bsc#1111666).
- spi: spi-sun6i: sun6i_spi_transfer_one(): fix setting of clock rate (bsc#1111666).
- staging: comedi: verify array index is correct before using it (bsc#1111666).
- staging: rtl8712: Fix IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK (bsc#1051510).
- staging: sm750fb: add missing case while setting FB_VISUAL (bsc#1051510).
- SUNRPC: The TCP back channel mustn't disappear while requests are outstanding (bsc#1152624).
- tg3: driver sleeps indefinitely when EEH errors exceed eeh_max_freezes (bsc#1173284).
- timers: Add a function to start/reduce a timer (networking-stable-20_05_27).
- tpm_tis: extra chip->ops check on error path in tpm_tis_core_init (bsc#1111666).
- tpm_tis: Remove the HID IFX0102 (bsc#1111666).
- tracing: Fix event trigger to accept redundant spaces (git-fixes).
- tty: hvc_console, fix crashes on parallel open/close (git-fixes).
- tty: n_gsm: Fix bogus i++ in gsm_data_kick (bsc#1051510).
- tty: n_gsm: Fix SOF skipping (bsc#1051510).
- tty: n_gsm: Fix waking up upper tty layer when room available (bsc#1051510).
- tunnel: Propagate ECT(1) when decapsulating as recommended by RFC6040 (networking-stable-20_05_12).
- ubifs: remove broken lazytime support (bsc#1173826).
- usb: add USB_QUIRK_DELAY_INIT for Logitech C922 (git-fixes).
- usb: c67x00: fix use after free in c67x00_giveback_urb (bsc#1111666).
- usb: chipidea: core: add wakeup support for extcon (bsc#1111666).
- usb: dwc2: Fix shutdown callback in platform (bsc#1111666).
- usb: dwc2: gadget: move gadget resume after the core is in L0 state (bsc#1051510).
- usb: dwc3: gadget: introduce cancelled_list (git-fixes).
- usb: dwc3: gadget: never call ->complete() from ->ep_queue() (git-fixes).
- usb: dwc3: gadget: Properly handle ClearFeature(halt) (git-fixes).
- usb: dwc3: gadget: Properly handle failed kick_transfer (git-fixes).
- usb: ehci: reopen solution for Synopsys HC bug (git-fixes).
- usb: gadget: fix potential double-free in m66592_probe (bsc#1111666).
- usb: gadget: lpc32xx_udc: do not dereference ep pointer before null check (bsc#1051510).
- usb: gadget: udc: atmel: fix uninitialized read in debug printk (bsc#1111666).
- usb: gadget: udc: atmel: remove outdated comment in usba_ep_disable() (bsc#1111666).
- usb: gadget: udc: Potential Oops in error handling code (bsc#1111666).
- usb: gadget: udc: s3c2410_udc: Remove pointless NULL check in s3c2410_udc_nuke (bsc#1051510).
- usb: host: ehci-exynos: Fix error check in exynos_ehci_probe() (bsc#1111666).
- usb: host: ehci-mxc: Add error handling in ehci_mxc_drv_probe() (bsc#1051510).
- usb: musb: Fix runtime PM imbalance on error (bsc#1051510).
- usb: musb: start session in resume for host port (bsc#1051510).
- usbnet: smsc95xx: Fix use-after-free after removal (bsc#1111666).
- usb: ohci-sm501: Add missed iounmap() in remove (bsc#1111666).
- usb: serial: ch341: add new Product ID for CH340 (bsc#1111666).
- usb: serial: cypress_m8: enable Simply Automated UPB PIM (bsc#1111666).
- usb: serial: iuu_phoenix: fix memory corruption (bsc#1111666).
- usb: serial: option: add GosunCn GM500 series (bsc#1111666).
- usb: serial: option: add Quectel EG95 LTE modem (bsc#1111666).
- usb: serial: option: add Telit LE910C1-EUX compositions (bsc#1051510).
- usb: serial: qcserial: add DW5816e QDL support (bsc#1051510).
- usb: serial: usb_wwan: do not resubmit rx urb on fatal errors (bsc#1051510).
- usb: serial: usb_wwan: do not resubmit rx urb on fatal errors (git-fixes).
- vfio/pci: Fix SR-IOV VF handling with MMIO blocking (bsc#1174123).
- vfs: Fix EOVERFLOW testing in put_compat_statfs64 (bnc#1151927 5.3.6).
- virtio-blk: handle block_device_operations callbacks after hot unplug (git fixes (block drivers)).
- virtio: virtio_console: add missing MODULE_DEVICE_TABLE() for rproc serial (git-fixes).
- vmxnet3: add geneve and vxlan tunnel offload support (bsc#1172484).
- vmxnet3: add support to get/set rx flow hash (bsc#1172484).
- vmxnet3: allow rx flow hash ops only when rss is enabled (bsc#1172484).
- vmxnet3: avoid format strint overflow warning (bsc#1172484).
- vmxnet3: prepare for version 4 changes (bsc#1172484).
- vmxnet3: Remove always false conditional statement (bsc#1172484).
- vmxnet3: remove redundant initialization of pointer 'rq' (bsc#1172484).
- vmxnet3: remove unused flag 'rxcsum' from struct vmxnet3_adapter (bsc#1172484).
- vmxnet3: Replace msleep(1) with usleep_range() (bsc#1172484).
- vmxnet3: update to version 4 (bsc#1172484).
- vmxnet3: use correct hdr reference when packet is encapsulated (bsc#1172484).
- vsock: fix timeout in vsock_accept() (networking-stable-20_06_07).
- vt_compat_ioctl(): clean up, use compat_ptr() properly (git-fixes).
- vxlan: Avoid infinite loop when suppressing NS messages with invalid options (git-fixes).
- w1: omap-hdq: cleanup to add missing newline for some dev_dbg (bsc#1051510).
- watchdog: sp805: fix restart handler (bsc#1111666).
- wil6210: add general initialization/size checks (bsc#1111666).
- wil6210: check rx_buff_mgmt before accessing it (bsc#1111666).
- wil6210: ignore HALP ICR if already handled (bsc#1111666).
- wil6210: make sure Rx ring sizes are correlated (git-fixes).
- work around mvfs bug (bsc#1162063).
- x86/apic: Install an empty physflat_init_apic_ldr (bsc#1163309).
- x86/cpu/amd: Make erratum #1054 a legacy erratum (bsc#1114279).
- x86/events/intel/ds: Add PERF_SAMPLE_PERIOD into PEBS_FREERUNNING_FLAGS (git-fixes).
- x86: Fix early boot crash on gcc-10, third try (bsc#1114279).
- x86/{mce,mm}: Unmap the entire page if the whole page is affected and poisoned (bsc#1172257).
- x86/reboot/quirks: Add MacBook6,1 reboot quirk (bsc#1114279).
- xfrm: fix error in comment (git fixes).
- xhci: Fix enumeration issue when setting max packet size for FS devices (git-fixes).
- xhci: Fix incorrect EP_STATE_MASK (git-fixes).
- vt: vt_ioctl: remove unnecessary console allocation checks (git-fixes).
Patchnames
openSUSE-2020-1153
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe openSUSE Leap 15.1 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2019-16746: An issue was discovered in net/wireless/nl80211.c where it did not check the length of variable elements in a beacon head, leading to a buffer overflow (bnc#1152107 1173659).\n- CVE-2019-20810: go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c did not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586 (bnc#1172458).\n- CVE-2019-20908: An issue was discovered in drivers/firmware/efi/efi.c where Incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032 (bnc#1173567).\n- CVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).\n- CVE-2020-10135: Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key (bnc#1171988).\n- CVE-2020-10766: Fixed rogue cross-process SSBD shutdown. Linux scheduler logical bug allowed an attacker to turn off the SSBD protection. (bnc#1172781).\n- CVE-2020-10767: Fixed indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available. (bnc#1172782).\n- CVE-2020-10768: Fixed indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command. (bnc#1172783).\n- CVE-2020-10769: A buffer over-read flaw was found in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm\u0027s module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash. This flaw allowed a local attacker with user privileges to cause a denial of service (bnc#1173265).\n- CVE-2020-10773: Fixed a kernel stack information leak on s390/s390x. (bnc#1172999).\n- CVE-2020-10781: A zram sysfs resource consumption was fixed. (bnc#1173074).\n- CVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails (bnc#1171732).\n- CVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).\n- CVE-2020-13974: drivers/tty/vt/keyboard.c had an integer overflow if k_ascii was called several times in a row, aka CID-b86dab054059. (bnc#1172775).\n- CVE-2020-14331: Fixed a buffer over write in vgacon_scroll (bnc#1174205).\n- CVE-2020-14331: Fixed an out of bounds write to the vgacon scrollback buffer (bsc#1174205).\n- CVE-2020-14416: A race condition in tty-\u003edisc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).\n- CVE-2020-15393: usbtest_disconnect in drivers/usb/misc/usbtest.c has a memory leak, aka CID-28ebeb8db770 (bnc#1173514).\n- CVE-2020-15780: An issue was discovered in drivers/acpi/acpi_configfs.c where injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30 (bnc#1173573).\n- CVE-2020-16166: The Linux kernel allowed remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c (bnc#1174757).\n\nThe following non-security bugs were fixed:\n\n- ACPI: GED: add support for _Exx / _Lxx handler methods (bsc#1111666).\n- ACPI: GED: use correct trigger type field in _Exx / _Lxx handling (bsc#1111666).\n- ACPI: NFIT: Fix unlock on error in scrub_show() (bsc#1171753).\n- ACPI: PM: Avoid using power resources if there are none for D0 (bsc#1051510).\n- ACPI: sysfs: Fix pm_profile_attr type (bsc#1111666).\n- ACPI: video: Use native backlight on Acer Aspire 5783z (bsc#1111666).\n- ACPI: video: Use native backlight on Acer TravelMate 5735Z (bsc#1111666).\n- ALSA: es1688: Add the missed snd_card_free() (bsc#1051510).\n- ALSA: hda: Add ElkhartLake HDMI codec vid (bsc#1111666).\n- ALSA: hda: add sienna_cichlid audio asic id for sienna_cichlid up (bsc#1111666).\n- ALSA: hda: fix NULL pointer dereference during suspend (git-fixes).\n- ALSA: hda/hdmi - enable runtime pm for newer AMD display audio (bsc#1111666).\n- ALSA: hda - let hs_mic be picked ahead of hp_mic (bsc#1111666).\n- ALSA: hda/realtek - add a pintbl quirk for several Lenovo machines (bsc#1111666).\n- ALSA: hda/realtek - Add LED class support for micmute LED (bsc#1111666).\n- ALSA: hda/realtek: Add mute LED and micmute LED support for HP systems (bsc#1111666).\n- ALSA: hda/realtek - Add quirk for Lenovo Carbon X1 8th gen (bsc#1111666).\n- ALSA: hda/realtek - Add quirk for MSI GE63 laptop (bsc#1111666).\n- ALSA: hda/realtek - Add quirk for MSI GL63 (bsc#1111666).\n- ALSA: hda/realtek - change to suitable link model for ASUS platform (bsc#1111666).\n- ALSA: hda/realtek - Check headset type by unplug and resume (bsc#1111666).\n- ALSA: hda/realtek - Enable audio jacks of Acer vCopperbox with ALC269VC (bsc#1111666).\n- ALSA: hda/realtek: Enable headset mic of Acer C20-820 with ALC269VC (bsc#1111666).\n- ALSA: hda/realtek: Enable headset mic of Acer TravelMate B311R-31 with ALC256 (bsc#1111666).\n- ALSA: hda/realtek: Enable headset mic of Acer Veriton N4660G with ALC269VC (bsc#1111666).\n- ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G14(G401) series with ALC289 (bsc#1111666).\n- ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G15(GA502) series with ALC289 (bsc#1111666).\n- ALSA: hda/realtek - Enable micmute LED on and HP system (bsc#1111666).\n- ALSA: hda/realtek - Enable Speaker for ASUS UX533 and UX534 (bsc#1111666).\n- ALSA: hda/realtek - Enable Speaker for ASUS UX563 (bsc#1111666).\n- ALSA: hda/realtek: Fix add a \u0027ultra_low_power\u0027 function for intel reference board (alc256) (bsc#1111666).\n- ALSA: hda/realtek: Fixed ALC298 sound bug by adding quirk for Samsung Notebook Pen S (bsc#1111666).\n- ALSA: hda/realtek - Fixed HP right speaker no sound (bsc#1111666).\n- ALSA: hda/realtek - Fix Lenovo Thinkpad X1 Carbon 7th quirk subdevice id (bsc#1111666).\n- ALSA: hda/realtek - Fix unused variable warning w/o CONFIG_LEDS_TRIGGER_AUDIO (bsc#1111666).\n- ALSA: hda/realtek - Introduce polarity for micmute LED GPIO (bsc#1111666).\n- ALSA: hda/realtek: typo_fix: enable headset mic of ASUS ROG Zephyrus G14(GA401) series with ALC289 (bsc#1111666).\n- ALSA: hda: Workaround for spurious wakeups on some Intel platforms (git-fixes).\n- ALSA: lx6464es - add support for LX6464ESe pci express variant (bsc#1111666).\n- ALSA: opl3: fix infoleak in opl3 (bsc#1111666).\n- ALSA: pcm: disallow linking stream to itself (bsc#1111666).\n- ALSA: usb-audio: Add duplex sound support for USB devices using implicit feedback (bsc#1111666).\n- ALSA: usb-audio: Add Pioneer DJ DJM-900NXS2 support (bsc#1111666).\n- ALSA: usb-audio: add quirk for MacroSilicon MS2109 (bsc#1111666).\n- ALSA: usb-audio: Add vendor, product and profile name for HP Thunderbolt Dock (bsc#1111666).\n- ALSA: usb-audio: Clean up quirk entries with macros (bsc#1111666).\n- ALSA: usb-audio: Fix inconsistent card PM state after resume (bsc#1111666).\n- ALSA: usb-audio: Fix packet size calculation (bsc#1111666).\n- ALSA: usb-audio: Fix racy list management in output queue (bsc#1111666).\n- ALSA: usb-audio: Improve frames size computation (bsc#1111666).\n- ALSA: usb-audio: Manage auto-pm of all bundled interfaces (bsc#1111666).\n- ALSA: usb-audio: Use the new macro for HP Dock rename quirks (bsc#1111666).\n- amdgpu: a NULL -\u003emm does not mean a thread is a kthread (git-fixes).\n- arm64: map FDT as RW for early_init_dt_scan() (jsc#SLE-12423).\n- ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb (bsc#1111666).\n- ath9k: Fix use-after-free Read in ath9k_wmi_ctrl_rx (bsc#1111666).\n- ath9k: Fix use-after-free Write in ath9k_htc_rx_msg (bsc#1111666).\n- ath9x: Fix stack-out-of-bounds Write in ath9k_hif_usb_rx_cb (bsc#1111666).\n- ax25: fix setsockopt(SO_BINDTODEVICE) (networking-stable-20_05_27).\n- b43: Fix connection problem with WPA3 (bsc#1111666).\n- b43_legacy: Fix connection problem with WPA3 (bsc#1111666).\n- bcache: Fix an error code in bch_dump_read() (git fixes (block drivers)).\n- be2net: fix link failure after ethtool offline test (git-fixes).\n- block: Fix use-after-free in blkdev_get() (bsc#1174843).\n- block: nr_sects_write(): Disable preemption on seqcount write (bsc#1173818).\n- block: remove QUEUE_FLAG_STACKABLE (git fixes (block drivers)).\n- block: sed-opal: fix sparse warning: convert __be64 data (git fixes (block drivers)).\n- Bluetooth: Add SCO fallback for invalid LMP parameters error (bsc#1111666).\n- bnxt_en: Fix AER reset logic on 57500 chips (git-fixes).\n- bnxt_en: Fix ethtool selftest crash under error conditions (git-fixes).\n- bnxt_en: Fix handling FRAG_ERR when NVM_INSTALL_UPDATE cmd fails (git-fixes).\n- bnxt_en: Fix ipv6 RFS filter matching logic (git-fixes).\n- bnxt_en: fix NULL dereference in case SR-IOV configuration fails (git-fixes).\n- bnxt_en: Fix VF anti-spoof filter setup (networking-stable-20_05_12).\n- bnxt_en: Fix VLAN acceleration handling in bnxt_fix_features() (networking-stable-20_05_12).\n- bnxt_en: Improve AER slot reset (networking-stable-20_05_12).\n- brcmfmac: fix wrong location to get firmware feature (bsc#1111666).\n- brcmfmac: Transform compatible string for FW loading (bsc#1169771).\n- btrfs: add assertions for tree == inode-\u003eio_tree to extent IO helpers (bsc#1174438).\n- btrfs: add new helper btrfs_lock_and_flush_ordered_range (bsc#1174438).\n- btrfs: Always use a cached extent_state in btrfs_lock_and_flush_ordered_range (bsc#1174438).\n- btrfs: change timing for qgroup reserved space for ordered extents to fix reserved space leak (bsc#1172247).\n- btrfs: do not zero f_bavail if we have available space (bsc#1168081).\n- btrfs: drop argument tree from btrfs_lock_and_flush_ordered_range (bsc#1174438).\n- btrfs: file: reserve qgroup space after the hole punch range is locked (bsc#1172247).\n- btrfs: fix extent_state leak in btrfs_lock_and_flush_ordered_range (bsc#1174438).\n- btrfs: fix failure of RWF_NOWAIT write into prealloc extent beyond eof (bsc#1174438).\n- btrfs: fix hang on snapshot creation after RWF_NOWAIT write (bsc#1174438).\n- btrfs: fix RWF_NOWAIT write not failling when we need to cow (bsc#1174438).\n- btrfs: fix RWF_NOWAIT writes blocking on extent locks and waiting for IO (bsc#1174438).\n- btrfs: inode: move qgroup reserved space release to the callers of insert_reserved_file_extent() (bsc#1172247).\n- btrfs: inode: refactor the parameters of insert_reserved_file_extent() (bsc#1172247).\n- btrfs: make btrfs_ordered_extent naming consistent with btrfs_file_extent_item (bsc#1172247).\n- btrfs: qgroup: allow to unreserve range without releasing other ranges (bsc#1120163).\n- btrfs: qgroup: Fix a bug that prevents qgroup to be re-enabled after disable (bsc#1172247).\n- btrfs: qgroup: fix data leak caused by race between writeback and truncate (bsc#1172247).\n- btrfs: qgroup: remove ASYNC_COMMIT mechanism in favor of reserve retry-after-EDQUOT (bsc#1120163).\n- btrfs: qgroup: try to flush qgroup space when we get -EDQUOT (bsc#1120163).\n- btrfs: Return EAGAIN if we can\u0027t start no snpashot write in check_can_nocow (bsc#1174438).\n- btrfs: use correct count in btrfs_file_write_iter() (bsc#1174438).\n- btrfs: Use newly introduced btrfs_lock_and_flush_ordered_range (bsc#1174438).\n- btrfs: volumes: Remove ENOSPC-prone btrfs_can_relocate() (bsc#1171124).\n- bus: hisi_lpc: Add .remove method to avoid driver unbind crash (bsc#1174658).\n- bus: hisi_lpc: Do not fail probe for unrecognised child devices (bsc#1174658).\n- bus: hisi_lpc: Unregister logical PIO range to avoid potential use-after-free (bsc#1174658).\n- bus: sunxi-rsb: Return correct data when mixing 16-bit and 8-bit reads (bsc#1111666).\n- carl9170: remove P2P_GO support (bsc#1111666).\n- cdc-acm: Add DISABLE_ECHO quirk for Microchip/SMSC chip (git-fixes).\n- CDC-ACM: heed quirk also in error handling (git-fixes).\n- ceph: convert mdsc-\u003ecap_dirty to a per-session list (bsc#1167104).\n- ceph: request expedited service on session\u0027s last cap flush (bsc#1167104).\n- cgroup, blkcg: Prepare some symbols for module and !CONFIG_CGROUP usages (bsc#1173857).\n- char/random: Add a newline at the end of the file (jsc#SLE-12423).\n- cifs: get rid of unused parameter in reconn_setup_dfs_targets() (bsc#1144333).\n- cifs: handle hostnames that resolve to same ip in failover (bsc#1144333 bsc#1161016).\n- cifs: set up next DFS target before generic_ip_connect() (bsc#1144333 bsc#1161016).\n- clk: bcm2835: Fix return type of bcm2835_register_gate (bsc#1051510).\n- clk: clk-flexgen: fix clock-critical handling (bsc#1051510).\n- clk: sunxi: Fix incorrect usage of round_down() (bsc#1051510).\n- clocksource: dw_apb_timer: Make CPU-affiliation being optional (bsc#1111666).\n- compat_ioctl: block: handle BLKREPORTZONE/BLKRESETZONE (git fixes (block drivers)).\n- compat_ioctl: block: handle Persistent Reservations (git fixes (block drivers)).\n- config: arm64: enable CONFIG_IOMMU_DEFAULT_PASSTHROUGH References: bsc#1174549\n- copy_{to,from}_user(): consolidate object size checks (git fixes).\n- crypto: algboss - do not wait during notifier callback (bsc#1111666).\n- crypto: algif_skcipher - Cap recv SG list at ctx-\u003eused (bsc#1111666).\n- crypto: caam - update xts sector size for large input length (bsc#1111666).\n- crypto: cavium/nitrox - Fix \u0027nitrox_get_first_device()\u0027 when ndevlist is fully iterated (bsc#1111666).\n- crypto: cavium/nitrox - Fix \u0027nitrox_get_first_device()\u0027 when ndevlist is fully iterated (git-fixes).\n- crypto/chcr: fix for ccm(aes) failed test (bsc#1111666).\n- crypto: chelsio/chtls: properly set tp-\u003elsndtime (bsc#1111666).\n- crypto: rockchip - fix scatterlist nents error (git-fixes).\n- crypto: stm32/crc32 - fix ext4 chksum BUG_ON() (git-fixes).\n- crypto: talitos - check AES key size (git-fixes).\n- crypto: talitos - fix ablkcipher for CONFIG_VMAP_STACK (git-fixes).\n- crypto: talitos - fix IPsec cipher in length (git-fixes).\n- crypto: talitos - reorder code in talitos_edesc_alloc() (git-fixes).\n- crypto: virtio: Fix src/dst scatterlist calculation in __virtio_crypto_skcipher_do_req() (git-fixes).\n- debugfs: Check module state before warning in {full/open}_proxy_open() (bsc#1173746).\n- devinet: fix memleak in inetdev_init() (networking-stable-20_06_07).\n- /dev/mem: Add missing memory barriers for devmem_inode (git-fixes).\n- /dev/mem: Revoke mappings when a driver claims the region (git-fixes).\n- dlm: remove BUG() before panic() (bsc#1174844).\n- dmaengine: tegra210-adma: Fix an error handling path in \u0027tegra_adma_probe()\u0027 (bsc#1111666).\n- dm btree: increase rebalance threshold in __rebalance2() (git fixes (block drivers)).\n- dm cache: fix a crash due to incorrect work item cancelling (git fixes (block drivers)).\n- dm crypt: fix benbi IV constructor crash if used in authenticated mode (git fixes (block drivers)).\n- dm: fix potential for q-\u003emake_request_fn NULL pointer (git fixes (block drivers)).\n- dm space map common: fix to ensure new block isn\u0027t already in use (git fixes (block drivers)).\n- dm: various cleanups to md-\u003equeue initialization code (git fixes).\n- dm verity fec: fix hash block number in verity_fec_decode (git fixes (block drivers)).\n- dm verity fec: fix memory leak in verity_fec_dtr (git fixes (block drivers)).\n- dpaa_eth: fix usage as DSA master, try 3 (networking-stable-20_05_27).\n- driver-core, libnvdimm: Let device subsystems add local lockdep coverage (bsc#1171753)\n- Drivers: hv: Change flag to write log level in panic msg to false (bsc#1170617, bsc#1170618).\n- drivers: soc: ti: knav_qmss_queue: Make knav_gp_range_ops static (bsc#1051510).\n- drm: amd/display: fix Kconfig help text (bsc#1113956) \t* only fix DEBUG_KERNEL_DC\n- drm: bridge: adv7511: Extend list of audio sample rates (bsc#1111666).\n- drm/dp_mst: Increase ACT retry timeout to 3s (bsc#1113956) * context changes\n- drm: encoder_slave: fix refcouting error for modules (bsc#1111666).\n- drm: encoder_slave: fix refcouting error for modules (bsc#1114279)\n- drm/i915/icl+: Fix hotplug interrupt disabling after storm detection (bsc#1112178)\n- drm/i915: Whitelist context-local timestamp in the gen9 cmdparser (bsc#1111666).\n- drm/mediatek: Check plane visibility in atomic_update (bsc#1113956) * context changes\n- drm/msm/dpu: fix error return code in dpu_encoder_init (bsc#1111666).\n- drm: panel-orientation-quirks: Add quirk for Asus T101HA panel (bsc#1111666).\n- drm: panel-orientation-quirks: Use generic orientation-data for Acer S1003 (bsc#1111666).\n- drm/qxl: Use correct notify port address when creating cursor ring (bsc#1113956)\n- drm/radeon: fix double free (bsc#1113956)\n- drm/radeon: fix fb_div check in ni_init_smc_spll_table() (bsc#1113956)\n- drm/sun4i: hdmi ddc clk: Fix size of m divider (bsc#1111666).\n- drm/tegra: hub: Do not enable orphaned window group (bsc#1111666).\n- drm/vkms: Hold gem object while still in-use (bsc#1113956) * context changes\n- e1000: Distribute switch variables for initialization (bsc#1111666).\n- e1000e: Disable TSO for buffer overrun workaround (bsc#1051510).\n- e1000e: Do not wake up the system via WOL if device wakeup is disabled (bsc#1051510).\n- e1000e: Relax condition to trigger reset for ME workaround (bsc#1111666).\n- EDAC/amd64: Read back the scrub rate PCI register on F15h (bsc#1114279).\n- efi/memreserve: deal with memreserve entries in unmapped memory (bsc#1174685).\n- efi/random: Increase size of firmware supplied randomness (jsc#SLE-12423).\n- efi/random: Treat EFI_RNG_PROTOCOL output as bootloader randomness (jsc#SLE-12423).\n- efi: READ_ONCE rng seed size before munmap (jsc#SLE-12423).\n- efi: Reorder pr_notice() with add_device_randomness() call (jsc#SLE-12423).\n- evm: Check also if *tfm is an error pointer in init_desc() (bsc#1051510).\n- evm: Fix a small race in init_desc() (bsc#1051510).\n- ext4: fix a data race at inode-\u003ei_blocks (bsc#1171835).\n- ext4: fix EXT_MAX_EXTENT/INDEX to check for zeroed eh_max (bsc#1174840).\n- ext4: fix partial cluster initialization when splitting extent (bsc#1173839).\n- ext4: fix race between ext4_sync_parent() and rename() (bsc#1173838).\n- ext4, jbd2: ensure panic by fix a race between jbd2 abort and ext4 error handlers (bsc#1173833).\n- extcon: adc-jack: Fix an error handling path in \u0027adc_jack_probe()\u0027 (bsc#1051510).\n- fanotify: fix ignore mask logic for events on child and on dir (bsc#1172719).\n- fat: do not allow to mount if the FAT length == 0 (bsc#1174845).\n- fdt: add support for rng-seed (jsc#SLE-12423).\n- fdt: Update CRC check for rng-seed (jsc#SLE-12423).\n- firmware: imx: scu: Fix corruption of header (git-fixes).\n- firmware: imx: scu: Fix possible memory leak in imx_scu_probe() (bsc#1111666).\n- fix multiplication overflow in copy_fdtable() (bsc#1173825).\n- Fix Patch-mainline tag in the previous zram fix patch\n- fpga: dfl: fix bug in port reset handshake (git-fixes).\n- fq_codel: fix TCA_FQ_CODEL_DROP_BATCH_SIZE sanity checks (networking-stable-20_05_12).\n- gpiolib: Document that GPIO line names are not globally unique (bsc#1051510).\n- gpu: host1x: Detach driver on unregister (bsc#1111666).\n- gpu: ipu-v3: pre: do not trigger update if buffer address does not change (bsc#1111666).\n- HID: hiddev: fix mess in hiddev_open() (git-fixes).\n- HID: magicmouse: do not set up autorepeat (git-fixes).\n- HID: sony: Fix for broken buttons on DS3 USB dongles (bsc#1051510).\n- HISI LPC: Re-Add ACPI child enumeration support (bsc#1174658).\n- HISI LPC: Stop using MFD APIs (bsc#1174658).\n- hv_netvsc: Fix netvsc_start_xmit\u0027s return type (git-fixes).\n- hwmon: (acpi_power_meter) Fix potential memory leak in acpi_power_meter_add() (bsc#1111666).\n- hwmon: (emc2103) fix unable to change fan pwm1_enable attribute (bsc#1111666).\n- hwmon: (max6697) Make sure the OVERT mask is set correctly (bsc#1111666).\n- i2c: algo-pca: Add 0x78 as SCL stuck low status for PCA9665 (bsc#1111666).\n- i2c: eg20t: Load module automatically if ID matches (bsc#1111666).\n- i2c: mlxcpld: check correct size of maximum RECV_LEN packet (bsc#1111666).\n- i40e: reduce stack usage in i40e_set_fc (git-fixes).\n- IB/hfi1: Do not destroy hfi1_wq when the device is shut down (bsc#1174409).\n- IB/hfi1: Do not destroy link_wq when the device is shut down (bsc#1174409).\n- ibmveth: Fix max MTU limit (bsc#1173428 ltc#186397).\n- ibmvnic: continue to init in CRQ reset returns H_CLOSED (bsc#1173280 ltc#185369).\n- ibmvnic: Flush existing work items before device removal (bsc#1065729).\n- ibmvnic: Harden device login requests (bsc#1170011 ltc#183538).\n- iio: buffer: Do not allow buffers without any channels enabled to be activated (bsc#1051510).\n- iio:health:afe4404 Fix timestamp alignment and prevent data leak (bsc#1111666).\n- iio:humidity:hdc100x Fix alignment and data leak issues (bsc#1111666).\n- iio:magnetometer:ak8974: Fix alignment and data leak issues (bsc#1111666).\n- iio: mma8452: Add missed iio_device_unregister() call in mma8452_probe() (bsc#1111666).\n- iio: pressure: bmp280: Tolerate IRQ before registering (bsc#1051510).\n- iio:pressure:ms5611 Fix buffer element alignment (bsc#1111666).\n- iio: pressure: zpa2326: handle pm_runtime_get_sync failure (bsc#1111666).\n- ima: Directly assign the ima_default_policy pointer to ima_rules (bsc#1051510).\n- ima: Fix ima digest hash table key calculation (bsc#1051510).\n- include/asm-generic/topology.h: guard cpumask_of_node() macro argument (bsc#1148868).\n- input: i8042 - add Lenovo XiaoXin Air 12 to i8042 nomux list (bsc#1111666).\n- input: i8042 - Remove special PowerPC handling (git-fixes).\n- input: synaptics - add a second working PNP_ID for Lenovo T470s (bsc#1111666).\n- intel_idle: Graceful probe failure when MWAIT is disabled (bsc#1174115).\n- intel_th: Fix a NULL dereference when hub driver is not loaded (bsc#1111666).\n- io-mapping: indicate mapping failure (git-fixes).\n- ipvlan: call dev_change_flags when ipvlan mode is reset (git-fixes).\n- ixgbevf: Remove limit of 10 entries for unicast filter list (git-fixes).\n- jbd2: avoid leaking transaction credits when unreserving handle (bsc#1173845).\n- jbd2: Preserve kABI when adding j_abort_mutex (bsc#1173833).\n- kabi: hv: prevent struct device_node to become defined (bsc#1172871).\n- kabi: ppc64le: prevent struct dma_map_ops to become defined (jsc#SLE-12423).\n- kABI: protect struct mlx5_cmd_work_ent (kabi).\n- kABI: reintroduce inet_hashtables.h include to l2tp_ip (kabi).\n- kernfs: fix barrier usage in __kernfs_new_node() (bsc#1111666).\n- kvm: nVMX: Do not reread VMCS-agnostic state when switching VMCS (bsc#1114279).\n- kvm: nVMX: Skip IBPB when switching between vmcs01 and vmcs02 (bsc#1114279).\n- kvm: x86: Fix APIC page invalidation race (bsc#1174122).\n- kvm: x86: Fix L1TF mitigation for shadow MMU (bsc#1171904).\n- kvm: x86/mmu: Set mmio_value to \u00270\u0027 if reserved #PF can\u0027t be generated (bsc#1171904).\n- kvm: x86: only do L1TF workaround on affected processors (bsc#1171904).\n- l2tp: add sk_family checks to l2tp_validate_socket (networking-stable-20_06_07).\n- l2tp: do not use inet_hash()/inet_unhash() (networking-stable-20_06_07).\n- libceph: do not omit recovery_deletes in target_copy() (bsc#1174113).\n- libceph: ignore pool overlay and cache logic on redirects (bsc#1173146).\n- lib: logic_pio: Add logic_pio_unregister_range() (bsc#1174658).\n- lib: logic_pio: Avoid possible overlap for unregistering regions (bsc#1174658).\n- lib: logic_pio: Fix RCU usage (bsc#1174658).\n- libnvdimm/bus: Fix wait_nvdimm_bus_probe_idle() ABBA deadlock (bsc#1171753).\n- libnvdimm/bus: Prepare the nd_ioctl() path to be re-entrant (bsc#1171753).\n- libnvdimm/bus: Stop holding nvdimm_bus_list_mutex over __nd_ioctl() (bsc#1171753).\n- libnvdimm: cover up changes in struct nvdimm_bus (bsc#1171753).\n- libnvdimm: cover up nd_pfn_sb changes (bsc#1171759).\n- libnvdimm/dax: Pick the right alignment default when creating dax devices (bsc#1171759).\n- libnvdimm/label: Remove the dpa align check (bsc#1171759).\n- libnvdimm/of_pmem: Provide a unique name for bus provider (bsc#1171739).\n- libnvdimm/pfn_dev: Add a build check to make sure we notice when struct page size change (bsc#1171743).\n- libnvdimm/pfn_dev: Add page size and struct page size to pfn superblock (bsc#1171759).\n- libnvdimm/pfn: Prevent raw mode fallback if pfn-infoblock valid (bsc#1171743).\n- libnvdimm/pmem: Advance namespace seed for specific probe errors (bsc#1171743).\n- libnvdimm/region: Initialize bad block for volatile namespaces (bnc#1151927 5.3.6).\n- libnvdimm/region: Rewrite _probe_success() to _advance_seeds() (bsc#1171743).\n- libnvdimm: Use PAGE_SIZE instead of SZ_4K for align check (bsc#1171759).\n- livepatch: Apply vmlinux-specific KLP relocations early (bsc#1071995).\n- livepatch: Disallow vmlinux.ko (bsc#1071995).\n- livepatch: Make klp_apply_object_relocs static (bsc#1071995).\n- livepatch: Prevent module-specific KLP rela sections from referencing vmlinux symbols (bsc#1071995).\n- livepatch: Remove .klp.arch (bsc#1071995).\n- loop: replace kill_bdev with invalidate_bdev (bsc#1173820).\n- lpfc_debugfs: get rid of pointless access_ok() (bsc#1172687 bsc#1171530).\n- lpfc: Synchronize NVME transport and lpfc driver devloss_tmo (bcs#1173060).\n- mac80211: add option for setting control flags (bsc#1111666).\n- mac80211: set IEEE80211_TX_CTRL_PORT_CTRL_PROTO for nl80211 TX (bsc#1111666).\n- mailbox: imx: Disable the clock on devm_mbox_controller_register() failure (git-fixes).\n- md: Avoid namespace collision with bitmap API (git fixes (block drivers)).\n- mdraid: fix read/write bytes accounting (bsc#1172537).\n- md: use memalloc scope APIs in mddev_suspend()/mddev_resume() (bsc#1166985)).\n- media: cec: silence shift wrapping warning in __cec_s_log_addrs() (git-fixes).\n- media: si2157: Better check for running tuner in init (bsc#1111666).\n- mlxsw: core: Do not use WQ_MEM_RECLAIM for mlxsw ordered workqueue (git-fixes).\n- mlxsw: core: Do not use WQ_MEM_RECLAIM for mlxsw workqueue (git-fixes).\n- mlxsw: pci: Return error on PCI reset timeout (git-fixes).\n- mlxsw: spectrum_acl_tcam: Position vchunk in a vregion list properly (networking-stable-20_05_12).\n- mlxsw: spectrum: Disallow prio-tagged packets when PVID is removed (git-fixes).\n- mlxsw: spectrum_dpipe: Add missing error path (git-fixes).\n- mlxsw: spectrum: Prevent force of 56G (git-fixes).\n- mlxsw: spectrum_router: Refresh nexthop neighbour when it becomes dead (git-fixes).\n- mlxsw: spectrum_router: Remove inappropriate usage of WARN_ON() (git-fixes).\n- mlxsw: spectrum_switchdev: Add MDB entries in prepare phase (git-fixes).\n- mlxsw: spectrum_switchdev: Do not treat static FDB entries as sticky (git-fixes).\n- mmc: block: Fix request completion in the CQE timeout path (bsc#1111666).\n- mmc: block: Fix use-after-free issue for rpmb (bsc#1111666).\n- mmc: fix compilation of user API (bsc#1051510).\n- mmc: sdhci: do not enable card detect interrupt for gpio cd type (bsc#1111666).\n- mmc: sdhci-msm: Set SDHCI_QUIRK_MULTIBLOCK_READ_ACMD12 quirk (bsc#1111666).\n- Move kabi patch into the right place\n- Move upstreamed lpfc patches into sorted section\n- mvpp2: remove misleading comment (git-fixes).\n- net: be more gentle about silly gso requests coming from user (networking-stable-20_06_07).\n- net: check untrusted gso_size at kernel entry (networking-stable-20_06_07).\n- net/cxgb4: Check the return from t4_query_params properly (git-fixes).\n- net: dsa: bcm_sf2: Fix node reference count (git-fixes).\n- net: dsa: loop: Add module soft dependency (networking-stable-20_05_16).\n- net: dsa: mt7530: fix roaming from DSA user ports (networking-stable-20_05_27).\n- net: ena: add intr_moder_rx_interval to struct ena_com_dev and use it (git-fixes).\n- net: ena: add missing ethtool TX timestamping indication (git-fixes).\n- net: ena: avoid memory access violation by validating req_id properly (git-fixes).\n- net: ena: do not wake up tx queue when down (git-fixes).\n- net: ena: ena-com.c: prevent NULL pointer dereference (git-fixes).\n- net: ena: ethtool: use correct value for crc32 hash (git-fixes).\n- net: ena: fix continuous keep-alive resets (git-fixes).\n- net: ena: fix corruption of dev_idx_to_host_tbl (git-fixes).\n- net: ena: fix default tx interrupt moderation interval (git-fixes).\n- net: ena: fix incorrect default RSS key (git-fixes).\n- net: ena: fix incorrectly saving queue numbers when setting RSS indirection table (git-fixes).\n- net: ena: fix issues in setting interrupt moderation params in ethtool (git-fixes).\n- net: ena: fix potential crash when rxfh key is NULL (git-fixes).\n- net: ena: fix retrieval of nonadaptive interrupt moderation intervals (git-fixes).\n- net: ena: fix uses of round_jiffies() (git-fixes).\n- net: ena: make ena rxfh support ETH_RSS_HASH_NO_CHANGE (git-fixes).\n- net: ena: reimplement set/get_coalesce() (git-fixes).\n- net: ena: rss: do not allocate key when not supported (git-fixes).\n- net: ena: rss: fix failure to get indirection table (git-fixes).\n- net: ena: rss: store hash function as values and not bits (git-fixes).\n- netfilter: connlabels: prefer static lock initialiser (git-fixes).\n- netfilter: ctnetlink: netns exit must wait for callbacks (bsc#1169795).\n- netfilter: not mark a spinlock as __read_mostly (git-fixes).\n- net: fix a potential recursive NETDEV_FEAT_CHANGE (networking-stable-20_05_16).\n- net: hns3: add autoneg and change speed support for fibre port (bsc#1174070).\n- net: hns3: add support for FEC encoding control (bsc#1174070).\n- net: hns3: add support for multiple media type (bsc#1174070).\n- net: hns3: fix a not link up issue when fibre port supports autoneg (bsc#1174070).\n- net: hns3: fix for FEC configuration (bsc#1174070).\n- net: hns3: fix port capbility updating issue (bsc#1174070).\n- net: hns3: fix port setting handle for fibre port (bsc#1174070).\n- net: hns3: fix selftest fail issue for fibre port with autoneg on (bsc#1174070).\n- net: hns3: restore the MAC autoneg state after reset (bsc#1174070).\n- net: inet_csk: Fix so_reuseport bind-address cache in tb-\u003efast* (networking-stable-20_05_27).\n- net: ipip: fix wrong address family in init error path (networking-stable-20_05_27).\n- net: ipvlan: Fix ipvlan device tso disabled while NETIF_F_IP_CSUM is set (git-fixes).\n- net: macsec: preserve ingress frame ordering (networking-stable-20_05_12).\n- net/mlx4_core: drop useless LIST_HEAD (git-fixes).\n- net/mlx4_core: fix a memory leak bug (git-fixes).\n- net/mlx4_core: Fix use of ENOSPC around mlx4_counter_alloc() (networking-stable-20_05_12).\n- net/mlx5: Add command entry handling completion (networking-stable-20_05_27).\n- net/mlx5: Avoid panic when setting vport rate (git-fixes).\n- net/mlx5: Continue driver initialization despite debugfs failure (git-fixes).\n- net/mlx5e: ethtool, Fix a typo in WOL function names (git-fixes).\n- net/mlx5e: Fix traffic duplication in ethtool steering (git-fixes).\n- net/mlx5e: Remove unnecessary clear_bit()s (git-fixes).\n- net/mlx5e: Update netdev txq on completions during closure (networking-stable-20_05_27).\n- net/mlx5: Fix command entry leak in Internal Error State (networking-stable-20_05_12).\n- net/mlx5: Fix crash upon suspend/resume (networking-stable-20_06_07).\n- net/mlx5: Fix forced completion access non initialized command entry (networking-stable-20_05_12).\n- net: mvmdio: allow up to four clocks to be specified for orion-mdio (git-fixes).\n- net: mvpp2: prs: Do not override the sign bit in SRAM parser shift (git-fixes).\n- net: phy: fix aneg restart in phy_ethtool_set_eee (networking-stable-20_05_16).\n- netprio_cgroup: Fix unlimited memory leak of v2 cgroups (networking-stable-20_05_16).\n- net: qede: stop adding events on an already destroyed workqueue (git-fixes).\n- net: qed: fix excessive QM ILT lines consumption (git-fixes).\n- net: qed: fix NVMe login fails over VFs (git-fixes).\n- net: qrtr: Fix passing invalid reference to qrtr_local_enqueue() (networking-stable-20_05_27).\n- net: revert \u0027net: get rid of an signed integer overflow in ip_idents_reserve()\u0027 (networking-stable-20_05_27).\n- net sched: fix reporting the first-time use timestamp (networking-stable-20_05_27).\n- net: stricter validation of untrusted gso packets (networking-stable-20_05_12).\n- net/tls: Fix sk_psock refcnt leak in bpf_exec_tx_verdict() (networking-stable-20_05_12).\n- net/tls: Fix sk_psock refcnt leak when in tls_data_ready() (networking-stable-20_05_12).\n- net: usb: qmi_wwan: add support for DW5816e (networking-stable-20_05_12).\n- net: usb: qmi_wwan: add Telit 0x1050 composition (networking-stable-20_06_07).\n- net: usb: qmi_wwan: add Telit LE910C1-EUX composition (networking-stable-20_06_07).\n- net: vmxnet3: fix possible buffer overflow caused by bad DMA value in vmxnet3_get_rss() (bsc#1172484).\n- nfp: bpf: fix code-gen bug on BPF_ALU | BPF_XOR | BPF_K (git-fixes).\n- NFS: Fix an RCU lock leak in nfs4_refresh_delegation_stateid() (bsc#1170592).\n- NFSv4: Retry CLOSE and DELEGRETURN on NFS4ERR_OLD_STATEID (bsc#1170592).\n- nilfs2: fix null pointer dereference at nilfs_segctor_do_construct() (bsc#1173857).\n- nl80211: fix NL80211_ATTR_CHANNEL_WIDTH attribute type (bsc#1111666).\n- nvdimm: Avoid race between probe and reading device attributes (bsc#1170442).\n- nvme: check for NVME_CTRL_LIVE in nvme_report_ns_ids() (bcs#1171558 bsc#1159058).\n- nvme: do not update multipath disk information if the controller is down (bcs#1171558 bsc#1159058).\n- nvme: fail cancelled commands with NVME_SC_HOST_PATH_ERROR (bsc#1158983 bsc#1172538).\n- nvme-fc: Fail transport errors with NVME_SC_HOST_PATH (bsc#1158983 bsc#1172538).\n- nvme-tcp: fail command with NVME_SC_HOST_PATH_ERROR send failed (bsc#1158983 bsc#1172538).\n- objtool: Clean instruction state before each function validation (bsc#1169514).\n- objtool: Ignore empty alternatives (bsc#1169514).\n- ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).\n- ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).\n- ocfs2: load global_inode_alloc (bsc#1172963).\n- ocfs2: no need try to truncate file beyond i_size (bsc#1171841).\n- overflow: Fix -Wtype-limits compilation warnings (git fixes).\n- overflow.h: Add arithmetic shift helper (git fixes).\n- p54usb: add AirVasT USB stick device-id (bsc#1051510).\n- padata: ensure the reorder timer callback runs on the correct CPU (git-fixes).\n- padata: reorder work kABI fixup (git-fixes).\n- PCI/AER: Remove HEST/FIRMWARE_FIRST parsing for AER ownership (bsc#1174356).\n- PCI/AER: Use only _OSC to determine AER ownership (bsc#1174356).\n- PCI: Allow pci_resize_resource() for devices on root bus (bsc#1051510).\n- PCI: Fix pci_register_host_bridge() device_register() error handling (bsc#1051510).\n- PCI: Fix \u0027try\u0027 semantics of bus and slot reset (git-fixes).\n- PCI: Generalize multi-function power dependency device links (bsc#1111666).\n- PCI: hv: Change pci_protocol_version to per-hbus (bsc#1172871, bsc#1172872).\n- PCI: hv: Fix the PCI HyperV probe failure path to release resource properly (bsc#1172871, bsc#1172872).\n- PCI: hv: Introduce hv_msi_entry (bsc#1172871, bsc#1172872).\n- PCI: hv: Move hypercall related definitions into tlfs header (bsc#1172871, bsc#1172872).\n- PCI: hv: Move retarget related structures into tlfs header (bsc#1172871, bsc#1172872).\n- PCI: hv: Reorganize the code in preparation of hibernation (bsc#1172871, bsc#1172872).\n- PCI: hv: Retry PCI bus D0 entry on invalid device state (bsc#1172871, bsc#1172872).\n- PCI: pciehp: Fix indefinite wait on sysfs requests (git-fixes).\n- PCI: pciehp: Support interrupts sent from D3hot (git-fixes).\n- PCI: Program MPS for RCiEP devices (bsc#1051510).\n- PCI/PTM: Inherit Switch Downstream Port PTM settings from Upstream Port (bsc#1051510).\n- pci: Revive pci_dev __aer_firmware_first* fields for kABI (bsc#1174356).\n- pcm_native: result of put_user() needs to be checked (bsc#1111666).\n- perf/x86/amd: Constrain Large Increment per Cycle events (git-fixes).\n- perf/x86/amd/ibs: Fix reading of the IBS OpData register and thus precise RIP validity (git-fixes).\n- perf/x86/amd/ibs: Fix sample bias for dispatched micro-ops (git-fixes).\n- perf/x86/amd/ibs: Handle erratum #420 only on the affected CPU family (10h) (git-fixes).\n- perf/x86/amd/iommu: Make the \u0027amd_iommu_attr_groups\u0027 symbol static (git-fixes).\n- perf/x86/amd/uncore: Do not set \u0027ThreadMask\u0027 and \u0027SliceMask\u0027 for non-L3 PMCs (git-fixes stable).\n- perf/x86/amd/uncore: Set the thread mask for F17h L3 PMCs (git-fixes).\n- perf/x86/amd/uncore: Set ThreadMask and SliceMask for L3 Cache perf events (git-fixes stable).\n- perf/x86: Enable free running PEBS for REGS_USER/INTR (git-fixes).\n- perf/x86: Fix incorrect PEBS_REGS (git-fixes).\n- perf/x86/intel: Add generic branch tracing check to intel_pmu_has_bts() (git-fixes).\n- perf/x86/intel: Add proper condition to run sched_task callbacks (git-fixes).\n- perf/x86/intel/bts: Fix the use of page_private() (git-fixes).\n- perf/x86/intel: Fix PT PMI handling (git-fixes).\n- perf/x86/intel: Move branch tracing setup to the Intel-specific source file (git-fixes).\n- perf/x86/intel/uncore: Add Node ID mask (git-fixes).\n- perf/x86/intel/uncore: Fix PCI BDF address of M3UPI on SKX (git-fixes).\n- perf/x86/intel/uncore: Handle invalid event coding for free-running counter (git-fixes).\n- perf/x86/uncore: Fix event group support (git-fixes).\n- pid: Improve the comment about waiting in zap_pid_ns_processes (git fixes)).\n- pinctrl: freescale: imx: Fix an error handling path in \u0027imx_pinctrl_probe()\u0027 (bsc#1051510).\n- pinctrl: imxl: Fix an error handling path in \u0027imx1_pinctrl_core_probe()\u0027 (bsc#1051510).\n- pinctrl: samsung: Save/restore eint_mask over suspend for EINT_TYPE GPIOs (bsc#1051510).\n- platform/x86: dell-laptop: do not register micmute LED if there is no token (bsc#1111666).\n- platform/x86: hp-wmi: Convert simple_strtoul() to kstrtou32() (bsc#1111666).\n- PM / Domains: Allow genpd users to specify default active wakeup behavior (git-fixes).\n- pnp: Use list_for_each_entry() instead of open coding (git fixes).\n- powerpc/64s: Do not let DT CPU features set FSCR_DSCR (bsc#1065729).\n- powerpc/64s: Save FSCR to init_task.thread.fscr after feature init (bsc#1065729).\n- powerpc/book3s64: Export has_transparent_hugepage() related functions (bsc#1171759).\n- powerpc/book3s64/pkeys: Fix pkey_access_permitted() for execute disable pkey (bsc#1065729).\n- powerpc/fadump: fix race between pstore write and fadump crash trigger (bsc#1168959 ltc#185010).\n- powerpc-mm-Remove-kvm-radix-prefetch-workaround-for-.patch\n- powerpc/xive: Clear the page tables for the ESB IO mapping (bsc#1085030).\n- powerpc-xmon-don-t-access-ASDR-in-VMs.patch\n- powerpc/xmon: Reset RCU and soft lockup watchdogs (bsc#1065729).\n- power: supply: bq24257_charger: Replace depends on REGMAP_I2C with select (bsc#1051510).\n- power: supply: lp8788: Fix an error handling path in \u0027lp8788_charger_probe()\u0027 (bsc#1051510).\n- power: supply: smb347-charger: IRQSTAT_D is volatile (bsc#1051510).\n- power: vexpress: add suppress_bind_attrs to true (bsc#1111666).\n- pppoe: only process PADT targeted at local interfaces (networking-stable-20_05_16).\n- propagate_one(): mnt_set_mountpoint() needs mount_lock (bsc#1174841).\n- qed: reduce maximum stack frame size (git-fixes).\n- qlcnic: fix missing release in qlcnic_83xx_interrupt_test (git-fixes).\n- r8152: support additional Microsoft Surface Ethernet Adapter variant (networking-stable-20_05_27).\n- raid5: remove gfp flags from scribble_alloc() (bsc#1166985).\n- RDMA/efa: Fix setting of wrong bit in get/set_feature commands (bsc#1111666)\n- RDMA/efa: Set maximum pkeys device attribute (bsc#1111666)\n- RDMA/efa: Support remote read access in MR registration (bsc#1111666)\n- RDMA/efa: Unified getters/setters for device structs bitmask access (bsc#1111666)\n- README.BRANCH: Add Takashi Iwai as primary maintainer.\n- regmap: debugfs: Do not sleep while atomic for fast_io regmaps (bsc#1111666).\n- Revert \u0027bcache: ignore pending signals when creating gc and allocator thread\u0027 (git fixes (block drivers)).\n- Revert commit e918e570415c (\u0027tpm_tis: Remove the HID IFX0102\u0027) (bsc#1111666).\n- Revert \u0027dm crypt: use WQ_HIGHPRI for the IO and crypt workqueues\u0027 (git fixes (block drivers)).\n- Revert \u0027ipv6: add mtu lock check in __ip6_rt_update_pmtu\u0027 (networking-stable-20_05_16).\n- Revert pciehp patches that broke booting (bsc#1174887)\n- Revert \u0027thermal: mediatek: fix register index error\u0027 (bsc#1111666).\n- Revert \u0027tools lib traceevent: Remove unneeded qsort and uses memmove\u0027\n- rtnetlink: Fix memory(net_device) leak when -\u003enewlink fails (git-fixes).\n- s390/bpf: Maintain 8-byte stack alignment (bsc#1169194).\n- s390: fix syscall_get_error for compat processes (git-fixes).\n- s390/qdio: consistently restore the IRQ handler (git-fixes).\n- s390/qdio: lock device while installing IRQ handler (git-fixes).\n- s390/qdio: put thinint indicator after early error (git-fixes).\n- s390/qdio: tear down thinint indicator after early error (git-fixes).\n- s390/qeth: fix error handling for isolation mode cmds (git-fixes).\n- sch_choke: avoid potential panic in choke_reset() (networking-stable-20_05_12).\n- sch_sfq: validate silly quantum values (networking-stable-20_05_12).\n- scripts/git_sort/git_sort.py: add bluetooth/bluetooth-next.git repository\n- scsi: aacraid: fix a signedness bug (bsc#1174296).\n- scsi: hisi_sas: fix calls to dma_set_mask_and_coherent() (bsc#1174296).\n- scsi: ibmvscsi: Do not send host info in adapter info MAD after LPM (bsc#1172759 ltc#184814).\n- scsi: lpfc: Add an internal trace log buffer (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Add blk_io_poll support for latency improvment (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Add support to display if adapter dumps are available (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Allow applications to issue Common Set Features mailbox command (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Avoid another null dereference in lpfc_sli4_hba_unset() (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix inconsistent indenting (bsc#1158983).\n- scsi: lpfc: Fix interrupt assignments when multiple vectors are supported on same CPU (bsc#1158983).\n- scsi: lpfc: Fix kdump hang on PPC (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix language in 0373 message to reflect non-error message (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix less-than-zero comparison of unsigned value (bsc#1158983).\n- scsi: lpfc: Fix missing MDS functionality (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix NVMe rport deregister and registration during ADISC (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix oops due to overrun when reading SLI3 data (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix shost refcount mismatch when deleting vport (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix stack trace seen while setting rrq active (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix unused assignment in lpfc_sli4_bsg_link_diag_test (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Update lpfc version to 12.8.0.2 (bsc#1158983).\n- scsi: megaraid_sas: Fix a compilation warning (bsc#1174296).\n- scsi: mpt3sas: Fix double free in attach error handling (bsc#1174296).\n- scsi: qedf: Add port_id getter (bsc#1150660).\n- scsi: qla2xxx: Fix a condition in qla2x00_find_all_fabric_devs() (bsc#1174296).\n- scsi: qla2xxx: Set NVMe status code for failed NVMe FCP request (bsc#1158983).\n- sctp: Do not add the shutdown timer if its already been added (networking-stable-20_05_27).\n- sctp: Start shutdown on association restart if in SHUTDOWN-SENT state and socket is closed (networking-stable-20_05_27).\n- spi: dw: use \u0027smp_mb()\u0027 to avoid sending spi data error (bsc#1051510).\n- spi: fix initial SPI_SR value in spi-fsl-dspi (bsc#1111666).\n- spi: pxa2xx: Apply CS clk quirk to BXT (bsc#1111666).\n- spi: spidev: fix a race between spidev_release and spidev_remove (bsc#1111666).\n- spi: spi-mem: Fix Dual/Quad modes on Octal-capable devices (bsc#1111666).\n- spi: spi-sun6i: sun6i_spi_transfer_one(): fix setting of clock rate (bsc#1111666).\n- staging: comedi: verify array index is correct before using it (bsc#1111666).\n- staging: rtl8712: Fix IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK (bsc#1051510).\n- staging: sm750fb: add missing case while setting FB_VISUAL (bsc#1051510).\n- SUNRPC: The TCP back channel mustn\u0027t disappear while requests are outstanding (bsc#1152624).\n- tg3: driver sleeps indefinitely when EEH errors exceed eeh_max_freezes (bsc#1173284).\n- timers: Add a function to start/reduce a timer (networking-stable-20_05_27).\n- tpm_tis: extra chip-\u003eops check on error path in tpm_tis_core_init (bsc#1111666).\n- tpm_tis: Remove the HID IFX0102 (bsc#1111666).\n- tracing: Fix event trigger to accept redundant spaces (git-fixes).\n- tty: hvc_console, fix crashes on parallel open/close (git-fixes).\n- tty: n_gsm: Fix bogus i++ in gsm_data_kick (bsc#1051510).\n- tty: n_gsm: Fix SOF skipping (bsc#1051510).\n- tty: n_gsm: Fix waking up upper tty layer when room available (bsc#1051510).\n- tunnel: Propagate ECT(1) when decapsulating as recommended by RFC6040 (networking-stable-20_05_12).\n- ubifs: remove broken lazytime support (bsc#1173826).\n- usb: add USB_QUIRK_DELAY_INIT for Logitech C922 (git-fixes).\n- usb: c67x00: fix use after free in c67x00_giveback_urb (bsc#1111666).\n- usb: chipidea: core: add wakeup support for extcon (bsc#1111666).\n- usb: dwc2: Fix shutdown callback in platform (bsc#1111666).\n- usb: dwc2: gadget: move gadget resume after the core is in L0 state (bsc#1051510).\n- usb: dwc3: gadget: introduce cancelled_list (git-fixes).\n- usb: dwc3: gadget: never call -\u003ecomplete() from -\u003eep_queue() (git-fixes).\n- usb: dwc3: gadget: Properly handle ClearFeature(halt) (git-fixes).\n- usb: dwc3: gadget: Properly handle failed kick_transfer (git-fixes).\n- usb: ehci: reopen solution for Synopsys HC bug (git-fixes).\n- usb: gadget: fix potential double-free in m66592_probe (bsc#1111666).\n- usb: gadget: lpc32xx_udc: do not dereference ep pointer before null check (bsc#1051510).\n- usb: gadget: udc: atmel: fix uninitialized read in debug printk (bsc#1111666).\n- usb: gadget: udc: atmel: remove outdated comment in usba_ep_disable() (bsc#1111666).\n- usb: gadget: udc: Potential Oops in error handling code (bsc#1111666).\n- usb: gadget: udc: s3c2410_udc: Remove pointless NULL check in s3c2410_udc_nuke (bsc#1051510).\n- usb: host: ehci-exynos: Fix error check in exynos_ehci_probe() (bsc#1111666).\n- usb: host: ehci-mxc: Add error handling in ehci_mxc_drv_probe() (bsc#1051510).\n- usb: musb: Fix runtime PM imbalance on error (bsc#1051510).\n- usb: musb: start session in resume for host port (bsc#1051510).\n- usbnet: smsc95xx: Fix use-after-free after removal (bsc#1111666).\n- usb: ohci-sm501: Add missed iounmap() in remove (bsc#1111666).\n- usb: serial: ch341: add new Product ID for CH340 (bsc#1111666).\n- usb: serial: cypress_m8: enable Simply Automated UPB PIM (bsc#1111666).\n- usb: serial: iuu_phoenix: fix memory corruption (bsc#1111666).\n- usb: serial: option: add GosunCn GM500 series (bsc#1111666).\n- usb: serial: option: add Quectel EG95 LTE modem (bsc#1111666).\n- usb: serial: option: add Telit LE910C1-EUX compositions (bsc#1051510).\n- usb: serial: qcserial: add DW5816e QDL support (bsc#1051510).\n- usb: serial: usb_wwan: do not resubmit rx urb on fatal errors (bsc#1051510).\n- usb: serial: usb_wwan: do not resubmit rx urb on fatal errors (git-fixes).\n- vfio/pci: Fix SR-IOV VF handling with MMIO blocking (bsc#1174123).\n- vfs: Fix EOVERFLOW testing in put_compat_statfs64 (bnc#1151927 5.3.6).\n- virtio-blk: handle block_device_operations callbacks after hot unplug (git fixes (block drivers)).\n- virtio: virtio_console: add missing MODULE_DEVICE_TABLE() for rproc serial (git-fixes).\n- vmxnet3: add geneve and vxlan tunnel offload support (bsc#1172484).\n- vmxnet3: add support to get/set rx flow hash (bsc#1172484).\n- vmxnet3: allow rx flow hash ops only when rss is enabled (bsc#1172484).\n- vmxnet3: avoid format strint overflow warning (bsc#1172484).\n- vmxnet3: prepare for version 4 changes (bsc#1172484).\n- vmxnet3: Remove always false conditional statement (bsc#1172484).\n- vmxnet3: remove redundant initialization of pointer \u0027rq\u0027 (bsc#1172484).\n- vmxnet3: remove unused flag \u0027rxcsum\u0027 from struct vmxnet3_adapter (bsc#1172484).\n- vmxnet3: Replace msleep(1) with usleep_range() (bsc#1172484).\n- vmxnet3: update to version 4 (bsc#1172484).\n- vmxnet3: use correct hdr reference when packet is encapsulated (bsc#1172484).\n- vsock: fix timeout in vsock_accept() (networking-stable-20_06_07).\n- vt_compat_ioctl(): clean up, use compat_ptr() properly (git-fixes).\n- vxlan: Avoid infinite loop when suppressing NS messages with invalid options (git-fixes).\n- w1: omap-hdq: cleanup to add missing newline for some dev_dbg (bsc#1051510).\n- watchdog: sp805: fix restart handler (bsc#1111666).\n- wil6210: add general initialization/size checks (bsc#1111666).\n- wil6210: check rx_buff_mgmt before accessing it (bsc#1111666).\n- wil6210: ignore HALP ICR if already handled (bsc#1111666).\n- wil6210: make sure Rx ring sizes are correlated (git-fixes).\n- work around mvfs bug (bsc#1162063).\n- x86/apic: Install an empty physflat_init_apic_ldr (bsc#1163309).\n- x86/cpu/amd: Make erratum #1054 a legacy erratum (bsc#1114279).\n- x86/events/intel/ds: Add PERF_SAMPLE_PERIOD into PEBS_FREERUNNING_FLAGS (git-fixes).\n- x86: Fix early boot crash on gcc-10, third try (bsc#1114279).\n- x86/{mce,mm}: Unmap the entire page if the whole page is affected and poisoned (bsc#1172257).\n- x86/reboot/quirks: Add MacBook6,1 reboot quirk (bsc#1114279).\n- xfrm: fix error in comment (git fixes).\n- xhci: Fix enumeration issue when setting max packet size for FS devices (git-fixes).\n- xhci: Fix incorrect EP_STATE_MASK (git-fixes).\n- vt: vt_ioctl: remove unnecessary console allocation checks (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2020-1153", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_1153-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2020:1153-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TP74A7GFRKHFHFASPUDW72EHCZZEIBB/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2020:1153-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TP74A7GFRKHFHFASPUDW72EHCZZEIBB/" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1085030", "url": "https://bugzilla.suse.com/1085030" }, { "category": "self", "summary": "SUSE Bug 1111666", "url": "https://bugzilla.suse.com/1111666" }, { "category": "self", "summary": "SUSE Bug 1112178", "url": "https://bugzilla.suse.com/1112178" }, { "category": "self", "summary": "SUSE Bug 1113956", "url": "https://bugzilla.suse.com/1113956" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1120163", "url": "https://bugzilla.suse.com/1120163" }, { "category": "self", "summary": "SUSE Bug 1144333", "url": "https://bugzilla.suse.com/1144333" }, { "category": "self", "summary": "SUSE Bug 1148868", "url": "https://bugzilla.suse.com/1148868" }, { "category": "self", "summary": "SUSE Bug 1150660", "url": "https://bugzilla.suse.com/1150660" }, { "category": "self", "summary": "SUSE Bug 1151927", "url": "https://bugzilla.suse.com/1151927" }, { "category": "self", "summary": "SUSE Bug 1152107", "url": "https://bugzilla.suse.com/1152107" }, { "category": "self", "summary": "SUSE Bug 1152624", "url": "https://bugzilla.suse.com/1152624" }, { "category": "self", "summary": "SUSE Bug 1158983", "url": "https://bugzilla.suse.com/1158983" }, { "category": "self", "summary": "SUSE Bug 1159058", "url": "https://bugzilla.suse.com/1159058" }, { "category": "self", "summary": "SUSE Bug 1161016", "url": "https://bugzilla.suse.com/1161016" }, { "category": "self", "summary": "SUSE Bug 1162002", "url": "https://bugzilla.suse.com/1162002" }, { "category": "self", "summary": "SUSE Bug 1162063", "url": "https://bugzilla.suse.com/1162063" }, { "category": "self", "summary": "SUSE Bug 1163309", "url": "https://bugzilla.suse.com/1163309" }, { "category": "self", "summary": "SUSE Bug 1166985", "url": "https://bugzilla.suse.com/1166985" }, { "category": "self", "summary": "SUSE Bug 1167104", "url": "https://bugzilla.suse.com/1167104" }, { "category": "self", "summary": "SUSE Bug 1168081", "url": "https://bugzilla.suse.com/1168081" }, { "category": "self", "summary": "SUSE Bug 1168959", "url": "https://bugzilla.suse.com/1168959" }, { "category": "self", "summary": "SUSE Bug 1169194", "url": "https://bugzilla.suse.com/1169194" }, { "category": "self", "summary": "SUSE Bug 1169514", "url": "https://bugzilla.suse.com/1169514" }, { "category": "self", "summary": "SUSE Bug 1169771", "url": "https://bugzilla.suse.com/1169771" }, { "category": "self", "summary": "SUSE Bug 1169795", "url": "https://bugzilla.suse.com/1169795" }, { "category": "self", "summary": "SUSE Bug 1170011", "url": "https://bugzilla.suse.com/1170011" }, { "category": "self", "summary": "SUSE Bug 1170442", "url": "https://bugzilla.suse.com/1170442" }, { "category": "self", "summary": "SUSE Bug 1170592", "url": "https://bugzilla.suse.com/1170592" }, { "category": "self", "summary": "SUSE Bug 1170617", "url": "https://bugzilla.suse.com/1170617" }, { "category": "self", "summary": "SUSE Bug 1170618", "url": "https://bugzilla.suse.com/1170618" }, { "category": "self", "summary": "SUSE Bug 1171124", "url": "https://bugzilla.suse.com/1171124" }, { "category": "self", "summary": "SUSE Bug 1171424", "url": "https://bugzilla.suse.com/1171424" }, { "category": "self", "summary": "SUSE Bug 1171529", "url": "https://bugzilla.suse.com/1171529" }, { "category": "self", "summary": "SUSE Bug 1171530", "url": "https://bugzilla.suse.com/1171530" }, { "category": "self", "summary": "SUSE Bug 1171558", "url": "https://bugzilla.suse.com/1171558" }, { "category": "self", "summary": "SUSE Bug 1171732", "url": "https://bugzilla.suse.com/1171732" }, { "category": "self", "summary": "SUSE Bug 1171739", "url": "https://bugzilla.suse.com/1171739" }, { "category": "self", "summary": "SUSE Bug 1171743", "url": "https://bugzilla.suse.com/1171743" }, { "category": "self", "summary": "SUSE Bug 1171753", "url": "https://bugzilla.suse.com/1171753" }, { "category": "self", "summary": "SUSE Bug 1171759", "url": "https://bugzilla.suse.com/1171759" }, { "category": "self", "summary": "SUSE Bug 1171835", "url": "https://bugzilla.suse.com/1171835" }, { "category": "self", "summary": "SUSE Bug 1171841", "url": "https://bugzilla.suse.com/1171841" }, { "category": "self", "summary": "SUSE Bug 1171868", "url": "https://bugzilla.suse.com/1171868" }, { "category": "self", "summary": "SUSE Bug 1171904", "url": "https://bugzilla.suse.com/1171904" }, { "category": "self", "summary": "SUSE Bug 1171988", "url": "https://bugzilla.suse.com/1171988" }, { "category": "self", "summary": "SUSE Bug 1172247", "url": "https://bugzilla.suse.com/1172247" }, { "category": "self", "summary": "SUSE Bug 1172257", "url": "https://bugzilla.suse.com/1172257" }, { "category": "self", "summary": "SUSE Bug 1172344", "url": "https://bugzilla.suse.com/1172344" }, { "category": "self", "summary": "SUSE Bug 1172458", "url": "https://bugzilla.suse.com/1172458" }, { "category": "self", "summary": "SUSE Bug 1172484", "url": "https://bugzilla.suse.com/1172484" }, { "category": "self", "summary": "SUSE Bug 1172537", "url": "https://bugzilla.suse.com/1172537" }, { "category": "self", "summary": "SUSE Bug 1172538", "url": "https://bugzilla.suse.com/1172538" }, { "category": "self", "summary": "SUSE Bug 1172687", "url": "https://bugzilla.suse.com/1172687" }, { "category": "self", "summary": "SUSE Bug 1172719", "url": "https://bugzilla.suse.com/1172719" }, { "category": "self", "summary": "SUSE Bug 1172759", "url": "https://bugzilla.suse.com/1172759" }, { "category": "self", "summary": "SUSE Bug 1172775", "url": "https://bugzilla.suse.com/1172775" }, { "category": "self", "summary": "SUSE Bug 1172781", "url": "https://bugzilla.suse.com/1172781" }, { "category": "self", "summary": "SUSE Bug 1172782", "url": "https://bugzilla.suse.com/1172782" }, { "category": "self", "summary": "SUSE Bug 1172783", "url": "https://bugzilla.suse.com/1172783" }, { "category": "self", "summary": "SUSE Bug 1172871", "url": "https://bugzilla.suse.com/1172871" }, { "category": "self", "summary": "SUSE Bug 1172872", "url": "https://bugzilla.suse.com/1172872" }, { "category": "self", "summary": "SUSE Bug 1172963", "url": "https://bugzilla.suse.com/1172963" }, { "category": "self", "summary": "SUSE Bug 1172999", "url": "https://bugzilla.suse.com/1172999" }, { "category": "self", "summary": "SUSE Bug 1173060", "url": "https://bugzilla.suse.com/1173060" }, { "category": "self", "summary": "SUSE Bug 1173074", "url": "https://bugzilla.suse.com/1173074" }, { "category": "self", "summary": "SUSE Bug 1173146", "url": "https://bugzilla.suse.com/1173146" }, { "category": "self", "summary": "SUSE Bug 1173265", "url": "https://bugzilla.suse.com/1173265" }, { "category": "self", "summary": "SUSE Bug 1173280", "url": "https://bugzilla.suse.com/1173280" }, { "category": "self", "summary": "SUSE Bug 1173284", "url": "https://bugzilla.suse.com/1173284" }, { "category": "self", "summary": "SUSE Bug 1173428", "url": "https://bugzilla.suse.com/1173428" }, { "category": "self", "summary": "SUSE Bug 1173514", "url": "https://bugzilla.suse.com/1173514" }, { "category": "self", "summary": "SUSE Bug 1173567", "url": "https://bugzilla.suse.com/1173567" }, { "category": "self", "summary": "SUSE Bug 1173573", "url": "https://bugzilla.suse.com/1173573" }, { "category": "self", "summary": "SUSE Bug 1173659", "url": "https://bugzilla.suse.com/1173659" }, { "category": "self", "summary": "SUSE Bug 1173746", "url": "https://bugzilla.suse.com/1173746" }, { "category": "self", "summary": "SUSE Bug 1173818", "url": "https://bugzilla.suse.com/1173818" }, { "category": "self", "summary": "SUSE Bug 1173820", "url": "https://bugzilla.suse.com/1173820" }, { "category": "self", "summary": "SUSE Bug 1173825", "url": "https://bugzilla.suse.com/1173825" }, { "category": "self", "summary": "SUSE Bug 1173826", "url": "https://bugzilla.suse.com/1173826" }, { "category": "self", "summary": "SUSE Bug 1173833", "url": "https://bugzilla.suse.com/1173833" }, { "category": "self", "summary": "SUSE Bug 1173838", "url": "https://bugzilla.suse.com/1173838" }, { "category": "self", "summary": "SUSE Bug 1173839", "url": "https://bugzilla.suse.com/1173839" }, { "category": "self", "summary": "SUSE Bug 1173845", "url": "https://bugzilla.suse.com/1173845" }, { "category": "self", "summary": "SUSE Bug 1173857", "url": "https://bugzilla.suse.com/1173857" }, { "category": "self", "summary": "SUSE Bug 1174070", "url": "https://bugzilla.suse.com/1174070" }, { "category": "self", "summary": "SUSE Bug 1174113", "url": "https://bugzilla.suse.com/1174113" }, { "category": "self", "summary": "SUSE Bug 1174115", "url": "https://bugzilla.suse.com/1174115" }, { "category": "self", "summary": "SUSE Bug 1174122", "url": "https://bugzilla.suse.com/1174122" }, { "category": "self", "summary": "SUSE Bug 1174123", "url": "https://bugzilla.suse.com/1174123" }, { "category": "self", "summary": "SUSE Bug 1174205", "url": "https://bugzilla.suse.com/1174205" }, { "category": "self", "summary": "SUSE Bug 1174296", "url": "https://bugzilla.suse.com/1174296" }, { "category": "self", "summary": "SUSE Bug 1174343", "url": "https://bugzilla.suse.com/1174343" }, { "category": "self", "summary": "SUSE Bug 1174356", "url": "https://bugzilla.suse.com/1174356" }, { "category": "self", "summary": "SUSE Bug 1174409", "url": "https://bugzilla.suse.com/1174409" }, { "category": "self", "summary": "SUSE Bug 1174438", "url": "https://bugzilla.suse.com/1174438" }, { "category": "self", "summary": "SUSE Bug 1174462", "url": "https://bugzilla.suse.com/1174462" }, { "category": "self", "summary": "SUSE Bug 1174543", "url": "https://bugzilla.suse.com/1174543" }, { "category": "self", "summary": "SUSE Bug 1174549", "url": "https://bugzilla.suse.com/1174549" }, { "category": "self", "summary": "SUSE Bug 1174658", "url": "https://bugzilla.suse.com/1174658" }, { "category": "self", "summary": "SUSE Bug 1174685", "url": "https://bugzilla.suse.com/1174685" }, { "category": "self", "summary": "SUSE Bug 1174757", "url": "https://bugzilla.suse.com/1174757" }, { "category": "self", "summary": "SUSE Bug 1174840", "url": "https://bugzilla.suse.com/1174840" }, { "category": "self", "summary": "SUSE Bug 1174841", "url": "https://bugzilla.suse.com/1174841" }, { "category": "self", "summary": "SUSE Bug 1174843", "url": "https://bugzilla.suse.com/1174843" }, { "category": "self", "summary": "SUSE Bug 1174844", "url": "https://bugzilla.suse.com/1174844" }, { "category": "self", "summary": "SUSE Bug 1174845", "url": "https://bugzilla.suse.com/1174845" }, { "category": "self", "summary": "SUSE Bug 1174887", "url": "https://bugzilla.suse.com/1174887" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16746 page", "url": "https://www.suse.com/security/cve/CVE-2019-16746/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20810 page", "url": "https://www.suse.com/security/cve/CVE-2019-20810/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20908 page", "url": "https://www.suse.com/security/cve/CVE-2019-20908/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0305 page", "url": "https://www.suse.com/security/cve/CVE-2020-0305/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10135 page", "url": "https://www.suse.com/security/cve/CVE-2020-10135/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10766 page", "url": "https://www.suse.com/security/cve/CVE-2020-10766/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10767 page", "url": "https://www.suse.com/security/cve/CVE-2020-10767/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10768 page", "url": "https://www.suse.com/security/cve/CVE-2020-10768/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10769 page", "url": "https://www.suse.com/security/cve/CVE-2020-10769/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10773 page", "url": "https://www.suse.com/security/cve/CVE-2020-10773/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10781 page", "url": "https://www.suse.com/security/cve/CVE-2020-10781/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12771 page", "url": "https://www.suse.com/security/cve/CVE-2020-12771/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12888 page", "url": "https://www.suse.com/security/cve/CVE-2020-12888/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-13974 page", "url": "https://www.suse.com/security/cve/CVE-2020-13974/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14331 page", "url": "https://www.suse.com/security/cve/CVE-2020-14331/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14416 page", "url": "https://www.suse.com/security/cve/CVE-2020-14416/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15393 page", "url": "https://www.suse.com/security/cve/CVE-2020-15393/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15780 page", "url": "https://www.suse.com/security/cve/CVE-2020-15780/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16166 page", "url": "https://www.suse.com/security/cve/CVE-2020-16166/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-08-06T10:21:32Z", "generator": { "date": "2020-08-06T10:21:32Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2020:1153-1", "initial_release_date": "2020-08-06T10:21:32Z", "revision_history": [ { "date": "2020-08-06T10:21:32Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-lp151.28.59.1.noarch", "product": { "name": "kernel-devel-4.12.14-lp151.28.59.1.noarch", "product_id": "kernel-devel-4.12.14-lp151.28.59.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-lp151.28.59.1.noarch", "product": { "name": "kernel-docs-4.12.14-lp151.28.59.1.noarch", "product_id": "kernel-docs-4.12.14-lp151.28.59.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "product_id": "kernel-docs-html-4.12.14-lp151.28.59.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-lp151.28.59.1.noarch", "product": { "name": "kernel-macros-4.12.14-lp151.28.59.1.noarch", "product_id": "kernel-macros-4.12.14-lp151.28.59.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-lp151.28.59.1.noarch", "product": { "name": "kernel-source-4.12.14-lp151.28.59.1.noarch", "product_id": "kernel-source-4.12.14-lp151.28.59.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-4.12.14-lp151.28.59.1.x86_64", "product": { "name": "kernel-debug-4.12.14-lp151.28.59.1.x86_64", "product_id": "kernel-debug-4.12.14-lp151.28.59.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "product_id": "kernel-debug-base-4.12.14-lp151.28.59.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-lp151.28.59.1.x86_64", "product": { "name": "kernel-default-4.12.14-lp151.28.59.1.x86_64", "product_id": "kernel-default-4.12.14-lp151.28.59.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "product_id": "kernel-default-base-4.12.14-lp151.28.59.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "product_id": "kernel-default-devel-4.12.14-lp151.28.59.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "product_id": "kernel-obs-build-4.12.14-lp151.28.59.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-lp151.28.59.1.x86_64", "product": { "name": "kernel-syms-4.12.14-lp151.28.59.1.x86_64", "product_id": "kernel-syms-4.12.14-lp151.28.59.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "product_id": "kernel-vanilla-4.12.14-lp151.28.59.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.1", "product": { "name": "openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-4.12.14-lp151.28.59.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64" }, "product_reference": "kernel-debug-4.12.14-lp151.28.59.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-base-4.12.14-lp151.28.59.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64" }, "product_reference": "kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64" }, "product_reference": "kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-lp151.28.59.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64" }, "product_reference": "kernel-default-4.12.14-lp151.28.59.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-lp151.28.59.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-lp151.28.59.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-lp151.28.59.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch" }, "product_reference": "kernel-devel-4.12.14-lp151.28.59.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-lp151.28.59.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch" }, "product_reference": "kernel-docs-4.12.14-lp151.28.59.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-html-4.12.14-lp151.28.59.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch" }, "product_reference": "kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64" }, "product_reference": "kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64" }, "product_reference": "kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64" }, "product_reference": "kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-lp151.28.59.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch" }, "product_reference": "kernel-macros-4.12.14-lp151.28.59.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-lp151.28.59.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64" }, "product_reference": "kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-lp151.28.59.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch" }, "product_reference": "kernel-source-4.12.14-lp151.28.59.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch" }, "product_reference": "kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-lp151.28.59.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-lp151.28.59.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-4.12.14-lp151.28.59.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64" }, "product_reference": "kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" }, "product_reference": "kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-16746", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16746" } ], "notes": [ { "category": "general", "text": "An issue was discovered in net/wireless/nl80211.c in the Linux kernel through 5.2.17. It does not check the length of variable elements in a beacon head, leading to a buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16746", "url": "https://www.suse.com/security/cve/CVE-2019-16746" }, { "category": "external", "summary": "SUSE Bug 1152107 for CVE-2019-16746", "url": "https://bugzilla.suse.com/1152107" }, { "category": "external", "summary": "SUSE Bug 1173659 for CVE-2019-16746", "url": "https://bugzilla.suse.com/1173659" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T10:21:32Z", "details": "moderate" } ], "title": "CVE-2019-16746" }, { "cve": "CVE-2019-20810", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20810" } ], "notes": [ { "category": "general", "text": "go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel before 5.6 does not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20810", "url": "https://www.suse.com/security/cve/CVE-2019-20810" }, { "category": "external", "summary": "SUSE Bug 1172458 for CVE-2019-20810", "url": "https://bugzilla.suse.com/1172458" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T10:21:32Z", "details": "low" } ], "title": "CVE-2019-20810" }, { "cve": "CVE-2019-20908", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20908" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/firmware/efi/efi.c in the Linux kernel before 5.4. Incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20908", "url": "https://www.suse.com/security/cve/CVE-2019-20908" }, { "category": "external", "summary": "SUSE Bug 1173567 for CVE-2019-20908", "url": "https://bugzilla.suse.com/1173567" }, { "category": "external", "summary": "SUSE Bug 1174187 for CVE-2019-20908", "url": "https://bugzilla.suse.com/1174187" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T10:21:32Z", "details": "important" } ], "title": "CVE-2019-20908" }, { "cve": "CVE-2020-0305", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0305" } ], "notes": [ { "category": "general", "text": "In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-153467744", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0305", "url": "https://www.suse.com/security/cve/CVE-2020-0305" }, { "category": "external", "summary": "SUSE Bug 1174462 for CVE-2020-0305", "url": "https://bugzilla.suse.com/1174462" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T10:21:32Z", "details": "moderate" } ], "title": "CVE-2020-0305" }, { "cve": "CVE-2020-10135", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10135" } ], "notes": [ { "category": "general", "text": "Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10135", "url": "https://www.suse.com/security/cve/CVE-2020-10135" }, { "category": "external", "summary": "SUSE Bug 1171988 for CVE-2020-10135", "url": "https://bugzilla.suse.com/1171988" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T10:21:32Z", "details": "moderate" } ], "title": "CVE-2020-10135" }, { "cve": "CVE-2020-10766", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10766" } ], "notes": [ { "category": "general", "text": "A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10766", "url": "https://www.suse.com/security/cve/CVE-2020-10766" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172781 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1172781" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T10:21:32Z", "details": "moderate" } ], "title": "CVE-2020-10766" }, { "cve": "CVE-2020-10767", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10767" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10767", "url": "https://www.suse.com/security/cve/CVE-2020-10767" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172782 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1172782" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T10:21:32Z", "details": "moderate" } ], "title": "CVE-2020-10767" }, { "cve": "CVE-2020-10768", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10768" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10768", "url": "https://www.suse.com/security/cve/CVE-2020-10768" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172783 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1172783" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T10:21:32Z", "details": "moderate" } ], "title": "CVE-2020-10768" }, { "cve": "CVE-2020-10769", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10769" } ], "notes": [ { "category": "general", "text": "A buffer over-read flaw was found in RH kernel versions before 5.0 in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm\u0027s module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash. This flaw allows a local attacker with user privileges to cause a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10769", "url": "https://www.suse.com/security/cve/CVE-2020-10769" }, { "category": "external", "summary": "SUSE Bug 1173265 for CVE-2020-10769", "url": "https://bugzilla.suse.com/1173265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T10:21:32Z", "details": "moderate" } ], "title": "CVE-2020-10769" }, { "cve": "CVE-2020-10773", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10773" } ], "notes": [ { "category": "general", "text": "A stack information leak flaw was found in s390/s390x in the Linux kernel\u0027s memory manager functionality, where it incorrectly writes to the /proc/sys/vm/cmm_timeout file. This flaw allows a local user to see the kernel data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10773", "url": "https://www.suse.com/security/cve/CVE-2020-10773" }, { "category": "external", "summary": "SUSE Bug 1172999 for CVE-2020-10773", "url": "https://bugzilla.suse.com/1172999" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T10:21:32Z", "details": "low" } ], "title": "CVE-2020-10773" }, { "cve": "CVE-2020-10781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10781" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel before 5.8-rc6 in the ZRAM kernel module, where a user with a local account and the ability to read the /sys/class/zram-control/hot_add file can create ZRAM device nodes in the /dev/ directory. This read allocates kernel memory and is not accounted for a user that triggers the creation of that ZRAM device. With this vulnerability, continually reading the device may consume a large amount of system memory and cause the Out-of-Memory (OOM) killer to activate and terminate random userspace processes, possibly making the system inoperable.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10781", "url": "https://www.suse.com/security/cve/CVE-2020-10781" }, { "category": "external", "summary": "SUSE Bug 1173074 for CVE-2020-10781", "url": "https://bugzilla.suse.com/1173074" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T10:21:32Z", "details": "moderate" } ], "title": "CVE-2020-10781" }, { "cve": "CVE-2020-12771", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12771" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.6.11. btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12771", "url": "https://www.suse.com/security/cve/CVE-2020-12771" }, { "category": "external", "summary": "SUSE Bug 1171732 for CVE-2020-12771", "url": "https://bugzilla.suse.com/1171732" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T10:21:32Z", "details": "moderate" } ], "title": "CVE-2020-12771" }, { "cve": "CVE-2020-12888", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12888" } ], "notes": [ { "category": "general", "text": "The VFIO PCI driver in the Linux kernel through 5.6.13 mishandles attempts to access disabled memory space.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12888", "url": "https://www.suse.com/security/cve/CVE-2020-12888" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1171868 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1171868" }, { "category": "external", "summary": "SUSE Bug 1176979 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1176979" }, { "category": "external", "summary": "SUSE Bug 1179612 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1179612" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T10:21:32Z", "details": "moderate" } ], "title": "CVE-2020-12888" }, { "cve": "CVE-2020-13974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-13974" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel 4.4 through 5.7.1. drivers/tty/vt/keyboard.c has an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. NOTE: Members in the community argue that the integer overflow does not lead to a security issue in this case.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-13974", "url": "https://www.suse.com/security/cve/CVE-2020-13974" }, { "category": "external", "summary": "SUSE Bug 1172775 for CVE-2020-13974", "url": "https://bugzilla.suse.com/1172775" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T10:21:32Z", "details": "moderate" } ], "title": "CVE-2020-13974" }, { "cve": "CVE-2020-14331", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14331" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14331", "url": "https://www.suse.com/security/cve/CVE-2020-14331" }, { "category": "external", "summary": "SUSE Bug 1174205 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174205" }, { "category": "external", "summary": "SUSE Bug 1174247 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T10:21:32Z", "details": "important" } ], "title": "CVE-2020-14331" }, { "cve": "CVE-2020-14416", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14416" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.4.16, a race condition in tty-\u003edisc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14416", "url": "https://www.suse.com/security/cve/CVE-2020-14416" }, { "category": "external", "summary": "SUSE Bug 1162002 for CVE-2020-14416", "url": "https://bugzilla.suse.com/1162002" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T10:21:32Z", "details": "moderate" } ], "title": "CVE-2020-14416" }, { "cve": "CVE-2020-15393", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15393" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.4 through 5.7.6, usbtest_disconnect in drivers/usb/misc/usbtest.c has a memory leak, aka CID-28ebeb8db770.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15393", "url": "https://www.suse.com/security/cve/CVE-2020-15393" }, { "category": "external", "summary": "SUSE Bug 1173514 for CVE-2020-15393", "url": "https://bugzilla.suse.com/1173514" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T10:21:32Z", "details": "moderate" } ], "title": "CVE-2020-15393" }, { "cve": "CVE-2020-15780", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15780" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15780", "url": "https://www.suse.com/security/cve/CVE-2020-15780" }, { "category": "external", "summary": "SUSE Bug 1173573 for CVE-2020-15780", "url": "https://bugzilla.suse.com/1173573" }, { "category": "external", "summary": "SUSE Bug 1174186 for CVE-2020-15780", "url": "https://bugzilla.suse.com/1174186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T10:21:32Z", "details": "important" } ], "title": "CVE-2020-15780" }, { "cve": "CVE-2020-16166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-16166" } ], "notes": [ { "category": "general", "text": "The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-16166", "url": "https://www.suse.com/security/cve/CVE-2020-16166" }, { "category": "external", "summary": "SUSE Bug 1174757 for CVE-2020-16166", "url": "https://bugzilla.suse.com/1174757" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.59.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.59.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.59.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T10:21:32Z", "details": "moderate" } ], "title": "CVE-2020-16166" } ] }
opensuse-su-2024:13704-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
kernel-devel-longterm-6.6.17-1.1 on GA media
Notes
Title of the patch
kernel-devel-longterm-6.6.17-1.1 on GA media
Description of the patch
These are all security issues fixed in the kernel-devel-longterm-6.6.17-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-13704
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "kernel-devel-longterm-6.6.17-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the kernel-devel-longterm-6.6.17-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-13704", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_13704-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3695 page", "url": "https://www.suse.com/security/cve/CVE-2016-3695/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-1000251 page", "url": "https://www.suse.com/security/cve/CVE-2017-1000251/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-12153 page", "url": "https://www.suse.com/security/cve/CVE-2017-12153/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13080 page", "url": "https://www.suse.com/security/cve/CVE-2017-13080/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14051 page", "url": "https://www.suse.com/security/cve/CVE-2017-14051/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15129 page", "url": "https://www.suse.com/security/cve/CVE-2017-15129/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15265 page", "url": "https://www.suse.com/security/cve/CVE-2017-15265/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16536 page", "url": "https://www.suse.com/security/cve/CVE-2017-16536/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16537 page", "url": "https://www.suse.com/security/cve/CVE-2017-16537/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16645 page", "url": "https://www.suse.com/security/cve/CVE-2017-16645/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16646 page", "url": "https://www.suse.com/security/cve/CVE-2017-16646/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16647 page", "url": "https://www.suse.com/security/cve/CVE-2017-16647/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16648 page", "url": "https://www.suse.com/security/cve/CVE-2017-16648/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16995 page", "url": "https://www.suse.com/security/cve/CVE-2017-16995/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16996 page", "url": "https://www.suse.com/security/cve/CVE-2017-16996/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17448 page", "url": "https://www.suse.com/security/cve/CVE-2017-17448/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17449 page", "url": "https://www.suse.com/security/cve/CVE-2017-17449/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17450 page", "url": "https://www.suse.com/security/cve/CVE-2017-17450/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17852 page", "url": "https://www.suse.com/security/cve/CVE-2017-17852/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17853 page", "url": "https://www.suse.com/security/cve/CVE-2017-17853/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17854 page", "url": "https://www.suse.com/security/cve/CVE-2017-17854/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17855 page", "url": "https://www.suse.com/security/cve/CVE-2017-17855/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17856 page", "url": "https://www.suse.com/security/cve/CVE-2017-17856/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17857 page", "url": "https://www.suse.com/security/cve/CVE-2017-17857/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17862 page", "url": "https://www.suse.com/security/cve/CVE-2017-17862/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5123 page", "url": "https://www.suse.com/security/cve/CVE-2017-5123/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5715 page", "url": "https://www.suse.com/security/cve/CVE-2017-5715/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5753 page", "url": "https://www.suse.com/security/cve/CVE-2017-5753/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5754 page", "url": "https://www.suse.com/security/cve/CVE-2017-5754/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7541 page", "url": "https://www.suse.com/security/cve/CVE-2017-7541/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7542 page", "url": "https://www.suse.com/security/cve/CVE-2017-7542/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-8824 page", "url": "https://www.suse.com/security/cve/CVE-2017-8824/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-8831 page", "url": "https://www.suse.com/security/cve/CVE-2017-8831/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000004 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000004/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10322 page", "url": "https://www.suse.com/security/cve/CVE-2018-10322/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10323 page", "url": "https://www.suse.com/security/cve/CVE-2018-10323/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1118 page", "url": "https://www.suse.com/security/cve/CVE-2018-1118/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12232 page", "url": "https://www.suse.com/security/cve/CVE-2018-12232/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12714 page", "url": "https://www.suse.com/security/cve/CVE-2018-12714/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-13053 page", "url": "https://www.suse.com/security/cve/CVE-2018-13053/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-18710 page", "url": "https://www.suse.com/security/cve/CVE-2018-18710/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-19824 page", "url": "https://www.suse.com/security/cve/CVE-2018-19824/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5332 page", "url": "https://www.suse.com/security/cve/CVE-2018-5332/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5333 page", "url": "https://www.suse.com/security/cve/CVE-2018-5333/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8043 page", "url": "https://www.suse.com/security/cve/CVE-2018-8043/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8087 page", "url": "https://www.suse.com/security/cve/CVE-2018-8087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8822 page", "url": "https://www.suse.com/security/cve/CVE-2018-8822/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10207 page", "url": "https://www.suse.com/security/cve/CVE-2019-10207/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11477 page", "url": "https://www.suse.com/security/cve/CVE-2019-11477/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11478 page", "url": "https://www.suse.com/security/cve/CVE-2019-11478/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11479 page", "url": "https://www.suse.com/security/cve/CVE-2019-11479/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14615 page", "url": "https://www.suse.com/security/cve/CVE-2019-14615/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14814 page", "url": "https://www.suse.com/security/cve/CVE-2019-14814/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14896 page", "url": "https://www.suse.com/security/cve/CVE-2019-14896/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15030 page", "url": "https://www.suse.com/security/cve/CVE-2019-15030/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15031 page", "url": "https://www.suse.com/security/cve/CVE-2019-15031/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15098 page", "url": "https://www.suse.com/security/cve/CVE-2019-15098/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15099 page", "url": "https://www.suse.com/security/cve/CVE-2019-15099/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15290 page", "url": "https://www.suse.com/security/cve/CVE-2019-15290/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15504 page", "url": "https://www.suse.com/security/cve/CVE-2019-15504/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15902 page", "url": "https://www.suse.com/security/cve/CVE-2019-15902/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16231 page", "url": "https://www.suse.com/security/cve/CVE-2019-16231/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16232 page", "url": "https://www.suse.com/security/cve/CVE-2019-16232/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16234 page", "url": "https://www.suse.com/security/cve/CVE-2019-16234/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-17133 page", "url": "https://www.suse.com/security/cve/CVE-2019-17133/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-17666 page", "url": "https://www.suse.com/security/cve/CVE-2019-17666/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-18808 page", "url": "https://www.suse.com/security/cve/CVE-2019-18808/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-18812 page", "url": "https://www.suse.com/security/cve/CVE-2019-18812/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-18813 page", "url": "https://www.suse.com/security/cve/CVE-2019-18813/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19252 page", "url": "https://www.suse.com/security/cve/CVE-2019-19252/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19332 page", "url": "https://www.suse.com/security/cve/CVE-2019-19332/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19338 page", "url": "https://www.suse.com/security/cve/CVE-2019-19338/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3016 page", "url": "https://www.suse.com/security/cve/CVE-2019-3016/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3846 page", "url": "https://www.suse.com/security/cve/CVE-2019-3846/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3882 page", "url": "https://www.suse.com/security/cve/CVE-2019-3882/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3887 page", "url": "https://www.suse.com/security/cve/CVE-2019-3887/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6974 page", "url": "https://www.suse.com/security/cve/CVE-2019-6974/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7221 page", "url": "https://www.suse.com/security/cve/CVE-2019-7221/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7222 page", "url": "https://www.suse.com/security/cve/CVE-2019-7222/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8564 page", "url": "https://www.suse.com/security/cve/CVE-2019-8564/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8912 page", "url": "https://www.suse.com/security/cve/CVE-2019-8912/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9500 page", "url": "https://www.suse.com/security/cve/CVE-2019-9500/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10135 page", "url": "https://www.suse.com/security/cve/CVE-2020-10135/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10766 page", "url": "https://www.suse.com/security/cve/CVE-2020-10766/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10767 page", "url": "https://www.suse.com/security/cve/CVE-2020-10767/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10768 page", "url": "https://www.suse.com/security/cve/CVE-2020-10768/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12351 page", "url": "https://www.suse.com/security/cve/CVE-2020-12351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12352 page", "url": "https://www.suse.com/security/cve/CVE-2020-12352/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14331 page", "url": "https://www.suse.com/security/cve/CVE-2020-14331/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14386 page", "url": "https://www.suse.com/security/cve/CVE-2020-14386/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24586 page", "url": "https://www.suse.com/security/cve/CVE-2020-24586/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24587 page", "url": "https://www.suse.com/security/cve/CVE-2020-24587/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24588 page", "url": "https://www.suse.com/security/cve/CVE-2020-24588/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25639 page", "url": "https://www.suse.com/security/cve/CVE-2020-25639/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25656 page", "url": "https://www.suse.com/security/cve/CVE-2020-25656/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25668 page", "url": "https://www.suse.com/security/cve/CVE-2020-25668/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-26141 page", "url": "https://www.suse.com/security/cve/CVE-2020-26141/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2732 page", "url": "https://www.suse.com/security/cve/CVE-2020-2732/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29660 page", "url": "https://www.suse.com/security/cve/CVE-2020-29660/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29661 page", "url": "https://www.suse.com/security/cve/CVE-2020-29661/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8648 page", "url": "https://www.suse.com/security/cve/CVE-2020-8648/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8694 page", "url": "https://www.suse.com/security/cve/CVE-2020-8694/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-23133 page", "url": "https://www.suse.com/security/cve/CVE-2021-23133/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-26708 page", "url": "https://www.suse.com/security/cve/CVE-2021-26708/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-28971 page", "url": "https://www.suse.com/security/cve/CVE-2021-28971/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32606 page", "url": "https://www.suse.com/security/cve/CVE-2021-32606/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-33909 page", "url": "https://www.suse.com/security/cve/CVE-2021-33909/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3483 page", "url": "https://www.suse.com/security/cve/CVE-2021-3483/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3489 page", "url": "https://www.suse.com/security/cve/CVE-2021-3489/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3490 page", "url": "https://www.suse.com/security/cve/CVE-2021-3490/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3491 page", "url": "https://www.suse.com/security/cve/CVE-2021-3491/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3542 page", "url": "https://www.suse.com/security/cve/CVE-2021-3542/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3640 page", "url": "https://www.suse.com/security/cve/CVE-2021-3640/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3653 page", "url": "https://www.suse.com/security/cve/CVE-2021-3653/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3656 page", "url": "https://www.suse.com/security/cve/CVE-2021-3656/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3744 page", "url": "https://www.suse.com/security/cve/CVE-2021-3744/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3753 page", "url": "https://www.suse.com/security/cve/CVE-2021-3753/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-37576 page", "url": "https://www.suse.com/security/cve/CVE-2021-37576/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3759 page", "url": "https://www.suse.com/security/cve/CVE-2021-3759/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-38166 page", "url": "https://www.suse.com/security/cve/CVE-2021-38166/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-43976 page", "url": "https://www.suse.com/security/cve/CVE-2021-43976/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0185 page", "url": "https://www.suse.com/security/cve/CVE-2022-0185/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0330 page", "url": "https://www.suse.com/security/cve/CVE-2022-0330/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0847 page", "url": "https://www.suse.com/security/cve/CVE-2022-0847/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-0886 page", "url": "https://www.suse.com/security/cve/CVE-2022-0886/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1462 page", "url": "https://www.suse.com/security/cve/CVE-2022-1462/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1516 page", "url": "https://www.suse.com/security/cve/CVE-2022-1516/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1679 page", "url": "https://www.suse.com/security/cve/CVE-2022-1679/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1729 page", "url": "https://www.suse.com/security/cve/CVE-2022-1729/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1852 page", "url": "https://www.suse.com/security/cve/CVE-2022-1852/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1966 page", "url": "https://www.suse.com/security/cve/CVE-2022-1966/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1972 page", "url": "https://www.suse.com/security/cve/CVE-2022-1972/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-1973 page", "url": "https://www.suse.com/security/cve/CVE-2022-1973/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-22942 page", "url": "https://www.suse.com/security/cve/CVE-2022-22942/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2308 page", "url": "https://www.suse.com/security/cve/CVE-2022-2308/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-24958 page", "url": "https://www.suse.com/security/cve/CVE-2022-24958/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2588 page", "url": "https://www.suse.com/security/cve/CVE-2022-2588/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-2590 page", "url": "https://www.suse.com/security/cve/CVE-2022-2590/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-26490 page", "url": "https://www.suse.com/security/cve/CVE-2022-26490/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-28388 page", "url": "https://www.suse.com/security/cve/CVE-2022-28388/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-28389 page", "url": "https://www.suse.com/security/cve/CVE-2022-28389/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-28390 page", "url": "https://www.suse.com/security/cve/CVE-2022-28390/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-28893 page", "url": "https://www.suse.com/security/cve/CVE-2022-28893/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-29900 page", "url": "https://www.suse.com/security/cve/CVE-2022-29900/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-29901 page", "url": "https://www.suse.com/security/cve/CVE-2022-29901/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-29968 page", "url": "https://www.suse.com/security/cve/CVE-2022-29968/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3424 page", "url": "https://www.suse.com/security/cve/CVE-2022-3424/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-34918 page", "url": "https://www.suse.com/security/cve/CVE-2022-34918/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3628 page", "url": "https://www.suse.com/security/cve/CVE-2022-3628/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-3640 page", "url": "https://www.suse.com/security/cve/CVE-2022-3640/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-40982 page", "url": "https://www.suse.com/security/cve/CVE-2022-40982/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-41218 page", "url": "https://www.suse.com/security/cve/CVE-2022-41218/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-41674 page", "url": "https://www.suse.com/security/cve/CVE-2022-41674/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-42719 page", "url": "https://www.suse.com/security/cve/CVE-2022-42719/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-42720 page", "url": "https://www.suse.com/security/cve/CVE-2022-42720/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-42721 page", "url": "https://www.suse.com/security/cve/CVE-2022-42721/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-42722 page", "url": "https://www.suse.com/security/cve/CVE-2022-42722/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-4379 page", "url": "https://www.suse.com/security/cve/CVE-2022-4379/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-44032 page", "url": "https://www.suse.com/security/cve/CVE-2022-44032/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-44033 page", "url": "https://www.suse.com/security/cve/CVE-2022-44033/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-44034 page", "url": "https://www.suse.com/security/cve/CVE-2022-44034/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-45884 page", "url": "https://www.suse.com/security/cve/CVE-2022-45884/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-45885 page", "url": "https://www.suse.com/security/cve/CVE-2022-45885/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-45886 page", "url": "https://www.suse.com/security/cve/CVE-2022-45886/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-45887 page", "url": "https://www.suse.com/security/cve/CVE-2022-45887/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-45888 page", "url": "https://www.suse.com/security/cve/CVE-2022-45888/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-45919 page", "url": "https://www.suse.com/security/cve/CVE-2022-45919/" }, { "category": "self", "summary": "SUSE CVE CVE-2022-45934 page", "url": "https://www.suse.com/security/cve/CVE-2022-45934/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-0045 page", "url": "https://www.suse.com/security/cve/CVE-2023-0045/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1076 page", "url": "https://www.suse.com/security/cve/CVE-2023-1076/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1078 page", "url": "https://www.suse.com/security/cve/CVE-2023-1078/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1192 page", "url": "https://www.suse.com/security/cve/CVE-2023-1192/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-1380 page", "url": "https://www.suse.com/security/cve/CVE-2023-1380/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-20569 page", "url": "https://www.suse.com/security/cve/CVE-2023-20569/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-20593 page", "url": "https://www.suse.com/security/cve/CVE-2023-20593/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-2124 page", "url": "https://www.suse.com/security/cve/CVE-2023-2124/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-31084 page", "url": "https://www.suse.com/security/cve/CVE-2023-31084/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-3141 page", "url": "https://www.suse.com/security/cve/CVE-2023-3141/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-3269 page", "url": "https://www.suse.com/security/cve/CVE-2023-3269/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-39192 page", "url": "https://www.suse.com/security/cve/CVE-2023-39192/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-39193 page", "url": "https://www.suse.com/security/cve/CVE-2023-39193/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-4128 page", "url": "https://www.suse.com/security/cve/CVE-2023-4128/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-4134 page", "url": "https://www.suse.com/security/cve/CVE-2023-4134/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-4194 page", "url": "https://www.suse.com/security/cve/CVE-2023-4194/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-42753 page", "url": "https://www.suse.com/security/cve/CVE-2023-42753/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-42754 page", "url": "https://www.suse.com/security/cve/CVE-2023-42754/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-42756 page", "url": "https://www.suse.com/security/cve/CVE-2023-42756/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-4623 page", "url": "https://www.suse.com/security/cve/CVE-2023-4623/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-46813 page", "url": "https://www.suse.com/security/cve/CVE-2023-46813/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-4881 page", "url": "https://www.suse.com/security/cve/CVE-2023-4881/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-5345 page", "url": "https://www.suse.com/security/cve/CVE-2023-5345/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6606 page", "url": "https://www.suse.com/security/cve/CVE-2023-6606/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-6610 page", "url": "https://www.suse.com/security/cve/CVE-2023-6610/" } ], "title": "kernel-devel-longterm-6.6.17-1.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:13704-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-longterm-6.6.17-1.1.aarch64", "product": { "name": "kernel-devel-longterm-6.6.17-1.1.aarch64", "product_id": "kernel-devel-longterm-6.6.17-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-source-longterm-6.6.17-1.1.aarch64", "product": { "name": "kernel-source-longterm-6.6.17-1.1.aarch64", "product_id": "kernel-source-longterm-6.6.17-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-longterm-6.6.17-1.1.ppc64le", "product": { "name": "kernel-devel-longterm-6.6.17-1.1.ppc64le", "product_id": "kernel-devel-longterm-6.6.17-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-source-longterm-6.6.17-1.1.ppc64le", "product": { "name": "kernel-source-longterm-6.6.17-1.1.ppc64le", "product_id": "kernel-source-longterm-6.6.17-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-longterm-6.6.17-1.1.s390x", "product": { "name": "kernel-devel-longterm-6.6.17-1.1.s390x", "product_id": "kernel-devel-longterm-6.6.17-1.1.s390x" } }, { "category": "product_version", "name": "kernel-source-longterm-6.6.17-1.1.s390x", "product": { "name": "kernel-source-longterm-6.6.17-1.1.s390x", "product_id": "kernel-source-longterm-6.6.17-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-longterm-6.6.17-1.1.x86_64", "product": { "name": "kernel-devel-longterm-6.6.17-1.1.x86_64", "product_id": "kernel-devel-longterm-6.6.17-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-longterm-6.6.17-1.1.x86_64", "product": { "name": "kernel-source-longterm-6.6.17-1.1.x86_64", "product_id": "kernel-source-longterm-6.6.17-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-longterm-6.6.17-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64" }, "product_reference": "kernel-devel-longterm-6.6.17-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-longterm-6.6.17-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le" }, "product_reference": "kernel-devel-longterm-6.6.17-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-longterm-6.6.17-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x" }, "product_reference": "kernel-devel-longterm-6.6.17-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-longterm-6.6.17-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64" }, "product_reference": "kernel-devel-longterm-6.6.17-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-longterm-6.6.17-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64" }, "product_reference": "kernel-source-longterm-6.6.17-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-longterm-6.6.17-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le" }, "product_reference": "kernel-source-longterm-6.6.17-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-longterm-6.6.17-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x" }, "product_reference": "kernel-source-longterm-6.6.17-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-longterm-6.6.17-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" }, "product_reference": "kernel-source-longterm-6.6.17-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-3695", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3695" } ], "notes": [ { "category": "general", "text": "The einj_error_inject function in drivers/acpi/apei/einj.c in the Linux kernel allows local users to simulate hardware errors and consequently cause a denial of service by leveraging failure to disable APEI error injection through EINJ when securelevel is set.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3695", "url": "https://www.suse.com/security/cve/CVE-2016-3695" }, { "category": "external", "summary": "SUSE Bug 1023051 for CVE-2016-3695", "url": "https://bugzilla.suse.com/1023051" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.2, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-3695" }, { "cve": "CVE-2017-1000251", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-1000251" } ], "notes": [ { "category": "general", "text": "The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-1000251", "url": "https://www.suse.com/security/cve/CVE-2017-1000251" }, { "category": "external", "summary": "SUSE Bug 1057389 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1057389" }, { "category": "external", "summary": "SUSE Bug 1057950 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1057950" }, { "category": "external", "summary": "SUSE Bug 1070535 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1070535" }, { "category": "external", "summary": "SUSE Bug 1072117 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1072117" }, { "category": "external", "summary": "SUSE Bug 1072162 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1072162" }, { "category": "external", "summary": "SUSE Bug 1120758 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1120758" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-1000251" }, { "cve": "CVE-2017-12153", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-12153" } ], "notes": [ { "category": "general", "text": "A security flaw was discovered in the nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux kernel through 4.13.3. This function does not check whether the required attributes are present in a Netlink request. This request can be issued by a user with the CAP_NET_ADMIN capability and may result in a NULL pointer dereference and system crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-12153", "url": "https://www.suse.com/security/cve/CVE-2017-12153" }, { "category": "external", "summary": "SUSE Bug 1058410 for CVE-2017-12153", "url": "https://bugzilla.suse.com/1058410" }, { "category": "external", "summary": "SUSE Bug 1058624 for CVE-2017-12153", "url": "https://bugzilla.suse.com/1058624" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-12153" }, { "cve": "CVE-2017-13080", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13080" } ], "notes": [ { "category": "general", "text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13080", "url": "https://www.suse.com/security/cve/CVE-2017-13080" }, { "category": "external", "summary": "SUSE Bug 1056061 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1056061" }, { "category": "external", "summary": "SUSE Bug 1063479 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1063479" }, { "category": "external", "summary": "SUSE Bug 1063667 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1063667" }, { "category": "external", "summary": "SUSE Bug 1063671 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1063671" }, { "category": "external", "summary": "SUSE Bug 1066295 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1066295" }, { "category": "external", "summary": "SUSE Bug 1105108 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1105108" }, { "category": "external", "summary": "SUSE Bug 1178872 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1178872" }, { "category": "external", "summary": "SUSE Bug 1179588 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1179588" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-13080" }, { "cve": "CVE-2017-14051", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14051" } ], "notes": [ { "category": "general", "text": "An integer overflow in the qla2x00_sysfs_write_optrom_ctl function in drivers/scsi/qla2xxx/qla_attr.c in the Linux kernel through 4.12.10 allows local users to cause a denial of service (memory corruption and system crash) by leveraging root access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14051", "url": "https://www.suse.com/security/cve/CVE-2017-14051" }, { "category": "external", "summary": "SUSE Bug 1056588 for CVE-2017-14051", "url": "https://bugzilla.suse.com/1056588" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-14051" }, { "cve": "CVE-2017-15129", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-15129" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability was found in network namespaces code affecting the Linux kernel before 4.14.11. The function get_net_ns_by_id() in net/core/net_namespace.c does not check for the net::count value after it has found a peer network in netns_ids idr, which could lead to double free and memory corruption. This vulnerability could allow an unprivileged local user to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is thought to be unlikely.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-15129", "url": "https://www.suse.com/security/cve/CVE-2017-15129" }, { "category": "external", "summary": "SUSE Bug 1074839 for CVE-2017-15129", "url": "https://bugzilla.suse.com/1074839" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-15129" }, { "cve": "CVE-2017-15265", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-15265" } ], "notes": [ { "category": "general", "text": "Race condition in the ALSA subsystem in the Linux kernel before 4.13.8 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted /dev/snd/seq ioctl calls, related to sound/core/seq/seq_clientmgr.c and sound/core/seq/seq_ports.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-15265", "url": "https://www.suse.com/security/cve/CVE-2017-15265" }, { "category": "external", "summary": "SUSE Bug 1062520 for CVE-2017-15265", "url": "https://bugzilla.suse.com/1062520" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-15265", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2017-15265" }, { "cve": "CVE-2017-16536", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16536" } ], "notes": [ { "category": "general", "text": "The cx231xx_usb_probe function in drivers/media/usb/cx231xx/cx231xx-cards.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16536", "url": "https://www.suse.com/security/cve/CVE-2017-16536" }, { "category": "external", "summary": "SUSE Bug 1066606 for CVE-2017-16536", "url": "https://bugzilla.suse.com/1066606" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16536", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16536", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16536" }, { "cve": "CVE-2017-16537", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16537" } ], "notes": [ { "category": "general", "text": "The imon_probe function in drivers/media/rc/imon.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16537", "url": "https://www.suse.com/security/cve/CVE-2017-16537" }, { "category": "external", "summary": "SUSE Bug 1066573 for CVE-2017-16537", "url": "https://bugzilla.suse.com/1066573" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16537", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16537", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16537" }, { "cve": "CVE-2017-16645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16645" } ], "notes": [ { "category": "general", "text": "The ims_pcu_get_cdc_union_desc function in drivers/input/misc/ims-pcu.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (ims_pcu_parse_cdc_data out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16645", "url": "https://www.suse.com/security/cve/CVE-2017-16645" }, { "category": "external", "summary": "SUSE Bug 1067132 for CVE-2017-16645", "url": "https://bugzilla.suse.com/1067132" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16645", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16645", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16645" }, { "cve": "CVE-2017-16646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16646" } ], "notes": [ { "category": "general", "text": "drivers/media/usb/dvb-usb/dib0700_devices.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (BUG and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16646", "url": "https://www.suse.com/security/cve/CVE-2017-16646" }, { "category": "external", "summary": "SUSE Bug 1067105 for CVE-2017-16646", "url": "https://bugzilla.suse.com/1067105" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16646", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16646" }, { "cve": "CVE-2017-16647", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16647" } ], "notes": [ { "category": "general", "text": "drivers/net/usb/asix_devices.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16647", "url": "https://www.suse.com/security/cve/CVE-2017-16647" }, { "category": "external", "summary": "SUSE Bug 1067102 for CVE-2017-16647", "url": "https://bugzilla.suse.com/1067102" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16647", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16647" }, { "cve": "CVE-2017-16648", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16648" } ], "notes": [ { "category": "general", "text": "The dvb_frontend_free function in drivers/media/dvb-core/dvb_frontend.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device. NOTE: the function was later renamed __dvb_frontend_free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16648", "url": "https://www.suse.com/security/cve/CVE-2017-16648" }, { "category": "external", "summary": "SUSE Bug 1067087 for CVE-2017-16648", "url": "https://bugzilla.suse.com/1067087" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16648", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16648", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16648" }, { "cve": "CVE-2017-16995", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16995" } ], "notes": [ { "category": "general", "text": "The check_alu_op function in kernel/bpf/verifier.c in the Linux kernel through 4.4 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect sign extension.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16995", "url": "https://www.suse.com/security/cve/CVE-2017-16995" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-16995", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16995" }, { "cve": "CVE-2017-16996", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16996" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging register truncation mishandling.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16996", "url": "https://www.suse.com/security/cve/CVE-2017-16996" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-16996", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16996" }, { "cve": "CVE-2017-17448", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17448" } ], "notes": [ { "category": "general", "text": "net/netfilter/nfnetlink_cthelper.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for new, get, and del operations, which allows local users to bypass intended access restrictions because the nfnl_cthelper_list data structure is shared across all net namespaces.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17448", "url": "https://www.suse.com/security/cve/CVE-2017-17448" }, { "category": "external", "summary": "SUSE Bug 1071693 for CVE-2017-17448", "url": "https://bugzilla.suse.com/1071693" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17448" }, { "cve": "CVE-2017-17449", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17449" } ], "notes": [ { "category": "general", "text": "The __netlink_deliver_tap_skb function in net/netlink/af_netlink.c in the Linux kernel through 4.14.4, when CONFIG_NLMON is enabled, does not restrict observations of Netlink messages to a single net namespace, which allows local users to obtain sensitive information by leveraging the CAP_NET_ADMIN capability to sniff an nlmon interface for all Netlink activity on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17449", "url": "https://www.suse.com/security/cve/CVE-2017-17449" }, { "category": "external", "summary": "SUSE Bug 1071694 for CVE-2017-17449", "url": "https://bugzilla.suse.com/1071694" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17449" }, { "cve": "CVE-2017-17450", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17450" } ], "notes": [ { "category": "general", "text": "net/netfilter/xt_osf.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allows local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all net namespaces.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17450", "url": "https://www.suse.com/security/cve/CVE-2017-17450" }, { "category": "external", "summary": "SUSE Bug 1071695 for CVE-2017-17450", "url": "https://bugzilla.suse.com/1071695" }, { "category": "external", "summary": "SUSE Bug 1074033 for CVE-2017-17450", "url": "https://bugzilla.suse.com/1074033" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-17450", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17450" }, { "cve": "CVE-2017-17852", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17852" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of 32-bit ALU ops.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17852", "url": "https://www.suse.com/security/cve/CVE-2017-17852" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17852", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17852" }, { "cve": "CVE-2017-17853", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17853" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect BPF_RSH signed bounds calculations.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17853", "url": "https://www.suse.com/security/cve/CVE-2017-17853" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17853", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17853" }, { "cve": "CVE-2017-17854", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17854" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (integer overflow and memory corruption) or possibly have unspecified other impact by leveraging unrestricted integer values for pointer arithmetic.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17854", "url": "https://www.suse.com/security/cve/CVE-2017-17854" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17854", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17854" }, { "cve": "CVE-2017-17855", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17855" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging improper use of pointers in place of scalars.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17855", "url": "https://www.suse.com/security/cve/CVE-2017-17855" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17855", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17855" }, { "cve": "CVE-2017-17856", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17856" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging the lack of stack-pointer alignment enforcement.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17856", "url": "https://www.suse.com/security/cve/CVE-2017-17856" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17856", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17856" }, { "cve": "CVE-2017-17857", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17857" } ], "notes": [ { "category": "general", "text": "The check_stack_boundary function in kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of invalid variable stack read operations.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17857", "url": "https://www.suse.com/security/cve/CVE-2017-17857" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17857", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17857" }, { "cve": "CVE-2017-17862", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17862" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 ignores unreachable code, even though it would still be processed by JIT compilers. This behavior, also considered an improper branch-pruning logic issue, could possibly be used by local users for denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17862", "url": "https://www.suse.com/security/cve/CVE-2017-17862" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17862", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17862" }, { "cve": "CVE-2017-5123", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5123" } ], "notes": [ { "category": "general", "text": "Insufficient data validation in waitid allowed an user to escape sandboxes on Linux.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5123", "url": "https://www.suse.com/security/cve/CVE-2017-5123" }, { "category": "external", "summary": "SUSE Bug 1062473 for CVE-2017-5123", "url": "https://bugzilla.suse.com/1062473" }, { "category": "external", "summary": "SUSE Bug 1122971 for CVE-2017-5123", "url": "https://bugzilla.suse.com/1122971" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-5123" }, { "cve": "CVE-2017-5715", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5715" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5715", "url": "https://www.suse.com/security/cve/CVE-2017-5715" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1074741 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074741" }, { "category": "external", "summary": "SUSE Bug 1074919 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074919" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075007 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075007" }, { "category": "external", "summary": "SUSE Bug 1075262 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075262" }, { "category": "external", "summary": "SUSE Bug 1075419 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075419" }, { "category": "external", "summary": "SUSE Bug 1076115 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1076115" }, { "category": "external", "summary": "SUSE Bug 1076372 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1076372" }, { "category": "external", "summary": "SUSE Bug 1076606 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1076606" }, { "category": "external", "summary": "SUSE Bug 1078353 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1078353" }, { "category": "external", "summary": "SUSE Bug 1080039 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1080039" }, { "category": "external", "summary": "SUSE Bug 1087887 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1087887" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1088147 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1088147" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1095735 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1095735" }, { "category": "external", "summary": "SUSE Bug 1102517 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1102517" }, { "category": "external", "summary": "SUSE Bug 1105108 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1105108" }, { "category": "external", "summary": "SUSE Bug 1126516 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1126516" }, { "category": "external", "summary": "SUSE Bug 1173489 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1173489" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201457 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1201457" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1203236 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1203236" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-5715" }, { "cve": "CVE-2017-5753", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5753" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5753", "url": "https://www.suse.com/security/cve/CVE-2017-5753" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075419 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075419" }, { "category": "external", "summary": "SUSE Bug 1075748 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075748" }, { "category": "external", "summary": "SUSE Bug 1080039 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1080039" }, { "category": "external", "summary": "SUSE Bug 1087084 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087084" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1209547 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1209547" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-5753" }, { "cve": "CVE-2017-5754", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5754" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5754", "url": "https://www.suse.com/security/cve/CVE-2017-5754" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075008 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1075008" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1115045 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1115045" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-5754" }, { "cve": "CVE-2017-7541", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7541" } ], "notes": [ { "category": "general", "text": "The brcmf_cfg80211_mgmt_tx function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel before 4.12.3 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted NL80211_CMD_FRAME Netlink packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7541", "url": "https://www.suse.com/security/cve/CVE-2017-7541" }, { "category": "external", "summary": "SUSE Bug 1049645 for CVE-2017-7541", "url": "https://bugzilla.suse.com/1049645" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-7541" }, { "cve": "CVE-2017-7542", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7542" } ], "notes": [ { "category": "general", "text": "The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel through 4.12.3 allows local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7542", "url": "https://www.suse.com/security/cve/CVE-2017-7542" }, { "category": "external", "summary": "SUSE Bug 1049882 for CVE-2017-7542", "url": "https://bugzilla.suse.com/1049882" }, { "category": "external", "summary": "SUSE Bug 1061936 for CVE-2017-7542", "url": "https://bugzilla.suse.com/1061936" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-7542" }, { "cve": "CVE-2017-8824", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-8824" } ], "notes": [ { "category": "general", "text": "The dccp_disconnect function in net/dccp/proto.c in the Linux kernel through 4.14.3 allows local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-8824", "url": "https://www.suse.com/security/cve/CVE-2017-8824" }, { "category": "external", "summary": "SUSE Bug 1070771 for CVE-2017-8824", "url": "https://bugzilla.suse.com/1070771" }, { "category": "external", "summary": "SUSE Bug 1076734 for CVE-2017-8824", "url": "https://bugzilla.suse.com/1076734" }, { "category": "external", "summary": "SUSE Bug 1092904 for CVE-2017-8824", "url": "https://bugzilla.suse.com/1092904" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-8824", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-8824" }, { "cve": "CVE-2017-8831", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-8831" } ], "notes": [ { "category": "general", "text": "The saa7164_bus_get function in drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel through 4.11.5 allows local users to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact by changing a certain sequence-number value, aka a \"double fetch\" vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-8831", "url": "https://www.suse.com/security/cve/CVE-2017-8831" }, { "category": "external", "summary": "SUSE Bug 1037994 for CVE-2017-8831", "url": "https://bugzilla.suse.com/1037994" }, { "category": "external", "summary": "SUSE Bug 1061936 for CVE-2017-8831", "url": "https://bugzilla.suse.com/1061936" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-8831", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-8831", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-8831" }, { "cve": "CVE-2018-1000004", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000004" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000004", "url": "https://www.suse.com/security/cve/CVE-2018-1000004" }, { "category": "external", "summary": "SUSE Bug 1076017 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1076017" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-1000004" }, { "cve": "CVE-2018-10322", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10322" } ], "notes": [ { "category": "general", "text": "The xfs_dinode_verify function in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_ilock_attr_map_shared invalid pointer dereference) via a crafted xfs image.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10322", "url": "https://www.suse.com/security/cve/CVE-2018-10322" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10322", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090749 for CVE-2018-10322", "url": "https://bugzilla.suse.com/1090749" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-10322" }, { "cve": "CVE-2018-10323", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10323" } ], "notes": [ { "category": "general", "text": "The xfs_bmap_extents_to_btree function in fs/xfs/libxfs/xfs_bmap.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_bmapi_write NULL pointer dereference) via a crafted xfs image.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10323", "url": "https://www.suse.com/security/cve/CVE-2018-10323" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10323", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090717 for CVE-2018-10323", "url": "https://bugzilla.suse.com/1090717" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-10323" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-1118", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1118" } ], "notes": [ { "category": "general", "text": "Linux kernel vhost since version 4.8 does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1118", "url": "https://www.suse.com/security/cve/CVE-2018-1118" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1118", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1092472 for CVE-2018-1118", "url": "https://bugzilla.suse.com/1092472" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-1118" }, { "cve": "CVE-2018-12232", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12232" } ], "notes": [ { "category": "general", "text": "In net/socket.c in the Linux kernel through 4.17.1, there is a race condition between fchownat and close in cases where they target the same socket file descriptor, related to the sock_close and sockfs_setattr functions. fchownat does not increment the file descriptor reference count, which allows close to set the socket to NULL during fchownat\u0027s execution, leading to a NULL pointer dereference and system crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12232", "url": "https://www.suse.com/security/cve/CVE-2018-12232" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-12232", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1097593 for CVE-2018-12232", "url": "https://bugzilla.suse.com/1097593" }, { "category": "external", "summary": "SUSE Bug 1125907 for CVE-2018-12232", "url": "https://bugzilla.suse.com/1125907" }, { "category": "external", "summary": "SUSE Bug 1127757 for CVE-2018-12232", "url": "https://bugzilla.suse.com/1127757" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-12232" }, { "cve": "CVE-2018-12714", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12714" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 4.17.2. The filter parsing in kernel/trace/trace_events_filter.c could be called with no filter, which is an N=0 case when it expected at least one line to have been read, thus making the N-1 index invalid. This allows attackers to cause a denial of service (slab out-of-bounds write) or possibly have unspecified other impact via crafted perf_event_open and mmap system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12714", "url": "https://www.suse.com/security/cve/CVE-2018-12714" }, { "category": "external", "summary": "SUSE Bug 1098933 for CVE-2018-12714", "url": "https://bugzilla.suse.com/1098933" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-12714" }, { "cve": "CVE-2018-13053", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-13053" } ], "notes": [ { "category": "general", "text": "The alarm_timer_nsleep function in kernel/time/alarmtimer.c in the Linux kernel through 4.17.3 has an integer overflow via a large relative timeout because ktime_add_safe is not used.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-13053", "url": "https://www.suse.com/security/cve/CVE-2018-13053" }, { "category": "external", "summary": "SUSE Bug 1099924 for CVE-2018-13053", "url": "https://bugzilla.suse.com/1099924" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-13053", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-13053" }, { "cve": "CVE-2018-18710", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-18710" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-18710", "url": "https://www.suse.com/security/cve/CVE-2018-18710" }, { "category": "external", "summary": "SUSE Bug 1113751 for CVE-2018-18710", "url": "https://bugzilla.suse.com/1113751" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-18710" }, { "cve": "CVE-2018-19824", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-19824" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 4.19.6, a local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-19824", "url": "https://www.suse.com/security/cve/CVE-2018-19824" }, { "category": "external", "summary": "SUSE Bug 1118152 for CVE-2018-19824", "url": "https://bugzilla.suse.com/1118152" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-19824" }, { "cve": "CVE-2018-5332", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5332" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 3.2, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5332", "url": "https://www.suse.com/security/cve/CVE-2018-5332" }, { "category": "external", "summary": "SUSE Bug 1075621 for CVE-2018-5332", "url": "https://bugzilla.suse.com/1075621" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-5332", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-5332", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-5332" }, { "cve": "CVE-2018-5333", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5333" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5333", "url": "https://www.suse.com/security/cve/CVE-2018-5333" }, { "category": "external", "summary": "SUSE Bug 1075617 for CVE-2018-5333", "url": "https://bugzilla.suse.com/1075617" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-5333", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-5333" }, { "cve": "CVE-2018-8043", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8043" } ], "notes": [ { "category": "general", "text": "The unimac_mdio_probe function in drivers/net/phy/mdio-bcm-unimac.c in the Linux kernel through 4.15.8 does not validate certain resource availability, which allows local users to cause a denial of service (NULL pointer dereference).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8043", "url": "https://www.suse.com/security/cve/CVE-2018-8043" }, { "category": "external", "summary": "SUSE Bug 1084829 for CVE-2018-8043", "url": "https://bugzilla.suse.com/1084829" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 0, "baseSeverity": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-8043" }, { "cve": "CVE-2018-8087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8087" } ], "notes": [ { "category": "general", "text": "Memory leak in the hwsim_new_radio_nl function in drivers/net/wireless/mac80211_hwsim.c in the Linux kernel through 4.15.9 allows local users to cause a denial of service (memory consumption) by triggering an out-of-array error case.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8087", "url": "https://www.suse.com/security/cve/CVE-2018-8087" }, { "category": "external", "summary": "SUSE Bug 1085053 for CVE-2018-8087", "url": "https://bugzilla.suse.com/1085053" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-8087" }, { "cve": "CVE-2018-8822", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8822" } ], "notes": [ { "category": "general", "text": "Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c in the Linux kernel through 4.15.11, and in drivers/staging/ncpfs/ncplib_kernel.c in the Linux kernel 4.16-rc through 4.16-rc6, could be exploited by malicious NCPFS servers to crash the kernel or execute code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8822", "url": "https://www.suse.com/security/cve/CVE-2018-8822" }, { "category": "external", "summary": "SUSE Bug 1086162 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1086162" }, { "category": "external", "summary": "SUSE Bug 1090404 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1090404" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-8822" }, { "cve": "CVE-2019-10207", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10207" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s Bluetooth implementation of UART, all versions kernel 3.x.x before 4.18.0 and kernel 5.x.x. An attacker with local access and write permissions to the Bluetooth hardware could use this flaw to issue a specially crafted ioctl function call and cause the system to crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10207", "url": "https://www.suse.com/security/cve/CVE-2019-10207" }, { "category": "external", "summary": "SUSE Bug 1123959 for CVE-2019-10207", "url": "https://bugzilla.suse.com/1123959" }, { "category": "external", "summary": "SUSE Bug 1142857 for CVE-2019-10207", "url": "https://bugzilla.suse.com/1142857" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2019-10207" }, { "cve": "CVE-2019-11477", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11477" } ], "notes": [ { "category": "general", "text": "Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11477", "url": "https://www.suse.com/security/cve/CVE-2019-11477" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1137586 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1137586" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1142129" }, { "category": "external", "summary": "SUSE Bug 1153242 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1153242" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-11477" }, { "cve": "CVE-2019-11478", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11478" } ], "notes": [ { "category": "general", "text": "Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11478", "url": "https://www.suse.com/security/cve/CVE-2019-11478" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1137586 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1137586" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1142129" }, { "category": "external", "summary": "SUSE Bug 1143542 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1143542" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-11478" }, { "cve": "CVE-2019-11479", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11479" } ], "notes": [ { "category": "general", "text": "Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11479", "url": "https://www.suse.com/security/cve/CVE-2019-11479" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2019-11479", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1137586 for CVE-2019-11479", "url": "https://bugzilla.suse.com/1137586" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-11479", "url": "https://bugzilla.suse.com/1142129" }, { "category": "external", "summary": "SUSE Bug 1143542 for CVE-2019-11479", "url": "https://bugzilla.suse.com/1143542" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-11479" }, { "cve": "CVE-2019-14615", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14615" } ], "notes": [ { "category": "general", "text": "Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may allow an unauthenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14615", "url": "https://www.suse.com/security/cve/CVE-2019-14615" }, { "category": "external", "summary": "SUSE Bug 1160195 for CVE-2019-14615", "url": "https://bugzilla.suse.com/1160195" }, { "category": "external", "summary": "SUSE Bug 1165881 for CVE-2019-14615", "url": "https://bugzilla.suse.com/1165881" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-14615" }, { "cve": "CVE-2019-14814", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14814" } ], "notes": [ { "category": "general", "text": "There is heap-based buffer overflow in Linux kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14814", "url": "https://www.suse.com/security/cve/CVE-2019-14814" }, { "category": "external", "summary": "SUSE Bug 1146512 for CVE-2019-14814", "url": "https://bugzilla.suse.com/1146512" }, { "category": "external", "summary": "SUSE Bug 1173664 for CVE-2019-14814", "url": "https://bugzilla.suse.com/1173664" }, { "category": "external", "summary": "SUSE Bug 1173665 for CVE-2019-14814", "url": "https://bugzilla.suse.com/1173665" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-14814" }, { "cve": "CVE-2019-14896", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14896" } ], "notes": [ { "category": "general", "text": "A heap-based buffer overflow vulnerability was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14896", "url": "https://www.suse.com/security/cve/CVE-2019-14896" }, { "category": "external", "summary": "SUSE Bug 1157157 for CVE-2019-14896", "url": "https://bugzilla.suse.com/1157157" }, { "category": "external", "summary": "SUSE Bug 1160468 for CVE-2019-14896", "url": "https://bugzilla.suse.com/1160468" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-14896" }, { "cve": "CVE-2019-15030", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15030" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users\u0027 processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15030", "url": "https://www.suse.com/security/cve/CVE-2019-15030" }, { "category": "external", "summary": "SUSE Bug 1149713 for CVE-2019-15030", "url": "https://bugzilla.suse.com/1149713" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15030" }, { "cve": "CVE-2019-15031", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15031" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users\u0027 processes via an interrupt. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process, because MSR_TM_ACTIVE is misused in arch/powerpc/kernel/process.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15031", "url": "https://www.suse.com/security/cve/CVE-2019-15031" }, { "category": "external", "summary": "SUSE Bug 1149713 for CVE-2019-15031", "url": "https://bugzilla.suse.com/1149713" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15031" }, { "cve": "CVE-2019-15098", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15098" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/ath/ath6kl/usb.c in the Linux kernel through 5.2.9 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15098", "url": "https://www.suse.com/security/cve/CVE-2019-15098" }, { "category": "external", "summary": "SUSE Bug 1146378 for CVE-2019-15098", "url": "https://bugzilla.suse.com/1146378" }, { "category": "external", "summary": "SUSE Bug 1146543 for CVE-2019-15098", "url": "https://bugzilla.suse.com/1146543" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15098" }, { "cve": "CVE-2019-15099", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15099" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/ath/ath10k/usb.c in the Linux kernel through 5.2.8 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15099", "url": "https://www.suse.com/security/cve/CVE-2019-15099" }, { "category": "external", "summary": "SUSE Bug 1146368 for CVE-2019-15099", "url": "https://bugzilla.suse.com/1146368" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15099" }, { "cve": "CVE-2019-15290", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15290" } ], "notes": [ { "category": "general", "text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-15098. Reason: This candidate is a duplicate of CVE-2019-15098. Notes: All CVE users should reference CVE-2019-15098 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15290", "url": "https://www.suse.com/security/cve/CVE-2019-15290" }, { "category": "external", "summary": "SUSE Bug 1146378 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1146378" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1146519" }, { "category": "external", "summary": "SUSE Bug 1146543 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1146543" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1158834" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15290" }, { "cve": "CVE-2019-15504", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15504" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/rsi/rsi_91x_usb.c in the Linux kernel through 5.2.9 has a Double Free via crafted USB device traffic (which may be remote via usbip or usbredir).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15504", "url": "https://www.suse.com/security/cve/CVE-2019-15504" }, { "category": "external", "summary": "SUSE Bug 1147116 for CVE-2019-15504", "url": "https://bugzilla.suse.com/1147116" }, { "category": "external", "summary": "SUSE Bug 1185852 for CVE-2019-15504", "url": "https://bugzilla.suse.com/1185852" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-15504" }, { "cve": "CVE-2019-15902", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15902" } ], "notes": [ { "category": "general", "text": "A backporting error was discovered in the Linux stable/longterm kernel 4.4.x through 4.4.190, 4.9.x through 4.9.190, 4.14.x through 4.14.141, 4.19.x through 4.19.69, and 5.2.x through 5.2.11. Misuse of the upstream \"x86/ptrace: Fix possible spectre-v1 in ptrace_get_debugreg()\" commit reintroduced the Spectre vulnerability that it aimed to eliminate. This occurred because the backport process depends on cherry picking specific commits, and because two (correctly ordered) code lines were swapped.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15902", "url": "https://www.suse.com/security/cve/CVE-2019-15902" }, { "category": "external", "summary": "SUSE Bug 1149376 for CVE-2019-15902", "url": "https://bugzilla.suse.com/1149376" }, { "category": "external", "summary": "SUSE Bug 1155131 for CVE-2019-15902", "url": "https://bugzilla.suse.com/1155131" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15902" }, { "cve": "CVE-2019-16231", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16231" } ], "notes": [ { "category": "general", "text": "drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16231", "url": "https://www.suse.com/security/cve/CVE-2019-16231" }, { "category": "external", "summary": "SUSE Bug 1150466 for CVE-2019-16231", "url": "https://bugzilla.suse.com/1150466" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-16231" }, { "cve": "CVE-2019-16232", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16232" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16232", "url": "https://www.suse.com/security/cve/CVE-2019-16232" }, { "category": "external", "summary": "SUSE Bug 1150465 for CVE-2019-16232", "url": "https://bugzilla.suse.com/1150465" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-16232" }, { "cve": "CVE-2019-16234", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16234" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16234", "url": "https://www.suse.com/security/cve/CVE-2019-16234" }, { "category": "external", "summary": "SUSE Bug 1150452 for CVE-2019-16234", "url": "https://bugzilla.suse.com/1150452" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2019-16234" }, { "cve": "CVE-2019-17133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-17133" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-17133", "url": "https://www.suse.com/security/cve/CVE-2019-17133" }, { "category": "external", "summary": "SUSE Bug 1153158 for CVE-2019-17133", "url": "https://bugzilla.suse.com/1153158" }, { "category": "external", "summary": "SUSE Bug 1153161 for CVE-2019-17133", "url": "https://bugzilla.suse.com/1153161" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-17133" }, { "cve": "CVE-2019-17666", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-17666" } ], "notes": [ { "category": "general", "text": "rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-17666", "url": "https://www.suse.com/security/cve/CVE-2019-17666" }, { "category": "external", "summary": "SUSE Bug 1154372 for CVE-2019-17666", "url": "https://bugzilla.suse.com/1154372" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-17666" }, { "cve": "CVE-2019-18808", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-18808" } ], "notes": [ { "category": "general", "text": "A memory leak in the ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-128c66429247.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-18808", "url": "https://www.suse.com/security/cve/CVE-2019-18808" }, { "category": "external", "summary": "SUSE Bug 1156259 for CVE-2019-18808", "url": "https://bugzilla.suse.com/1156259" }, { "category": "external", "summary": "SUSE Bug 1189884 for CVE-2019-18808", "url": "https://bugzilla.suse.com/1189884" }, { "category": "external", "summary": "SUSE Bug 1190534 for CVE-2019-18808", "url": "https://bugzilla.suse.com/1190534" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-18808" }, { "cve": "CVE-2019-18812", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-18812" } ], "notes": [ { "category": "general", "text": "A memory leak in the sof_dfsentry_write() function in sound/soc/sof/debug.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-c0a333d842ef.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-18812", "url": "https://www.suse.com/security/cve/CVE-2019-18812" }, { "category": "external", "summary": "SUSE Bug 1156277 for CVE-2019-18812", "url": "https://bugzilla.suse.com/1156277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-18812" }, { "cve": "CVE-2019-18813", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-18813" } ], "notes": [ { "category": "general", "text": "A memory leak in the dwc3_pci_probe() function in drivers/usb/dwc3/dwc3-pci.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering platform_device_add_properties() failures, aka CID-9bbfceea12a8.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-18813", "url": "https://www.suse.com/security/cve/CVE-2019-18813" }, { "category": "external", "summary": "SUSE Bug 1156278 for CVE-2019-18813", "url": "https://bugzilla.suse.com/1156278" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-18813" }, { "cve": "CVE-2019-19252", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19252" } ], "notes": [ { "category": "general", "text": "vcs_write in drivers/tty/vt/vc_screen.c in the Linux kernel through 5.3.13 does not prevent write access to vcsu devices, aka CID-0c9acb1af77a.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19252", "url": "https://www.suse.com/security/cve/CVE-2019-19252" }, { "category": "external", "summary": "SUSE Bug 1157813 for CVE-2019-19252", "url": "https://bugzilla.suse.com/1157813" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-19252" }, { "cve": "CVE-2019-19332", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19332" } ], "notes": [ { "category": "general", "text": "An out-of-bounds memory write issue was found in the Linux Kernel, version 3.13 through 5.4, in the way the Linux kernel\u0027s KVM hypervisor handled the \u0027KVM_GET_EMULATED_CPUID\u0027 ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the \u0027/dev/kvm\u0027 device could use this flaw to crash the system, resulting in a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19332", "url": "https://www.suse.com/security/cve/CVE-2019-19332" }, { "category": "external", "summary": "SUSE Bug 1158827 for CVE-2019-19332", "url": "https://bugzilla.suse.com/1158827" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-19332" }, { "cve": "CVE-2019-19338", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19338" } ], "notes": [ { "category": "general", "text": "A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions before 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA flaw (TAA_NO=0), but is not affected by the MDS issue (MDS_NO=1), the guest was to clear the affected buffers by using a VERW instruction mechanism. But when the MDS_NO=1 bit was exported to the guests, the guests did not use the VERW mechanism to clear the affected buffers. This issue affects guests running on Cascade Lake CPUs and requires that host has \u0027TSX\u0027 enabled. Confidentiality of data is the highest threat associated with this vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19338", "url": "https://www.suse.com/security/cve/CVE-2019-19338" }, { "category": "external", "summary": "SUSE Bug 1158954 for CVE-2019-19338", "url": "https://bugzilla.suse.com/1158954" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-19338" }, { "cve": "CVE-2019-3016", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3016" } ], "notes": [ { "category": "general", "text": "In a Linux KVM guest that has PV TLB enabled, a process in the guest kernel may be able to read memory locations from another process in the same guest. This problem is limit to the host running linux kernel 4.10 with a guest running linux kernel 4.16 or later. The problem mainly affects AMD processors but Intel CPUs cannot be ruled out.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3016", "url": "https://www.suse.com/security/cve/CVE-2019-3016" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2019-3016", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1161154 for CVE-2019-3016", "url": "https://bugzilla.suse.com/1161154" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-3016" }, { "cve": "CVE-2019-3846", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3846" } ], "notes": [ { "category": "general", "text": "A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3846", "url": "https://www.suse.com/security/cve/CVE-2019-3846" }, { "category": "external", "summary": "SUSE Bug 1136424 for CVE-2019-3846", "url": "https://bugzilla.suse.com/1136424" }, { "category": "external", "summary": "SUSE Bug 1136446 for CVE-2019-3846", "url": "https://bugzilla.suse.com/1136446" }, { "category": "external", "summary": "SUSE Bug 1156330 for CVE-2019-3846", "url": "https://bugzilla.suse.com/1156330" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-3846" }, { "cve": "CVE-2019-3882", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3882" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s vfio interface implementation that permits violation of the user\u0027s locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS). Versions 3.10, 4.14 and 4.18 are vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3882", "url": "https://www.suse.com/security/cve/CVE-2019-3882" }, { "category": "external", "summary": "SUSE Bug 1131416 for CVE-2019-3882", "url": "https://bugzilla.suse.com/1131416" }, { "category": "external", "summary": "SUSE Bug 1131427 for CVE-2019-3882", "url": "https://bugzilla.suse.com/1131427" }, { "category": "external", "summary": "SUSE Bug 1133319 for CVE-2019-3882", "url": "https://bugzilla.suse.com/1133319" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-3882" }, { "cve": "CVE-2019-3887", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3887" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way KVM hypervisor handled x2APIC Machine Specific Rregister (MSR) access with nested(=1) virtualization enabled. In that, L1 guest could access L0\u0027s APIC register values via L2 guest, when \u0027virtualize x2APIC mode\u0027 is enabled. A guest could use this flaw to potentially crash the host kernel resulting in DoS issue. Kernel versions from 4.16 and newer are vulnerable to this issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3887", "url": "https://www.suse.com/security/cve/CVE-2019-3887" }, { "category": "external", "summary": "SUSE Bug 1131800 for CVE-2019-3887", "url": "https://bugzilla.suse.com/1131800" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-3887" }, { "cve": "CVE-2019-6974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6974" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6974", "url": "https://www.suse.com/security/cve/CVE-2019-6974" }, { "category": "external", "summary": "SUSE Bug 1124728 for CVE-2019-6974", "url": "https://bugzilla.suse.com/1124728" }, { "category": "external", "summary": "SUSE Bug 1124729 for CVE-2019-6974", "url": "https://bugzilla.suse.com/1124729" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-6974" }, { "cve": "CVE-2019-7221", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7221" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7221", "url": "https://www.suse.com/security/cve/CVE-2019-7221" }, { "category": "external", "summary": "SUSE Bug 1124732 for CVE-2019-7221", "url": "https://bugzilla.suse.com/1124732" }, { "category": "external", "summary": "SUSE Bug 1124734 for CVE-2019-7221", "url": "https://bugzilla.suse.com/1124734" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-7221" }, { "cve": "CVE-2019-7222", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7222" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7222", "url": "https://www.suse.com/security/cve/CVE-2019-7222" }, { "category": "external", "summary": "SUSE Bug 1124735 for CVE-2019-7222", "url": "https://bugzilla.suse.com/1124735" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2019-7222" }, { "cve": "CVE-2019-8564", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8564" } ], "notes": [ { "category": "general", "text": "A logic issue was addressed with improved validation. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra. An attacker in a privileged network position can modify driver state.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8564", "url": "https://www.suse.com/security/cve/CVE-2019-8564" }, { "category": "external", "summary": "SUSE Bug 1132673 for CVE-2019-8564", "url": "https://bugzilla.suse.com/1132673" }, { "category": "external", "summary": "SUSE Bug 1132828 for CVE-2019-8564", "url": "https://bugzilla.suse.com/1132828" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-8564" }, { "cve": "CVE-2019-8912", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8912" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 4.20.11, af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8912", "url": "https://www.suse.com/security/cve/CVE-2019-8912" }, { "category": "external", "summary": "SUSE Bug 1125907 for CVE-2019-8912", "url": "https://bugzilla.suse.com/1125907" }, { "category": "external", "summary": "SUSE Bug 1126284 for CVE-2019-8912", "url": "https://bugzilla.suse.com/1126284" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-8912" }, { "cve": "CVE-2019-9500", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9500" } ], "notes": [ { "category": "general", "text": "The Broadcom brcmfmac WiFi driver prior to commit 1b5e2423164b3670e8bc9174e4762d297990deff is vulnerable to a heap buffer overflow. If the Wake-up on Wireless LAN functionality is configured, a malicious event frame can be constructed to trigger an heap buffer overflow in the brcmf_wowl_nd_results function. This vulnerability can be exploited with compromised chipsets to compromise the host, or when used in combination with CVE-2019-9503, can be used remotely. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9500", "url": "https://www.suse.com/security/cve/CVE-2019-9500" }, { "category": "external", "summary": "SUSE Bug 1132681 for CVE-2019-9500", "url": "https://bugzilla.suse.com/1132681" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-9500" }, { "cve": "CVE-2020-10135", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10135" } ], "notes": [ { "category": "general", "text": "Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10135", "url": "https://www.suse.com/security/cve/CVE-2020-10135" }, { "category": "external", "summary": "SUSE Bug 1171988 for CVE-2020-10135", "url": "https://bugzilla.suse.com/1171988" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-10135" }, { "cve": "CVE-2020-10766", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10766" } ], "notes": [ { "category": "general", "text": "A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10766", "url": "https://www.suse.com/security/cve/CVE-2020-10766" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172781 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1172781" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-10766" }, { "cve": "CVE-2020-10767", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10767" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10767", "url": "https://www.suse.com/security/cve/CVE-2020-10767" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172782 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1172782" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-10767" }, { "cve": "CVE-2020-10768", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10768" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10768", "url": "https://www.suse.com/security/cve/CVE-2020-10768" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172783 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1172783" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-10768" }, { "cve": "CVE-2020-12351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12351" } ], "notes": [ { "category": "general", "text": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12351", "url": "https://www.suse.com/security/cve/CVE-2020-12351" }, { "category": "external", "summary": "SUSE Bug 1177724 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177724" }, { "category": "external", "summary": "SUSE Bug 1177729 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177729" }, { "category": "external", "summary": "SUSE Bug 1178397 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1178397" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-12351" }, { "cve": "CVE-2020-12352", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12352" } ], "notes": [ { "category": "general", "text": "Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12352", "url": "https://www.suse.com/security/cve/CVE-2020-12352" }, { "category": "external", "summary": "SUSE Bug 1177725 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1177725" }, { "category": "external", "summary": "SUSE Bug 1178398 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1178398" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-12352" }, { "cve": "CVE-2020-14331", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14331" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14331", "url": "https://www.suse.com/security/cve/CVE-2020-14331" }, { "category": "external", "summary": "SUSE Bug 1174205 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174205" }, { "category": "external", "summary": "SUSE Bug 1174247 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14331" }, { "cve": "CVE-2020-14386", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14386" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14386", "url": "https://www.suse.com/security/cve/CVE-2020-14386" }, { "category": "external", "summary": "SUSE Bug 1176069 for CVE-2020-14386", "url": "https://bugzilla.suse.com/1176069" }, { "category": "external", "summary": "SUSE Bug 1176072 for CVE-2020-14386", "url": "https://bugzilla.suse.com/1176072" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14386" }, { "cve": "CVE-2020-24586", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24586" } ], "notes": [ { "category": "general", "text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24586", "url": "https://www.suse.com/security/cve/CVE-2020-24586" }, { "category": "external", "summary": "SUSE Bug 1185859 for CVE-2020-24586", "url": "https://bugzilla.suse.com/1185859" }, { "category": "external", "summary": "SUSE Bug 1192868 for CVE-2020-24586", "url": "https://bugzilla.suse.com/1192868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-24586" }, { "cve": "CVE-2020-24587", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24587" } ], "notes": [ { "category": "general", "text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24587", "url": "https://www.suse.com/security/cve/CVE-2020-24587" }, { "category": "external", "summary": "SUSE Bug 1185859 for CVE-2020-24587", "url": "https://bugzilla.suse.com/1185859" }, { "category": "external", "summary": "SUSE Bug 1185862 for CVE-2020-24587", "url": "https://bugzilla.suse.com/1185862" }, { "category": "external", "summary": "SUSE Bug 1192868 for CVE-2020-24587", "url": "https://bugzilla.suse.com/1192868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-24587" }, { "cve": "CVE-2020-24588", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24588" } ], "notes": [ { "category": "general", "text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24588", "url": "https://www.suse.com/security/cve/CVE-2020-24588" }, { "category": "external", "summary": "SUSE Bug 1185861 for CVE-2020-24588", "url": "https://bugzilla.suse.com/1185861" }, { "category": "external", "summary": "SUSE Bug 1192868 for CVE-2020-24588", "url": "https://bugzilla.suse.com/1192868" }, { "category": "external", "summary": "SUSE Bug 1199701 for CVE-2020-24588", "url": "https://bugzilla.suse.com/1199701" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-24588" }, { "cve": "CVE-2020-25639", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25639" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s GPU Nouveau driver functionality in versions prior to 5.12-rc1 in the way the user calls ioctl DRM_IOCTL_NOUVEAU_CHANNEL_ALLOC. This flaw allows a local user to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25639", "url": "https://www.suse.com/security/cve/CVE-2020-25639" }, { "category": "external", "summary": "SUSE Bug 1176846 for CVE-2020-25639", "url": "https://bugzilla.suse.com/1176846" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-25639" }, { "cve": "CVE-2020-25656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25656" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25656", "url": "https://www.suse.com/security/cve/CVE-2020-25656" }, { "category": "external", "summary": "SUSE Bug 1177766 for CVE-2020-25656", "url": "https://bugzilla.suse.com/1177766" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-25656" }, { "cve": "CVE-2020-25668", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25668" } ], "notes": [ { "category": "general", "text": "A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25668", "url": "https://www.suse.com/security/cve/CVE-2020-25668" }, { "category": "external", "summary": "SUSE Bug 1178123 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1178123" }, { "category": "external", "summary": "SUSE Bug 1178622 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1178622" }, { "category": "external", "summary": "SUSE Bug 1196914 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1196914" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-25668" }, { "cve": "CVE-2020-26141", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-26141" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-26141", "url": "https://www.suse.com/security/cve/CVE-2020-26141" }, { "category": "external", "summary": "SUSE Bug 1185987 for CVE-2020-26141", "url": "https://bugzilla.suse.com/1185987" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-26141" }, { "cve": "CVE-2020-2732", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2732" } ], "notes": [ { "category": "general", "text": "A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2732", "url": "https://www.suse.com/security/cve/CVE-2020-2732" }, { "category": "external", "summary": "SUSE Bug 1163971 for CVE-2020-2732", "url": "https://bugzilla.suse.com/1163971" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.2, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-2732" }, { "cve": "CVE-2020-29660", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29660" } ], "notes": [ { "category": "general", "text": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29660", "url": "https://www.suse.com/security/cve/CVE-2020-29660" }, { "category": "external", "summary": "SUSE Bug 1179745 for CVE-2020-29660", "url": "https://bugzilla.suse.com/1179745" }, { "category": "external", "summary": "SUSE Bug 1179877 for CVE-2020-29660", "url": "https://bugzilla.suse.com/1179877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-29660" }, { "cve": "CVE-2020-29661", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29661" } ], "notes": [ { "category": "general", "text": "A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29661", "url": "https://www.suse.com/security/cve/CVE-2020-29661" }, { "category": "external", "summary": "SUSE Bug 1179745 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1179745" }, { "category": "external", "summary": "SUSE Bug 1179877 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1179877" }, { "category": "external", "summary": "SUSE Bug 1214268 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1214268" }, { "category": "external", "summary": "SUSE Bug 1218966 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1218966" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-29661" }, { "cve": "CVE-2020-8648", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8648" } ], "notes": [ { "category": "general", "text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8648", "url": "https://www.suse.com/security/cve/CVE-2020-8648" }, { "category": "external", "summary": "SUSE Bug 1162928 for CVE-2020-8648", "url": "https://bugzilla.suse.com/1162928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-8648" }, { "cve": "CVE-2020-8694", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8694" } ], "notes": [ { "category": "general", "text": "Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8694", "url": "https://www.suse.com/security/cve/CVE-2020-8694" }, { "category": "external", "summary": "SUSE Bug 1170415 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1170415" }, { "category": "external", "summary": "SUSE Bug 1170446 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1170446" }, { "category": "external", "summary": "SUSE Bug 1178591 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1178591" }, { "category": "external", "summary": "SUSE Bug 1178700 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1178700" }, { "category": "external", "summary": "SUSE Bug 1179661 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1179661" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-8694" }, { "cve": "CVE-2021-23133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-23133" } ], "notes": [ { "category": "general", "text": "A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-23133", "url": "https://www.suse.com/security/cve/CVE-2021-23133" }, { "category": "external", "summary": "SUSE Bug 1184675 for CVE-2021-23133", "url": "https://bugzilla.suse.com/1184675" }, { "category": "external", "summary": "SUSE Bug 1185901 for CVE-2021-23133", "url": "https://bugzilla.suse.com/1185901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-23133" }, { "cve": "CVE-2021-26708", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-26708" } ], "notes": [ { "category": "general", "text": "A local privilege escalation was discovered in the Linux kernel before 5.10.13. Multiple race conditions in the AF_VSOCK implementation are caused by wrong locking in net/vmw_vsock/af_vsock.c. The race conditions were implicitly introduced in the commits that added VSOCK multi-transport support.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-26708", "url": "https://www.suse.com/security/cve/CVE-2021-26708" }, { "category": "external", "summary": "SUSE Bug 1181806 for CVE-2021-26708", "url": "https://bugzilla.suse.com/1181806" }, { "category": "external", "summary": "SUSE Bug 1183298 for CVE-2021-26708", "url": "https://bugzilla.suse.com/1183298" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-26708" }, { "cve": "CVE-2021-28971", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-28971" } ], "notes": [ { "category": "general", "text": "In intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c in the Linux kernel through 5.11.8 on some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled, aka CID-d88d05a9e0b6.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-28971", "url": "https://www.suse.com/security/cve/CVE-2021-28971" }, { "category": "external", "summary": "SUSE Bug 1184196 for CVE-2021-28971", "url": "https://bugzilla.suse.com/1184196" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-28971" }, { "cve": "CVE-2021-32606", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32606" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 5.11 through 5.12.2, isotp_setsockopt in net/can/isotp.c allows privilege escalation to root by leveraging a use-after-free. (This does not affect earlier versions that lack CAN ISOTP SF_BROADCAST support.)", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32606", "url": "https://www.suse.com/security/cve/CVE-2021-32606" }, { "category": "external", "summary": "SUSE Bug 1185953 for CVE-2021-32606", "url": "https://bugzilla.suse.com/1185953" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-32606" }, { "cve": "CVE-2021-33909", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-33909" } ], "notes": [ { "category": "general", "text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-33909", "url": "https://www.suse.com/security/cve/CVE-2021-33909" }, { "category": "external", "summary": "SUSE Bug 1188062 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1188062" }, { "category": "external", "summary": "SUSE Bug 1188063 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1188063" }, { "category": "external", "summary": "SUSE Bug 1188257 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1188257" }, { "category": "external", "summary": "SUSE Bug 1189302 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1189302" }, { "category": "external", "summary": "SUSE Bug 1190859 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1190859" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-33909" }, { "cve": "CVE-2021-3483", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3483" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Nosy driver in the Linux kernel. This issue allows a device to be inserted twice into a doubly-linked list, leading to a use-after-free when one of these devices is removed. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. Versions before kernel 5.12-rc6 are affected", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3483", "url": "https://www.suse.com/security/cve/CVE-2021-3483" }, { "category": "external", "summary": "SUSE Bug 1184393 for CVE-2021-3483", "url": "https://bugzilla.suse.com/1184393" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-3483" }, { "cve": "CVE-2021-3489", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3489" } ], "notes": [ { "category": "general", "text": "The eBPF RINGBUF bpf_ringbuf_reserve() function in the Linux kernel did not check that the allocated size was smaller than the ringbuf size, allowing an attacker to perform out-of-bounds writes within the kernel and therefore, arbitrary code execution. This issue was fixed via commit 4b81ccebaeee (\"bpf, ringbuf: Deny reserve of buffers larger than ringbuf\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced via 457f44363a88 (\"bpf: Implement BPF ring buffer and verifier support for it\") (v5.8-rc1).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3489", "url": "https://www.suse.com/security/cve/CVE-2021-3489" }, { "category": "external", "summary": "SUSE Bug 1185640 for CVE-2021-3489", "url": "https://bugzilla.suse.com/1185640" }, { "category": "external", "summary": "SUSE Bug 1185856 for CVE-2021-3489", "url": "https://bugzilla.suse.com/1185856" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3489" }, { "cve": "CVE-2021-3490", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3490" } ], "notes": [ { "category": "general", "text": "The eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) in the Linux kernel did not properly update 32-bit bounds, which could be turned into out of bounds reads and writes in the Linux kernel and therefore, arbitrary code execution. This issue was fixed via commit 049c4e13714e (\"bpf: Fix alu32 const subreg bound tracking on bitwise operations\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. The AND/OR issues were introduced by commit 3f50f132d840 (\"bpf: Verifier, do explicit ALU32 bounds tracking\") (5.7-rc1) and the XOR variant was introduced by 2921c90d4718 (\"bpf:Fix a verifier failure with xor\") ( 5.10-rc1).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3490", "url": "https://www.suse.com/security/cve/CVE-2021-3490" }, { "category": "external", "summary": "SUSE Bug 1185641 for CVE-2021-3490", "url": "https://bugzilla.suse.com/1185641" }, { "category": "external", "summary": "SUSE Bug 1185796 for CVE-2021-3490", "url": "https://bugzilla.suse.com/1185796" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3490" }, { "cve": "CVE-2021-3491", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3491" } ], "notes": [ { "category": "general", "text": "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3491", "url": "https://www.suse.com/security/cve/CVE-2021-3491" }, { "category": "external", "summary": "SUSE Bug 1185642 for CVE-2021-3491", "url": "https://bugzilla.suse.com/1185642" }, { "category": "external", "summary": "SUSE Bug 1187090 for CVE-2021-3491", "url": "https://bugzilla.suse.com/1187090" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3491" }, { "cve": "CVE-2021-3542", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3542" } ], "notes": [ { "category": "general", "text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-42739. Reason: This candidate is a reservation duplicate of CVE-2021-42739. Notes: All CVE users should reference CVE-2021-42739 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3542", "url": "https://www.suse.com/security/cve/CVE-2021-3542" }, { "category": "external", "summary": "SUSE Bug 1184673 for CVE-2021-3542", "url": "https://bugzilla.suse.com/1184673" }, { "category": "external", "summary": "SUSE Bug 1186063 for CVE-2021-3542", "url": "https://bugzilla.suse.com/1186063" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3542" }, { "cve": "CVE-2021-3640", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3640" } ], "notes": [ { "category": "general", "text": "A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3640", "url": "https://www.suse.com/security/cve/CVE-2021-3640" }, { "category": "external", "summary": "SUSE Bug 1188172 for CVE-2021-3640", "url": "https://bugzilla.suse.com/1188172" }, { "category": "external", "summary": "SUSE Bug 1188613 for CVE-2021-3640", "url": "https://bugzilla.suse.com/1188613" }, { "category": "external", "summary": "SUSE Bug 1191530 for CVE-2021-3640", "url": "https://bugzilla.suse.com/1191530" }, { "category": "external", "summary": "SUSE Bug 1196810 for CVE-2021-3640", "url": "https://bugzilla.suse.com/1196810" }, { "category": "external", "summary": "SUSE Bug 1196914 for CVE-2021-3640", "url": "https://bugzilla.suse.com/1196914" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3640" }, { "cve": "CVE-2021-3653", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3653" } ], "notes": [ { "category": "general", "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"int_ctl\" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3653", "url": "https://www.suse.com/security/cve/CVE-2021-3653" }, { "category": "external", "summary": "SUSE Bug 1189399 for CVE-2021-3653", "url": "https://bugzilla.suse.com/1189399" }, { "category": "external", "summary": "SUSE Bug 1189420 for CVE-2021-3653", "url": "https://bugzilla.suse.com/1189420" }, { "category": "external", "summary": "SUSE Bug 1196914 for CVE-2021-3653", "url": "https://bugzilla.suse.com/1196914" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3653" }, { "cve": "CVE-2021-3656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3656" } ], "notes": [ { "category": "general", "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"virt_ext\" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3656", "url": "https://www.suse.com/security/cve/CVE-2021-3656" }, { "category": "external", "summary": "SUSE Bug 1189400 for CVE-2021-3656", "url": "https://bugzilla.suse.com/1189400" }, { "category": "external", "summary": "SUSE Bug 1189418 for CVE-2021-3656", "url": "https://bugzilla.suse.com/1189418" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3656" }, { "cve": "CVE-2021-3744", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3744" } ], "notes": [ { "category": "general", "text": "A memory leak flaw was found in the Linux kernel in the ccp_run_aes_gcm_cmd() function in drivers/crypto/ccp/ccp-ops.c, which allows attackers to cause a denial of service (memory consumption). This vulnerability is similar with the older CVE-2019-18808.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3744", "url": "https://www.suse.com/security/cve/CVE-2021-3744" }, { "category": "external", "summary": "SUSE Bug 1189884 for CVE-2021-3744", "url": "https://bugzilla.suse.com/1189884" }, { "category": "external", "summary": "SUSE Bug 1190534 for CVE-2021-3744", "url": "https://bugzilla.suse.com/1190534" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-3744" }, { "cve": "CVE-2021-3753", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3753" } ], "notes": [ { "category": "general", "text": "A race problem was seen in the vt_k_ioctl in drivers/tty/vt/vt_ioctl.c in the Linux kernel, which may cause an out of bounds read in vt as the write access to vc_mode is not protected by lock-in vt_ioctl (KDSETMDE). The highest threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3753", "url": "https://www.suse.com/security/cve/CVE-2021-3753" }, { "category": "external", "summary": "SUSE Bug 1190025 for CVE-2021-3753", "url": "https://bugzilla.suse.com/1190025" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-3753" }, { "cve": "CVE-2021-37576", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-37576" } ], "notes": [ { "category": "general", "text": "arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-37576", "url": "https://www.suse.com/security/cve/CVE-2021-37576" }, { "category": "external", "summary": "SUSE Bug 1188838 for CVE-2021-37576", "url": "https://bugzilla.suse.com/1188838" }, { "category": "external", "summary": "SUSE Bug 1188842 for CVE-2021-37576", "url": "https://bugzilla.suse.com/1188842" }, { "category": "external", "summary": "SUSE Bug 1190276 for CVE-2021-37576", "url": "https://bugzilla.suse.com/1190276" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-37576" }, { "cve": "CVE-2021-3759", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3759" } ], "notes": [ { "category": "general", "text": "A memory overflow vulnerability was found in the Linux kernel\u0027s ipc functionality of the memcg subsystem, in the way a user calls the semget function multiple times, creating semaphores. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3759", "url": "https://www.suse.com/security/cve/CVE-2021-3759" }, { "category": "external", "summary": "SUSE Bug 1190115 for CVE-2021-3759", "url": "https://bugzilla.suse.com/1190115" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-3759" }, { "cve": "CVE-2021-38166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-38166" } ], "notes": [ { "category": "general", "text": "In kernel/bpf/hashtab.c in the Linux kernel through 5.13.8, there is an integer overflow and out-of-bounds write when many elements are placed in a single bucket. NOTE: exploitation might be impractical without the CAP_SYS_ADMIN capability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-38166", "url": "https://www.suse.com/security/cve/CVE-2021-38166" }, { "category": "external", "summary": "SUSE Bug 1189233 for CVE-2021-38166", "url": "https://bugzilla.suse.com/1189233" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-38166" }, { "cve": "CVE-2021-43976", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-43976" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.15.2, mwifiex_usb_recv in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker (who can connect a crafted USB device) to cause a denial of service (skb_over_panic).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-43976", "url": "https://www.suse.com/security/cve/CVE-2021-43976" }, { "category": "external", "summary": "SUSE Bug 1192847 for CVE-2021-43976", "url": "https://bugzilla.suse.com/1192847" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-43976" }, { "cve": "CVE-2022-0185", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0185" } ], "notes": [ { "category": "general", "text": "A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length. An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a filesystem that does not support the Filesystem Context API (and thus fallbacks to legacy handling) could use this flaw to escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0185", "url": "https://www.suse.com/security/cve/CVE-2022-0185" }, { "category": "external", "summary": "SUSE Bug 1194517 for CVE-2022-0185", "url": "https://bugzilla.suse.com/1194517" }, { "category": "external", "summary": "SUSE Bug 1194737 for CVE-2022-0185", "url": "https://bugzilla.suse.com/1194737" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-0185" }, { "cve": "CVE-2022-0330", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0330" } ], "notes": [ { "category": "general", "text": "A random memory access flaw was found in the Linux kernel\u0027s GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0330", "url": "https://www.suse.com/security/cve/CVE-2022-0330" }, { "category": "external", "summary": "SUSE Bug 1194880 for CVE-2022-0330", "url": "https://bugzilla.suse.com/1194880" }, { "category": "external", "summary": "SUSE Bug 1195950 for CVE-2022-0330", "url": "https://bugzilla.suse.com/1195950" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-0330" }, { "cve": "CVE-2022-0847", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0847" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way the \"flags\" member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0847", "url": "https://www.suse.com/security/cve/CVE-2022-0847" }, { "category": "external", "summary": "SUSE Bug 1196584 for CVE-2022-0847", "url": "https://bugzilla.suse.com/1196584" }, { "category": "external", "summary": "SUSE Bug 1196601 for CVE-2022-0847", "url": "https://bugzilla.suse.com/1196601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-0847" }, { "cve": "CVE-2022-0886", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-0886" } ], "notes": [ { "category": "general", "text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-27666. Reason: This candidate is a reservation duplicate of CVE-2022-27666. Notes: All CVE users should reference CVE-2022-27666 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-0886", "url": "https://www.suse.com/security/cve/CVE-2022-0886" }, { "category": "external", "summary": "SUSE Bug 1197131 for CVE-2022-0886", "url": "https://bugzilla.suse.com/1197131" }, { "category": "external", "summary": "SUSE Bug 1197133 for CVE-2022-0886", "url": "https://bugzilla.suse.com/1197133" }, { "category": "external", "summary": "SUSE Bug 1197462 for CVE-2022-0886", "url": "https://bugzilla.suse.com/1197462" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-0886" }, { "cve": "CVE-2022-1462", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1462" } ], "notes": [ { "category": "general", "text": "An out-of-bounds read flaw was found in the Linux kernel\u0027s TeleTYpe subsystem. The issue occurs in how a user triggers a race condition using ioctls TIOCSPTLCK and TIOCGPTPEER and TIOCSTI and TCXONC with leakage of memory in the flush_to_ldisc function. This flaw allows a local user to crash the system or read unauthorized random data from memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1462", "url": "https://www.suse.com/security/cve/CVE-2022-1462" }, { "category": "external", "summary": "SUSE Bug 1198829 for CVE-2022-1462", "url": "https://bugzilla.suse.com/1198829" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-1462" }, { "cve": "CVE-2022-1516", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1516" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s X.25 set of standardized network protocols functionality in the way a user terminates their session using a simulated Ethernet card and continued usage of this connection. This flaw allows a local user to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1516", "url": "https://www.suse.com/security/cve/CVE-2022-1516" }, { "category": "external", "summary": "SUSE Bug 1199012 for CVE-2022-1516", "url": "https://bugzilla.suse.com/1199012" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-1516" }, { "cve": "CVE-2022-1679", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1679" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in the Linux kernel\u0027s Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1679", "url": "https://www.suse.com/security/cve/CVE-2022-1679" }, { "category": "external", "summary": "SUSE Bug 1199487 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1199487" }, { "category": "external", "summary": "SUSE Bug 1201080 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1201080" }, { "category": "external", "summary": "SUSE Bug 1201832 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1201832" }, { "category": "external", "summary": "SUSE Bug 1204132 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1204132" }, { "category": "external", "summary": "SUSE Bug 1212316 for CVE-2022-1679", "url": "https://bugzilla.suse.com/1212316" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-1679" }, { "cve": "CVE-2022-1729", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1729" } ], "notes": [ { "category": "general", "text": "A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1729", "url": "https://www.suse.com/security/cve/CVE-2022-1729" }, { "category": "external", "summary": "SUSE Bug 1199507 for CVE-2022-1729", "url": "https://bugzilla.suse.com/1199507" }, { "category": "external", "summary": "SUSE Bug 1199697 for CVE-2022-1729", "url": "https://bugzilla.suse.com/1199697" }, { "category": "external", "summary": "SUSE Bug 1201832 for CVE-2022-1729", "url": "https://bugzilla.suse.com/1201832" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-1729" }, { "cve": "CVE-2022-1852", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1852" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s KVM module, which can lead to a denial of service in the x86_emulate_insn in arch/x86/kvm/emulate.c. This flaw occurs while executing an illegal instruction in guest in the Intel CPU.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1852", "url": "https://www.suse.com/security/cve/CVE-2022-1852" }, { "category": "external", "summary": "SUSE Bug 1199875 for CVE-2022-1852", "url": "https://bugzilla.suse.com/1199875" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-1852" }, { "cve": "CVE-2022-1966", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1966" } ], "notes": [ { "category": "general", "text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-32250. Reason: This candidate is a duplicate of CVE-2022-32250. Notes: All CVE users should reference CVE-2022-32250 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1966", "url": "https://www.suse.com/security/cve/CVE-2022-1966" }, { "category": "external", "summary": "SUSE Bug 1200015 for CVE-2022-1966", "url": "https://bugzilla.suse.com/1200015" }, { "category": "external", "summary": "SUSE Bug 1200268 for CVE-2022-1966", "url": "https://bugzilla.suse.com/1200268" }, { "category": "external", "summary": "SUSE Bug 1200494 for CVE-2022-1966", "url": "https://bugzilla.suse.com/1200494" }, { "category": "external", "summary": "SUSE Bug 1200529 for CVE-2022-1966", "url": "https://bugzilla.suse.com/1200529" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-1966" }, { "cve": "CVE-2022-1972", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1972" } ], "notes": [ { "category": "general", "text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-2078. Reason: This candidate is a reservation duplicate of CVE-2022-2078. Notes: All CVE users should reference CVE-2022-2078 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1972", "url": "https://www.suse.com/security/cve/CVE-2022-1972" }, { "category": "external", "summary": "SUSE Bug 1200019 for CVE-2022-1972", "url": "https://bugzilla.suse.com/1200019" }, { "category": "external", "summary": "SUSE Bug 1200266 for CVE-2022-1972", "url": "https://bugzilla.suse.com/1200266" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-1972" }, { "cve": "CVE-2022-1973", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-1973" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in the Linux kernel in log_replay in fs/ntfs3/fslog.c in the NTFS journal. This flaw allows a local attacker to crash the system and leads to a kernel information leak problem.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-1973", "url": "https://www.suse.com/security/cve/CVE-2022-1973" }, { "category": "external", "summary": "SUSE Bug 1200023 for CVE-2022-1973", "url": "https://bugzilla.suse.com/1200023" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-1973" }, { "cve": "CVE-2022-22942", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-22942" } ], "notes": [ { "category": "general", "text": "The vmwgfx driver contains a local privilege escalation vulnerability that allows unprivileged users to gain access to files opened by other processes on the system through a dangling \u0027file\u0027 pointer.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-22942", "url": "https://www.suse.com/security/cve/CVE-2022-22942" }, { "category": "external", "summary": "SUSE Bug 1195065 for CVE-2022-22942", "url": "https://bugzilla.suse.com/1195065" }, { "category": "external", "summary": "SUSE Bug 1195951 for CVE-2022-22942", "url": "https://bugzilla.suse.com/1195951" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-22942" }, { "cve": "CVE-2022-2308", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-2308" } ], "notes": [ { "category": "general", "text": "A flaw was found in vDPA with VDUSE backend. There are currently no checks in VDUSE kernel driver to ensure the size of the device config space is in line with the features advertised by the VDUSE userspace application. In case of a mismatch, Virtio drivers config read helpers do not initialize the memory indirectly passed to vduse_vdpa_get_config() returning uninitialized memory from the stack. This could cause undefined behavior or data leaks in Virtio drivers.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-2308", "url": "https://www.suse.com/security/cve/CVE-2022-2308" }, { "category": "external", "summary": "SUSE Bug 1202573 for CVE-2022-2308", "url": "https://bugzilla.suse.com/1202573" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-2308" }, { "cve": "CVE-2022-24958", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-24958" } ], "notes": [ { "category": "general", "text": "drivers/usb/gadget/legacy/inode.c in the Linux kernel through 5.16.8 mishandles dev-\u003ebuf release.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-24958", "url": "https://www.suse.com/security/cve/CVE-2022-24958" }, { "category": "external", "summary": "SUSE Bug 1195905 for CVE-2022-24958", "url": "https://bugzilla.suse.com/1195905" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-24958" }, { "cve": "CVE-2022-2588", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-2588" } ], "notes": [ { "category": "general", "text": "It was discovered that the cls_route filter implementation in the Linux kernel would not remove an old filter from the hashtable before freeing it if its handle had the value 0.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-2588", "url": "https://www.suse.com/security/cve/CVE-2022-2588" }, { "category": "external", "summary": "SUSE Bug 1202096 for CVE-2022-2588", "url": "https://bugzilla.suse.com/1202096" }, { "category": "external", "summary": "SUSE Bug 1203613 for CVE-2022-2588", "url": "https://bugzilla.suse.com/1203613" }, { "category": "external", "summary": "SUSE Bug 1204183 for CVE-2022-2588", "url": "https://bugzilla.suse.com/1204183" }, { "category": "external", "summary": "SUSE Bug 1209225 for CVE-2022-2588", "url": "https://bugzilla.suse.com/1209225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-2588" }, { "cve": "CVE-2022-2590", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-2590" } ], "notes": [ { "category": "general", "text": "A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only shared memory mappings. This flaw allows an unprivileged, local user to gain write access to read-only memory mappings, increasing their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-2590", "url": "https://www.suse.com/security/cve/CVE-2022-2590" }, { "category": "external", "summary": "SUSE Bug 1202013 for CVE-2022-2590", "url": "https://bugzilla.suse.com/1202013" }, { "category": "external", "summary": "SUSE Bug 1202089 for CVE-2022-2590", "url": "https://bugzilla.suse.com/1202089" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-2590" }, { "cve": "CVE-2022-26490", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-26490" } ], "notes": [ { "category": "general", "text": "st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c in the Linux kernel through 5.16.12 has EVT_TRANSACTION buffer overflows because of untrusted length parameters.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-26490", "url": "https://www.suse.com/security/cve/CVE-2022-26490" }, { "category": "external", "summary": "SUSE Bug 1196830 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1196830" }, { "category": "external", "summary": "SUSE Bug 1201656 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1201656" }, { "category": "external", "summary": "SUSE Bug 1201969 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1201969" }, { "category": "external", "summary": "SUSE Bug 1211495 for CVE-2022-26490", "url": "https://bugzilla.suse.com/1211495" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-26490" }, { "cve": "CVE-2022-28388", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-28388" } ], "notes": [ { "category": "general", "text": "usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c in the Linux kernel through 5.17.1 has a double free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-28388", "url": "https://www.suse.com/security/cve/CVE-2022-28388" }, { "category": "external", "summary": "SUSE Bug 1198032 for CVE-2022-28388", "url": "https://bugzilla.suse.com/1198032" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-28388" }, { "cve": "CVE-2022-28389", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-28389" } ], "notes": [ { "category": "general", "text": "mcba_usb_start_xmit in drivers/net/can/usb/mcba_usb.c in the Linux kernel through 5.17.1 has a double free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-28389", "url": "https://www.suse.com/security/cve/CVE-2022-28389" }, { "category": "external", "summary": "SUSE Bug 1198033 for CVE-2022-28389", "url": "https://bugzilla.suse.com/1198033" }, { "category": "external", "summary": "SUSE Bug 1201657 for CVE-2022-28389", "url": "https://bugzilla.suse.com/1201657" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-28389" }, { "cve": "CVE-2022-28390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-28390" } ], "notes": [ { "category": "general", "text": "ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c in the Linux kernel through 5.17.1 has a double free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-28390", "url": "https://www.suse.com/security/cve/CVE-2022-28390" }, { "category": "external", "summary": "SUSE Bug 1198031 for CVE-2022-28390", "url": "https://bugzilla.suse.com/1198031" }, { "category": "external", "summary": "SUSE Bug 1201517 for CVE-2022-28390", "url": "https://bugzilla.suse.com/1201517" }, { "category": "external", "summary": "SUSE Bug 1207969 for CVE-2022-28390", "url": "https://bugzilla.suse.com/1207969" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-28390" }, { "cve": "CVE-2022-28893", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-28893" } ], "notes": [ { "category": "general", "text": "The SUNRPC subsystem in the Linux kernel through 5.17.2 can call xs_xprt_free before ensuring that sockets are in the intended state.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-28893", "url": "https://www.suse.com/security/cve/CVE-2022-28893" }, { "category": "external", "summary": "SUSE Bug 1198330 for CVE-2022-28893", "url": "https://bugzilla.suse.com/1198330" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-28893" }, { "cve": "CVE-2022-29900", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-29900" } ], "notes": [ { "category": "general", "text": "Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-29900", "url": "https://www.suse.com/security/cve/CVE-2022-29900" }, { "category": "external", "summary": "SUSE Bug 1199657 for CVE-2022-29900", "url": "https://bugzilla.suse.com/1199657" }, { "category": "external", "summary": "SUSE Bug 1201469 for CVE-2022-29900", "url": "https://bugzilla.suse.com/1201469" }, { "category": "external", "summary": "SUSE Bug 1207894 for CVE-2022-29900", "url": "https://bugzilla.suse.com/1207894" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-29900" }, { "cve": "CVE-2022-29901", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-29901" } ], "notes": [ { "category": "general", "text": "Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-29901", "url": "https://www.suse.com/security/cve/CVE-2022-29901" }, { "category": "external", "summary": "SUSE Bug 1199657 for CVE-2022-29901", "url": "https://bugzilla.suse.com/1199657" }, { "category": "external", "summary": "SUSE Bug 1201469 for CVE-2022-29901", "url": "https://bugzilla.suse.com/1201469" }, { "category": "external", "summary": "SUSE Bug 1207894 for CVE-2022-29901", "url": "https://bugzilla.suse.com/1207894" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-29901" }, { "cve": "CVE-2022-29968", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-29968" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.17.5. io_rw_init_file in fs/io_uring.c lacks initialization of kiocb-\u003eprivate.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-29968", "url": "https://www.suse.com/security/cve/CVE-2022-29968" }, { "category": "external", "summary": "SUSE Bug 1199087 for CVE-2022-29968", "url": "https://bugzilla.suse.com/1199087" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2022-29968" }, { "cve": "CVE-2022-3424", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-3424" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in the Linux kernel\u0027s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-3424", "url": "https://www.suse.com/security/cve/CVE-2022-3424" }, { "category": "external", "summary": "SUSE Bug 1204166 for CVE-2022-3424", "url": "https://bugzilla.suse.com/1204166" }, { "category": "external", "summary": "SUSE Bug 1204167 for CVE-2022-3424", "url": "https://bugzilla.suse.com/1204167" }, { "category": "external", "summary": "SUSE Bug 1208044 for CVE-2022-3424", "url": "https://bugzilla.suse.com/1208044" }, { "category": "external", "summary": "SUSE Bug 1212309 for CVE-2022-3424", "url": "https://bugzilla.suse.com/1212309" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-3424" }, { "cve": "CVE-2022-34918", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-34918" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-34918", "url": "https://www.suse.com/security/cve/CVE-2022-34918" }, { "category": "external", "summary": "SUSE Bug 1201171 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201171" }, { "category": "external", "summary": "SUSE Bug 1201177 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201177" }, { "category": "external", "summary": "SUSE Bug 1201222 for CVE-2022-34918", "url": "https://bugzilla.suse.com/1201222" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-34918" }, { "cve": "CVE-2022-3628", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-3628" } ], "notes": [ { "category": "general", "text": "A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC Wi-Fi driver. This issue occurs when a user connects to a malicious USB device. This can allow a local user to crash the system or escalate their privileges.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-3628", "url": "https://www.suse.com/security/cve/CVE-2022-3628" }, { "category": "external", "summary": "SUSE Bug 1204868 for CVE-2022-3628", "url": "https://bugzilla.suse.com/1204868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-3628" }, { "cve": "CVE-2022-3640", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-3640" } ], "notes": [ { "category": "general", "text": "A vulnerability, which was classified as critical, was found in Linux Kernel. Affected is the function l2cap_conn_del of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211944.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-3640", "url": "https://www.suse.com/security/cve/CVE-2022-3640" }, { "category": "external", "summary": "SUSE Bug 1204619 for CVE-2022-3640", "url": "https://bugzilla.suse.com/1204619" }, { "category": "external", "summary": "SUSE Bug 1204624 for CVE-2022-3640", "url": "https://bugzilla.suse.com/1204624" }, { "category": "external", "summary": "SUSE Bug 1209225 for CVE-2022-3640", "url": "https://bugzilla.suse.com/1209225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-3640" }, { "cve": "CVE-2022-40982", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-40982" } ], "notes": [ { "category": "general", "text": "Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-40982", "url": "https://www.suse.com/security/cve/CVE-2022-40982" }, { "category": "external", "summary": "SUSE Bug 1206418 for CVE-2022-40982", "url": "https://bugzilla.suse.com/1206418" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2022-40982", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-40982" }, { "cve": "CVE-2022-41218", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-41218" } ], "notes": [ { "category": "general", "text": "In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is a use-after-free caused by refcount races, affecting dvb_demux_open and dvb_dmxdev_release.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-41218", "url": "https://www.suse.com/security/cve/CVE-2022-41218" }, { "category": "external", "summary": "SUSE Bug 1202960 for CVE-2022-41218", "url": "https://bugzilla.suse.com/1202960" }, { "category": "external", "summary": "SUSE Bug 1203606 for CVE-2022-41218", "url": "https://bugzilla.suse.com/1203606" }, { "category": "external", "summary": "SUSE Bug 1205313 for CVE-2022-41218", "url": "https://bugzilla.suse.com/1205313" }, { "category": "external", "summary": "SUSE Bug 1209225 for CVE-2022-41218", "url": "https://bugzilla.suse.com/1209225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-41218" }, { "cve": "CVE-2022-41674", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-41674" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.19.16. Attackers able to inject WLAN frames could cause a buffer overflow in the ieee80211_bss_info_update function in net/mac80211/scan.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-41674", "url": "https://www.suse.com/security/cve/CVE-2022-41674" }, { "category": "external", "summary": "SUSE Bug 1203770 for CVE-2022-41674", "url": "https://bugzilla.suse.com/1203770" }, { "category": "external", "summary": "SUSE Bug 1203994 for CVE-2022-41674", "url": "https://bugzilla.suse.com/1203994" }, { "category": "external", "summary": "SUSE Bug 1209225 for CVE-2022-41674", "url": "https://bugzilla.suse.com/1209225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-41674" }, { "cve": "CVE-2022-42719", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-42719" } ], "notes": [ { "category": "general", "text": "A use-after-free in the mac80211 stack when parsing a multi-BSSID element in the Linux kernel 5.2 through 5.19.x before 5.19.16 could be used by attackers (able to inject WLAN frames) to crash the kernel and potentially execute code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-42719", "url": "https://www.suse.com/security/cve/CVE-2022-42719" }, { "category": "external", "summary": "SUSE Bug 1204051 for CVE-2022-42719", "url": "https://bugzilla.suse.com/1204051" }, { "category": "external", "summary": "SUSE Bug 1204292 for CVE-2022-42719", "url": "https://bugzilla.suse.com/1204292" }, { "category": "external", "summary": "SUSE Bug 1209225 for CVE-2022-42719", "url": "https://bugzilla.suse.com/1209225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-42719" }, { "cve": "CVE-2022-42720", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-42720" } ], "notes": [ { "category": "general", "text": "Various refcounting bugs in the multi-BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to trigger use-after-free conditions to potentially execute code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-42720", "url": "https://www.suse.com/security/cve/CVE-2022-42720" }, { "category": "external", "summary": "SUSE Bug 1204059 for CVE-2022-42720", "url": "https://bugzilla.suse.com/1204059" }, { "category": "external", "summary": "SUSE Bug 1204291 for CVE-2022-42720", "url": "https://bugzilla.suse.com/1204291" }, { "category": "external", "summary": "SUSE Bug 1209225 for CVE-2022-42720", "url": "https://bugzilla.suse.com/1209225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-42720" }, { "cve": "CVE-2022-42721", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-42721" } ], "notes": [ { "category": "general", "text": "A list management bug in BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to corrupt a linked list and, in turn, potentially execute code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-42721", "url": "https://www.suse.com/security/cve/CVE-2022-42721" }, { "category": "external", "summary": "SUSE Bug 1204060 for CVE-2022-42721", "url": "https://bugzilla.suse.com/1204060" }, { "category": "external", "summary": "SUSE Bug 1204290 for CVE-2022-42721", "url": "https://bugzilla.suse.com/1204290" }, { "category": "external", "summary": "SUSE Bug 1209225 for CVE-2022-42721", "url": "https://bugzilla.suse.com/1209225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-42721" }, { "cve": "CVE-2022-42722", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-42722" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 5.8 through 5.19.x before 5.19.16, local attackers able to inject WLAN frames into the mac80211 stack could cause a NULL pointer dereference denial-of-service attack against the beacon protection of P2P devices.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-42722", "url": "https://www.suse.com/security/cve/CVE-2022-42722" }, { "category": "external", "summary": "SUSE Bug 1204125 for CVE-2022-42722", "url": "https://bugzilla.suse.com/1204125" }, { "category": "external", "summary": "SUSE Bug 1204289 for CVE-2022-42722", "url": "https://bugzilla.suse.com/1204289" }, { "category": "external", "summary": "SUSE Bug 1209225 for CVE-2022-42722", "url": "https://bugzilla.suse.com/1209225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-42722" }, { "cve": "CVE-2022-4379", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-4379" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability was found in __nfs42_ssc_open() in fs/nfs/nfs4file.c in the Linux kernel. This flaw allows an attacker to conduct a remote denial", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-4379", "url": "https://www.suse.com/security/cve/CVE-2022-4379" }, { "category": "external", "summary": "SUSE Bug 1206209 for CVE-2022-4379", "url": "https://bugzilla.suse.com/1206209" }, { "category": "external", "summary": "SUSE Bug 1206373 for CVE-2022-4379", "url": "https://bugzilla.suse.com/1206373" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-4379" }, { "cve": "CVE-2022-44032", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-44032" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/cm4000_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between cmm_open() and cm4000_detach().", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-44032", "url": "https://www.suse.com/security/cve/CVE-2022-44032" }, { "category": "external", "summary": "SUSE Bug 1204894 for CVE-2022-44032", "url": "https://bugzilla.suse.com/1204894" }, { "category": "external", "summary": "SUSE Bug 1212290 for CVE-2022-44032", "url": "https://bugzilla.suse.com/1212290" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-44032" }, { "cve": "CVE-2022-44033", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-44033" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/cm4040_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between cm4040_open() and reader_detach().", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-44033", "url": "https://www.suse.com/security/cve/CVE-2022-44033" }, { "category": "external", "summary": "SUSE Bug 1204922 for CVE-2022-44033", "url": "https://bugzilla.suse.com/1204922" }, { "category": "external", "summary": "SUSE Bug 1212306 for CVE-2022-44033", "url": "https://bugzilla.suse.com/1212306" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-44033" }, { "cve": "CVE-2022-44034", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-44034" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.6. drivers/char/pcmcia/scr24x_cs.c has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling open(), aka a race condition between scr24x_open() and scr24x_remove().", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-44034", "url": "https://www.suse.com/security/cve/CVE-2022-44034" }, { "category": "external", "summary": "SUSE Bug 1204901 for CVE-2022-44034", "url": "https://bugzilla.suse.com/1204901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-44034" }, { "cve": "CVE-2022-45884", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-45884" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvbdev.c has a use-after-free, related to dvb_register_device dynamically allocating fops.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-45884", "url": "https://www.suse.com/security/cve/CVE-2022-45884" }, { "category": "external", "summary": "SUSE Bug 1205756 for CVE-2022-45884", "url": "https://bugzilla.suse.com/1205756" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-45884" }, { "cve": "CVE-2022-45885", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-45885" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvb_frontend.c has a race condition that can cause a use-after-free when a device is disconnected.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-45885", "url": "https://www.suse.com/security/cve/CVE-2022-45885" }, { "category": "external", "summary": "SUSE Bug 1205758 for CVE-2022-45885", "url": "https://bugzilla.suse.com/1205758" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-45885" }, { "cve": "CVE-2022-45886", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-45886" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvb_net.c has a .disconnect versus dvb_device_open race condition that leads to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-45886", "url": "https://www.suse.com/security/cve/CVE-2022-45886" }, { "category": "external", "summary": "SUSE Bug 1205760 for CVE-2022-45886", "url": "https://bugzilla.suse.com/1205760" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-45886" }, { "cve": "CVE-2022-45887", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-45887" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/media/usb/ttusb-dec/ttusb_dec.c has a memory leak because of the lack of a dvb_frontend_detach call.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-45887", "url": "https://www.suse.com/security/cve/CVE-2022-45887" }, { "category": "external", "summary": "SUSE Bug 1205762 for CVE-2022-45887", "url": "https://bugzilla.suse.com/1205762" }, { "category": "external", "summary": "SUSE Bug 1220015 for CVE-2022-45887", "url": "https://bugzilla.suse.com/1220015" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-45887" }, { "cve": "CVE-2022-45888", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-45888" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.9. drivers/char/xillybus/xillyusb.c has a race condition and use-after-free during physical removal of a USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-45888", "url": "https://www.suse.com/security/cve/CVE-2022-45888" }, { "category": "external", "summary": "SUSE Bug 1205764 for CVE-2022-45888", "url": "https://bugzilla.suse.com/1205764" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-45888" }, { "cve": "CVE-2022-45919", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-45919" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.10. In drivers/media/dvb-core/dvb_ca_en50221.c, a use-after-free can occur is there is a disconnect after an open, because of the lack of a wait_event.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-45919", "url": "https://www.suse.com/security/cve/CVE-2022-45919" }, { "category": "external", "summary": "SUSE Bug 1205803 for CVE-2022-45919", "url": "https://bugzilla.suse.com/1205803" }, { "category": "external", "summary": "SUSE Bug 1208600 for CVE-2022-45919", "url": "https://bugzilla.suse.com/1208600" }, { "category": "external", "summary": "SUSE Bug 1208912 for CVE-2022-45919", "url": "https://bugzilla.suse.com/1208912" }, { "category": "external", "summary": "SUSE Bug 1214128 for CVE-2022-45919", "url": "https://bugzilla.suse.com/1214128" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2022-45919", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2022-45919" }, { "cve": "CVE-2022-45934", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2022-45934" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_REQ packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2022-45934", "url": "https://www.suse.com/security/cve/CVE-2022-45934" }, { "category": "external", "summary": "SUSE Bug 1205796 for CVE-2022-45934", "url": "https://bugzilla.suse.com/1205796" }, { "category": "external", "summary": "SUSE Bug 1212292 for CVE-2022-45934", "url": "https://bugzilla.suse.com/1212292" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2022-45934" }, { "cve": "CVE-2023-0045", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-0045" } ], "notes": [ { "category": "general", "text": "The current implementation of the prctl syscall does not issue an IBPB immediately during the syscall. The ib_prctl_set function updates the Thread Information Flags (TIFs) for the task and updates the SPEC_CTRL MSR on the function __speculation_ctrl_update, but the IBPB is only issued on the next schedule, when the TIF bits are checked. This leaves the victim vulnerable to values already injected on the BTB, prior to the prctl syscall. The patch that added the support for the conditional mitigation via prctl (ib_prctl_set) dates back to the kernel 4.9.176.\n\nWe recommend upgrading past commit a664ec9158eeddd75121d39c9a0758016097fa96", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-0045", "url": "https://www.suse.com/security/cve/CVE-2023-0045" }, { "category": "external", "summary": "SUSE Bug 1207773 for CVE-2023-0045", "url": "https://bugzilla.suse.com/1207773" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-0045" }, { "cve": "CVE-2023-1076", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1076" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel. The tun/tap sockets have their socket UID hardcoded to 0 due to a type confusion in their initialization function. While it will be often correct, as tuntap devices require CAP_NET_ADMIN, it may not always be the case, e.g., a non-root user only having that capability. This would make tun/tap sockets being incorrectly treated in filtering/routing decisions, possibly bypassing network filters.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1076", "url": "https://www.suse.com/security/cve/CVE-2023-1076" }, { "category": "external", "summary": "SUSE Bug 1208599 for CVE-2023-1076", "url": "https://bugzilla.suse.com/1208599" }, { "category": "external", "summary": "SUSE Bug 1214019 for CVE-2023-1076", "url": "https://bugzilla.suse.com/1214019" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-1076" }, { "cve": "CVE-2023-1078", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1078" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel in RDS (Reliable Datagram Sockets) protocol. The rds_rm_zerocopy_callback() uses list_entry() on the head of a list causing a type confusion. Local user can trigger this with rds_message_put(). Type confusion leads to `struct rds_msg_zcopy_info *info` actually points to something else that is potentially controlled by local user. It is known how to trigger this, which causes an out of bounds access, and a lock corruption.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1078", "url": "https://www.suse.com/security/cve/CVE-2023-1078" }, { "category": "external", "summary": "SUSE Bug 1208601 for CVE-2023-1078", "url": "https://bugzilla.suse.com/1208601" }, { "category": "external", "summary": "SUSE Bug 1208603 for CVE-2023-1078", "url": "https://bugzilla.suse.com/1208603" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2023-1078" }, { "cve": "CVE-2023-1192", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1192" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in smb2_is_status_io_timeout() in CIFS in the Linux Kernel. After CIFS transfers response data to a system call, there are still local variable points to the memory region, and if the system call frees it faster than CIFS uses it, CIFS will access a free memory region, leading to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1192", "url": "https://www.suse.com/security/cve/CVE-2023-1192" }, { "category": "external", "summary": "SUSE Bug 1208995 for CVE-2023-1192", "url": "https://bugzilla.suse.com/1208995" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-1192" }, { "cve": "CVE-2023-1380", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-1380" } ], "notes": [ { "category": "general", "text": "A slab-out-of-bound read problem was found in brcmf_get_assoc_ies in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux Kernel. This issue could occur when assoc_info-\u003ereq_len data is bigger than the size of the buffer, defined as WL_EXTRA_BUF_MAX, leading to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-1380", "url": "https://www.suse.com/security/cve/CVE-2023-1380" }, { "category": "external", "summary": "SUSE Bug 1209287 for CVE-2023-1380", "url": "https://bugzilla.suse.com/1209287" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-1380" }, { "cve": "CVE-2023-20569", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-20569" } ], "notes": [ { "category": "general", "text": "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled\u202faddress, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-20569", "url": "https://www.suse.com/security/cve/CVE-2023-20569" }, { "category": "external", "summary": "SUSE Bug 1213287 for CVE-2023-20569", "url": "https://bugzilla.suse.com/1213287" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-20569" }, { "cve": "CVE-2023-20593", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-20593" } ], "notes": [ { "category": "general", "text": "An issue in \"Zen 2\" CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-20593", "url": "https://www.suse.com/security/cve/CVE-2023-20593" }, { "category": "external", "summary": "SUSE Bug 1213286 for CVE-2023-20593", "url": "https://bugzilla.suse.com/1213286" }, { "category": "external", "summary": "SUSE Bug 1213616 for CVE-2023-20593", "url": "https://bugzilla.suse.com/1213616" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2023-20593", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-20593" }, { "cve": "CVE-2023-2124", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-2124" } ], "notes": [ { "category": "general", "text": "An out-of-bounds memory access flaw was found in the Linux kernel\u0027s XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user to crash or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-2124", "url": "https://www.suse.com/security/cve/CVE-2023-2124" }, { "category": "external", "summary": "SUSE Bug 1210498 for CVE-2023-2124", "url": "https://bugzilla.suse.com/1210498" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-2124" }, { "cve": "CVE-2023-31084", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-31084" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/media/dvb-core/dvb_frontend.c in the Linux kernel 6.2. There is a blocking operation when a task is in !TASK_RUNNING. In dvb_frontend_get_event, wait_event_interruptible is called; the condition is dvb_frontend_test_event(fepriv,events). In dvb_frontend_test_event, down(\u0026fepriv-\u003esem) is called. However, wait_event_interruptible would put the process to sleep, and down(\u0026fepriv-\u003esem) may block the process.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-31084", "url": "https://www.suse.com/security/cve/CVE-2023-31084" }, { "category": "external", "summary": "SUSE Bug 1210783 for CVE-2023-31084", "url": "https://bugzilla.suse.com/1210783" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-31084" }, { "cve": "CVE-2023-3141", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-3141" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in r592_remove in drivers/memstick/host/r592.c in media access in the Linux Kernel. This flaw allows a local attacker to crash the system at device disconnect, possibly leading to a kernel information leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-3141", "url": "https://www.suse.com/security/cve/CVE-2023-3141" }, { "category": "external", "summary": "SUSE Bug 1212129 for CVE-2023-3141", "url": "https://bugzilla.suse.com/1212129" }, { "category": "external", "summary": "SUSE Bug 1215674 for CVE-2023-3141", "url": "https://bugzilla.suse.com/1215674" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-3141" }, { "cve": "CVE-2023-3269", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-3269" } ], "notes": [ { "category": "general", "text": "A vulnerability exists in the memory management subsystem of the Linux kernel. The lock handling for accessing and updating virtual memory areas (VMAs) is incorrect, leading to use-after-free problems. This issue can be successfully exploited to execute arbitrary kernel code, escalate containers, and gain root privileges.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-3269", "url": "https://www.suse.com/security/cve/CVE-2023-3269" }, { "category": "external", "summary": "SUSE Bug 1212395 for CVE-2023-3269", "url": "https://bugzilla.suse.com/1212395" }, { "category": "external", "summary": "SUSE Bug 1213760 for CVE-2023-3269", "url": "https://bugzilla.suse.com/1213760" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2023-3269" }, { "cve": "CVE-2023-39192", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-39192" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The xt_u32 module did not validate the fields in the xt_u32 structure. This flaw allows a local privileged attacker to trigger an out-of-bounds read by setting the size fields with a value beyond the array boundaries, leading to a crash or information disclosure.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-39192", "url": "https://www.suse.com/security/cve/CVE-2023-39192" }, { "category": "external", "summary": "SUSE Bug 1215858 for CVE-2023-39192", "url": "https://bugzilla.suse.com/1215858" }, { "category": "external", "summary": "SUSE Bug 1220015 for CVE-2023-39192", "url": "https://bugzilla.suse.com/1220015" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-39192" }, { "cve": "CVE-2023-39193", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-39193" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-39193", "url": "https://www.suse.com/security/cve/CVE-2023-39193" }, { "category": "external", "summary": "SUSE Bug 1215860 for CVE-2023-39193", "url": "https://bugzilla.suse.com/1215860" }, { "category": "external", "summary": "SUSE Bug 1220015 for CVE-2023-39193", "url": "https://bugzilla.suse.com/1220015" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-39193" }, { "cve": "CVE-2023-4128", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-4128" } ], "notes": [ { "category": "general", "text": "** REJECT ** DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2023-4206, CVE-2023-4207, CVE-2023-4208. Reason: This record is a duplicate of CVE-2023-4206, CVE-2023-4207, CVE-2023-4208. Notes: All CVE users should reference CVE-2023-4206, CVE-2023-4207, CVE-2023-4208 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-4128", "url": "https://www.suse.com/security/cve/CVE-2023-4128" }, { "category": "external", "summary": "SUSE Bug 1214149 for CVE-2023-4128", "url": "https://bugzilla.suse.com/1214149" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2023-4128" }, { "cve": "CVE-2023-4134", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-4134" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability was found in the cyttsp4_core driver in the Linux kernel. This issue occurs in the device cleanup routine due to a possible rearming of the watchdog_timer from the workqueue. This could allow a local user to crash the system, causing a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-4134", "url": "https://www.suse.com/security/cve/CVE-2023-4134" }, { "category": "external", "summary": "SUSE Bug 1213971 for CVE-2023-4134", "url": "https://bugzilla.suse.com/1213971" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-4134" }, { "cve": "CVE-2023-4194", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-4194" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s TUN/TAP functionality. This issue could allow a local user to bypass network filters and gain unauthorized access to some resources. The original patches fixing CVE-2023-1076 are incorrect or incomplete. The problem is that the following upstream commits - a096ccca6e50 (\"tun: tun_chr_open(): correctly initialize socket uid\"), - 66b2c338adce (\"tap: tap_open(): correctly initialize socket uid\"), pass \"inode-\u003ei_uid\" to sock_init_data_uid() as the last parameter and that turns out to not be accurate.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-4194", "url": "https://www.suse.com/security/cve/CVE-2023-4194" }, { "category": "external", "summary": "SUSE Bug 1214019 for CVE-2023-4194", "url": "https://bugzilla.suse.com/1214019" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-4194" }, { "cve": "CVE-2023-42753", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-42753" } ], "notes": [ { "category": "general", "text": "An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. A missing macro could lead to a miscalculation of the `h-\u003enets` array offset, providing attackers with the primitive to arbitrarily increment/decrement a memory buffer out-of-bound. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-42753", "url": "https://www.suse.com/security/cve/CVE-2023-42753" }, { "category": "external", "summary": "SUSE Bug 1215150 for CVE-2023-42753", "url": "https://bugzilla.suse.com/1215150" }, { "category": "external", "summary": "SUSE Bug 1218613 for CVE-2023-42753", "url": "https://bugzilla.suse.com/1218613" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2023-42753" }, { "cve": "CVE-2023-42754", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-42754" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before calling __ip_options_compile, which is not always the case if the skb is re-routed by ipvs. This issue may allow a local user with CAP_NET_ADMIN privileges to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-42754", "url": "https://www.suse.com/security/cve/CVE-2023-42754" }, { "category": "external", "summary": "SUSE Bug 1215467 for CVE-2023-42754", "url": "https://bugzilla.suse.com/1215467" }, { "category": "external", "summary": "SUSE Bug 1222212 for CVE-2023-42754", "url": "https://bugzilla.suse.com/1222212" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-42754" }, { "cve": "CVE-2023-42756", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-42756" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Netfilter subsystem of the Linux kernel. A race condition between IPSET_CMD_ADD and IPSET_CMD_SWAP can lead to a kernel panic due to the invocation of `__ip_set_put` on a wrong `set`. This issue may allow a local user to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-42756", "url": "https://www.suse.com/security/cve/CVE-2023-42756" }, { "category": "external", "summary": "SUSE Bug 1215767 for CVE-2023-42756", "url": "https://bugzilla.suse.com/1215767" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-42756" }, { "cve": "CVE-2023-4623", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-4623" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability in the Linux kernel\u0027s net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation.\n\nIf a class with a link-sharing curve (i.e. with the HFSC_FSC flag set) has a parent without a link-sharing curve, then init_vf() will call vttree_insert() on the parent, but vttree_remove() will be skipped in update_vf(). This leaves a dangling pointer that can cause a use-after-free.\n\nWe recommend upgrading past commit b3d26c5702c7d6c45456326e56d2ccf3f103e60f.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-4623", "url": "https://www.suse.com/security/cve/CVE-2023-4623" }, { "category": "external", "summary": "SUSE Bug 1215115 for CVE-2023-4623", "url": "https://bugzilla.suse.com/1215115" }, { "category": "external", "summary": "SUSE Bug 1215440 for CVE-2023-4623", "url": "https://bugzilla.suse.com/1215440" }, { "category": "external", "summary": "SUSE Bug 1217444 for CVE-2023-4623", "url": "https://bugzilla.suse.com/1217444" }, { "category": "external", "summary": "SUSE Bug 1217531 for CVE-2023-4623", "url": "https://bugzilla.suse.com/1217531" }, { "category": "external", "summary": "SUSE Bug 1219698 for CVE-2023-4623", "url": "https://bugzilla.suse.com/1219698" }, { "category": "external", "summary": "SUSE Bug 1221578 for CVE-2023-4623", "url": "https://bugzilla.suse.com/1221578" }, { "category": "external", "summary": "SUSE Bug 1221598 for CVE-2023-4623", "url": "https://bugzilla.suse.com/1221598" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2023-4623" }, { "cve": "CVE-2023-46813", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-46813" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 6.5.9, exploitable by local users with userspace access to MMIO registers. Incorrect access checking in the #VC handler and instruction emulation of the SEV-ES emulation of MMIO accesses could lead to arbitrary write access to kernel memory (and thus privilege escalation). This depends on a race condition through which userspace can replace an instruction before the #VC handler reads it.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-46813", "url": "https://www.suse.com/security/cve/CVE-2023-46813" }, { "category": "external", "summary": "SUSE Bug 1212649 for CVE-2023-46813", "url": "https://bugzilla.suse.com/1212649" }, { "category": "external", "summary": "SUSE Bug 1216896 for CVE-2023-46813", "url": "https://bugzilla.suse.com/1216896" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2023-46813" }, { "cve": "CVE-2023-4881", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-4881" } ], "notes": [ { "category": "general", "text": "CVE-2023-4881 was wrongly assigned to a bug that was deemed to be a non-security issue by the Linux kernel security team.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-4881", "url": "https://www.suse.com/security/cve/CVE-2023-4881" }, { "category": "external", "summary": "SUSE Bug 1215221 for CVE-2023-4881", "url": "https://bugzilla.suse.com/1215221" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-4881" }, { "cve": "CVE-2023-5345", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-5345" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability in the Linux kernel\u0027s fs/smb/client component can be exploited to achieve local privilege escalation.\n\nIn case of an error in smb3_fs_context_parse_param, ctx-\u003epassword was freed but the field was not set to NULL which could lead to double free.\n\nWe recommend upgrading past commit e6e43b8aa7cd3c3af686caf0c2e11819a886d705.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-5345", "url": "https://www.suse.com/security/cve/CVE-2023-5345" }, { "category": "external", "summary": "SUSE Bug 1215899 for CVE-2023-5345", "url": "https://bugzilla.suse.com/1215899" }, { "category": "external", "summary": "SUSE Bug 1215971 for CVE-2023-5345", "url": "https://bugzilla.suse.com/1215971" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2023-5345" }, { "cve": "CVE-2023-6606", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6606" } ], "notes": [ { "category": "general", "text": "An out-of-bounds read vulnerability was found in smbCalcSize in fs/smb/client/netmisc.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6606", "url": "https://www.suse.com/security/cve/CVE-2023-6606" }, { "category": "external", "summary": "SUSE Bug 1217947 for CVE-2023-6606", "url": "https://bugzilla.suse.com/1217947" }, { "category": "external", "summary": "SUSE Bug 1220015 for CVE-2023-6606", "url": "https://bugzilla.suse.com/1220015" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-6606" }, { "cve": "CVE-2023-6610", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-6610" } ], "notes": [ { "category": "general", "text": "An out-of-bounds read vulnerability was found in smb2_dump_detail in fs/smb/client/smb2ops.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-6610", "url": "https://www.suse.com/security/cve/CVE-2023-6610" }, { "category": "external", "summary": "SUSE Bug 1217946 for CVE-2023-6610", "url": "https://bugzilla.suse.com/1217946" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-longterm-6.6.17-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.s390x", "openSUSE Tumbleweed:kernel-source-longterm-6.6.17-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2023-6610" } ] }
opensuse-su-2020:0935-1
Vulnerability from csaf_opensuse
Published
2020-07-16 15:02
Modified
2020-07-16 15:02
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The openSUSE Leap 15.2 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2019-19462: relay_open in kernel/relay.c allowed local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result (bnc#1158265).
- CVE-2019-20810: go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c did not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586 (bnc#1172458).
- CVE-2019-20812: The prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067 (bnc#1172453).
- CVE-2020-10711: A NULL pointer dereference flaw was found in the Linux kernel's SELinux subsystem. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. While processing the CIPSO restricted bitmap tag in the 'cipso_v4_parsetag_rbm' routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allowed a remote network user to crash the system kernel, resulting in a denial of service (bnc#1171191).
- CVE-2020-10732: A flaw was found in the implementation of Userspace core dumps. This flaw allowed an attacker with a local account to crash a trivial program and exfiltrate private kernel data (bnc#1171220).
- CVE-2020-10751: SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing (bnc#1171189).
- CVE-2020-10766: Fixed rogue cross-process SSBD shutdown. Linux scheduler logical bug allowed an attacker to turn off the SSBD protection. (bnc#1172781).
- CVE-2020-10767: Fixed that Indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available. (bnc#1172782).
- CVE-2020-10768: Fixed that indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command (bnc#1172783).
- CVE-2020-10773: Fixed a kernel stack information leak on s390/s390x. (bnc#1172999).
- CVE-2020-12656: Fixed a memory leak in gss_mech_free in the rpcsec_gss_krb5 implementation due to lack of certain domain_release calls (bnc#1171219).
- CVE-2020-12769: An issue was discovered in drivers/spi/spi-dw.c allowed attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one, aka CID-19b61392c5a8 (bnc#1171983).
- CVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).
- CVE-2020-13143: gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c relied on kstrdup without considering the possibility of an internal '\0' value, which allowed attackers to trigger an out-of-bounds read, aka CID-15753588bcd4 (bnc#1171982).
- CVE-2020-13974: tty/vt/keyboard.c had an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. (bnc#1172775).
- CVE-2020-14416: A race condition in tty->disc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).
The following non-security bugs were fixed:
- ACPICA: Fixes for acpiExec namespace init file (git-fixes).
- ACPI: CPPC: Fix reference count leak in acpi_cppc_processor_probe() (git-fixes).
- ACPI: GED: add support for _Exx / _Lxx handler methods (git-fixes).
- ACPI: GED: use correct trigger type field in _Exx / _Lxx handling (git-fixes).
- ACPI: PM: Avoid using power resources if there are none for D0 (git-fixes).
- ACPI: sysfs: Fix reference count leak in acpi_sysfs_add_hotplug_profile() (git-fixes).
- af_unix: add compat_ioctl support (git-fixes).
- agp/intel: Reinforce the barrier after GTT updates (git-fixes).
- ALSA: emu10k1: delete an unnecessary condition (git-fixes).
- ALSA: es1688: Add the missed snd_card_free() (git-fixes).
- ALSA: fireface: fix configuration error for nominal sampling transfer frequency (git-fixes).
- ALSA: firewire-lib: fix invalid assignment to union data for directional parameter (git-fixes).
- ALSA: hda: Add ElkhartLake HDMI codec vid (git-fixes).
- ALSA: hda: add member to store ratio for stripe control (git-fixes).
- ALSA: hda: add sienna_cichlid audio asic id for sienna_cichlid up (git-fixes).
- ALSA: hda: Fix potential race in unsol event handler (git-fixes).
- ALSA: hda/realtek - Add a model for Thinkpad T570 without DAC workaround (bsc#1172017).
- ALSA: hda/realtek - add a pintbl quirk for several Lenovo machines (git-fixes).
- ALSA: hda/realtek - Add LED class support for micmute LED (git-fixes).
- ALSA: hda/realtek - Add more fixup entries for Clevo machines (git-fixes).
- ALSA: hda/realtek - Add new codec supported for ALC287 (git-fixes).
- ALSA: hda/realtek - Enable micmute LED on and HP system (git-fixes).
- ALSA: hda/realtek - Fix silent output on Gigabyte X570 Aorus Xtreme (git-fixes).
- ALSA: hda/realtek - Fix unused variable warning w/o CONFIG_LEDS_TRIGGER_AUDIO (git-fixes).
- ALSA: hda/realtek - Introduce polarity for micmute LED GPIO (git-fixes).
- ALSA: hda/tegra: correct number of SDO lines for Tegra194 (git-fixes).
- ALSA: hda/tegra: workaround playback failure on Tegra194 (git-fixes).
- ALSA: hwdep: fix a left shifting 1 by 31 UB bug (git-fixes).
- ALSA: iec1712: Initialize STDSP24 properly when using the model=staudio option (git-fixes).
- ALSA: pcm: disallow linking stream to itself (git-fixes).
- ALSA: pcm: fix incorrect hw_base increase (git-fixes).
- ALSA: pcm: fix snd_pcm_link() lockdep splat (git-fixes).
- ALSA: usb-audio: Add duplex sound support for USB devices using implicit feedback (git-fixes).
- ALSA: usb-audio: Add Pioneer DJ DJM-900NXS2 support (git-fixes).
- ALSA: usb-audio: Add vendor, product and profile name for HP Thunderbolt Dock (git-fixes).
- ALSA: usb-audio: Clean up quirk entries with macros (git-fixes).
- ALSA: usb-audio: Fix a limit check in proc_dump_substream_formats() (git-fixes).
- ALSA: usb-audio: Fix inconsistent card PM state after resume (git-fixes).
- ALSA: usb-audio: fixing upper volume limit for RME Babyface Pro routing crosspoints (git-fixes).
- ALSA: usb-audio: Fixing usage of plain int instead of NULL (git-fixes).
- ALSA: usb-audio: Fix racy list management in output queue (git-fixes).
- ALSA: usb-audio: Improve frames size computation (git-fixes).
- ALSA: usb-audio: Manage auto-pm of all bundled interfaces (git-fixes).
- ALSA: usb-audio: mixer: volume quirk for ESS Technology Asus USB DAC (git-fixes).
- ALSA: usb-audio: Print more information in stream proc files (git-fixes).
- ALSA: usb-audio: Quirks for Gigabyte TRX40 Aorus Master onboard audio (git-fixes).
- ALSA: usb-audio: Remove async workaround for Scarlett 2nd gen (git-fixes).
- ALSA: usb-audio: RME Babyface Pro mixer patch (git-fixes).
- ALSA: usb-audio: Use the new macro for HP Dock rename quirks (git-fixes).
- amd-xgbe: Use __napi_schedule() in BH context (networking-stable-20_04_17).
- arm64: map FDT as RW for early_init_dt_scan() (jsc#SLE-12424).
- ARM: oxnas: make ox820_boot_secondary static (git-fixes).
- asm-gemeric/tlb: remove stray function declarations (bsc#1156395).
- ASoC: fix incomplete error-handling in img_i2s_in_probe (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for Toshiba Encore WT10-A tablet (git-fixes).
- ASoC: intel: cht_bsw_max98090_ti: Add all Chromebooks that need pmc_plt_clk_0 quirk (bsc#1171246).
- ASoC: intel - fix the card names (git-fixes).
- ASoC: max9867: fix volume controls (git-fixes).
- ASoC: meson: add missing free_irq() in error path (git-fixes).
- ASoC: rt5645: Add platform-data for Asus T101HA (git-fixes).
- ASoC: SOF: core: fix error return code in sof_probe_continue() (git-fixes).
- ASoC: ux500: mop500: Fix some refcounted resources issues (git-fixes).
- ath10k: Remove ath10k_qmi_register_service_notifier() declaration (git-fixes).
- ath10k: remove the max_sched_scan_reqs value (git-fixes).
- ath10k: Skip handling del_server during driver exit (git-fixes).
- ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb (git-fixes).
- ath9k: Fix use-after-free Read in ath9k_wmi_ctrl_rx (git-fixes).
- ath9k: Fix use-after-free Read in htc_connect_service (git-fixes).
- ath9k: Fix use-after-free Write in ath9k_htc_rx_msg (git-fixes).
- ath9k_htc: Silence undersized packet warnings (git-fixes).
- ath9x: Fix stack-out-of-bounds Write in ath9k_hif_usb_rx_cb (git-fixes).
- ax25: fix setsockopt(SO_BINDTODEVICE) (git-fixes).
- b43legacy: Fix case where channel status is corrupted (git-fixes).
- bfq: Avoid false bfq queue merging (bsc#1171513).
- bfq: Fix check detecting whether waker queue should be selected (bsc#1168838).
- bfq: Use only idle IO periods for think time calculations (bsc#1171513).
- bfq: Use 'ttime' local variable (bsc#1171513).
- blk-iocost: Fix error on iocost_ioc_vrate_adj (bsc#1173206).
- blk-iocost: fix incorrect vtime comparison in iocg_is_idle() (bsc#1173206).
- bluetooth: btmtkuart: Improve exception handling in btmtuart_probe() (git-fixes).
- bluetooth: hci_bcm: fix freeing not-requested IRQ (git-fixes).
- bnxt_en: Improve TQM ring context memory sizing formulas (jsc#SLE-8371 bsc#1153274).
- bpf: Fix map permissions check (bsc#1155518).
- bpf: Prevent mmap()'ing read-only maps as writable (bsc#1155518).
- bpf: Restrict bpf_probe_read{, str}() only to archs where they work (bsc#1172344).
- bpf, sockhash: Synchronize_rcu before free'ing map (git-fixes).
- bpf, sockmap: Check update requirements after locking (git-fixes).
- bpf: Undo internal BPF_PROBE_MEM in BPF insns dump (bsc#1155518).
- brcmfmac: fix wrong location to get firmware feature (git-fixes).
- btrfs: fix log context list corruption after rename whiteout error (bsc#1172342).
- btrfs: fix partial loss of prealloc extent past i_size after fsync (bsc#1172343).
- btrfs: reloc: clear DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417 bsc#1160947 bsc#1172366).
- btrfs: reloc: fix reloc root leak and NULL pointer dereference (bsc#1171417 bsc#1160947 bsc#1172366).
- CDC-ACM: heed quirk also in error handling (git-fixes).
- CDC-ACM: heed quirk also in error handling (git-fixes).
- ceph: add comments for handle_cap_flush_ack logic (bsc#1172940).
- ceph: allow rename operation under different quota realms (bsc#1172988).
- ceph: ceph_kick_flushing_caps needs the s_mutex (bsc#1172986).
- ceph: convert mdsc->cap_dirty to a per-session list (bsc#1172984 bsc#1167104).
- ceph: document what protects i_dirty_item and i_flushing_item (bsc#1172940).
- ceph: do not release i_ceph_lock in handle_cap_trunc (bsc#1172940).
- ceph: do not return -ESTALE if there's still an open file (bsc#1171915).
- ceph: do not take i_ceph_lock in handle_cap_import (bsc#1172940).
- ceph: fix potential race in ceph_check_caps (bsc#1172940).
- ceph: flush release queue when handling caps for unknown inode (bsc#1172939).
- ceph: make sure mdsc->mutex is nested in s->s_mutex to fix dead lock (bsc#1172989).
- ceph: normalize 'delta' parameter usage in check_quota_exceeded (bsc#1172987).
- ceph: reorganize __send_cap for less spinlock abuse (bsc#1172940).
- ceph: request expedited service on session's last cap flush (bsc#1172985 bsc#1167104).
- ceph: reset i_requested_max_size if file write is not wanted (bsc#1172983).
- ceph: skip checking caps when session reconnecting and releasing reqs (bsc#1172990).
- ceph: split up __finish_cap_flush (bsc#1172940).
- ceph: throw a warning if we destroy session with mutex still locked (bsc#1172940).
- char/random: Add a newline at the end of the file (jsc#SLE-12424).
- clk: bcm2835: Fix return type of bcm2835_register_gate (git-fixes).
- clk: bcm2835: Remove casting to bcm2835_clk_register (git-fixes).
- clk: clk-flexgen: fix clock-critical handling (git-fixes).
- clk: mediatek: assign the initial value to clk_init_data of mtk_mux (git-fixes).
- clk: meson: meson8b: Do not rely on u-boot to init all GP_PLL registers (git-fixes).
- clk: meson: meson8b: Fix the polarity of the RESET_N lines (git-fixes).
- clk: meson: meson8b: Fix the vclk_div{1, 2, 4, 6, 12}_en gate bits (git-fixes).
- clk: qcom: Add missing msm8998 ufs_unipro_core_clk_src (git-fixes).
- clk: renesas: cpg-mssr: Fix STBCR suspend/resume handling (git-fixes).
- clk: samsung: Mark top ISP and CAM clocks on Exynos542x as critical (git-fixes).
- clk: sprd: return correct type of value for _sprd_pll_recalc_rate (git-fixes).
- clk: sunxi: Fix incorrect usage of round_down() (git-fixes).
- clk: ti: am33xx: fix RTC clock parent (git-fixes).
- clocksource: dw_apb_timer_of: Fix missing clockevent timers (git-fixes).
- component: Silence bind error on -EPROBE_DEFER (git-fixes).
- config: arm64: enable CONFIG_IOMMU_DEFAULT_PASSTHROUGH References: bsc#1172739
- coredump: fix crash when umh is disabled (git-fixes).
- coredump: fix null pointer dereference on coredump (git-fixes).
- crypto: algapi - Avoid spurious modprobe on LOADED (git-fixes).
- crypto: algboss - do not wait during notifier callback (git-fixes).
- crypto: cavium/nitrox - Fix 'nitrox_get_first_device()' when ndevlist is fully iterated (git-fixes).
- crypto: ccp -- do not 'select' CONFIG_DMADEVICES (git-fixes).
- crypto: chelsio/chtls: properly set tp->lsndtime (git-fixes).
- crypto: drbg - fix error return code in drbg_alloc_state() (git-fixes).
- crypto: stm32/crc32 - fix ext4 chksum BUG_ON() (git-fixes).
- crypto: stm32/crc32 - fix multi-instance (git-fixes).
- crypto: stm32/crc32 - fix run-time self test issue (git-fixes).
- cxgb4: fix adapter crash due to wrong MC size (networking-stable-20_04_27).
- cxgb4: fix large delays in PTP synchronization (networking-stable-20_04_27).
- Delete patches.suse/seltests-powerpc-Add-a-selftest-for-memcpy_mcsafe.patch (bsc#1171699).
- dma-coherent: fix integer overflow in the reserved-memory dma allocation (git-fixes).
- dma-debug: fix displaying of dma allocation type (git-fixes).
- dma-direct: fix data truncation in dma_direct_get_required_mask() (git-fixes).
- dmaengine: dmatest: Fix process hang when reading 'wait' parameter (git-fixes).
- dmaengine: dmatest: Restore default for channel (git-fixes).
- dmaengine: mmp_tdma: Do not ignore slave config validation errors (git-fixes).
- dmaengine: mmp_tdma: Reset channel error on release (git-fixes).
- dmaengine: owl: Use correct lock in owl_dma_get_pchan() (git-fixes).
- dmaengine: pch_dma.c: Avoid data race between probe and irq handler (git-fixes).
- dmaengine: tegra210-adma: Fix an error handling path in 'tegra_adma_probe()' (git-fixes).
- dm verity fec: fix hash block number in verity_fec_decode (git fixes (block drivers)).
- dm writecache: fix data corruption when reloading the target (git fixes (block drivers)).
- drivers/net/ibmvnic: Update VNIC protocol version reporting (bsc#1065729).
- drivers: phy: sr-usb: do not use internal fsm for USB2 phy init (git-fixes).
- drivers: soc: ti: knav_qmss_queue: Make knav_gp_range_ops static (git-fixes).
- drm/amd/display: add basic atomic check for cursor plane (git-fixes).
- drm/amd/display: drop cursor position check in atomic test (git-fixes).
- drm/amd/display: Prevent dpcd reads with passive dongles (git-fixes).
- drm/amdgpu: force fbdev into vram (bsc#1152472) * context changes
- drm/amdgpu: invalidate L2 before SDMA IBs (v2) (git-fixes).
- drm/amdgpu: simplify padding calculations (v2) (git-fixes).
- drm/amd/powerplay: avoid using pm_en before it is initialized revised (git-fixes).
- drm/amd/powerplay: perform PG ungate prior to CG ungate (git-fixes).
- drm/dp_mst: Increase ACT retry timeout to 3s (bsc#1152472) * context changes
- drm/dp_mst: Reformat drm_dp_check_act_status() a bit (git-fixes).
- drm/edid: Add Oculus Rift S to non-desktop list (git-fixes).
- drm: encoder_slave: fix refcouting error for modules (git-fixes).
- drm/etnaviv: fix perfmon domain interation (git-fixes).
- drm/etnaviv: rework perfmon query infrastructure (git-fixes).
- drm/i915: Do not enable WaIncreaseLatencyIPCEnabled when IPC is (bsc#1152489)
- drm/i915: Do not enable WaIncreaseLatencyIPCEnabled when IPC is disabled (git-fixes).
- drm/i915: extend audio CDCLK>=2*BCLK constraint to more platforms (git-fixes).
- drm/i915: Extend WaDisableDARBFClkGating to icl,ehl,tgl (bsc#1152489)
- drm/i915: fix port checks for MST support on gen >= 11 (git-fixes).
- drm/i915/gem: Avoid iterating an empty list (git-fixes).
- drm/i915/gvt: Fix kernel oops for 3-level ppgtt guest (bsc#1152489)
- drm/i915/gvt: Fix kernel oops for 3-level ppgtt guest (git-fixes).
- drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of (bsc#1152489)
- drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of inheritance (git-fixes).
- drm/i915: HDCP: fix Ri prime check done during link check (bsc#1152489) * context changes
- drm/i915: HDCP: fix Ri prime check done during link check (git-fixes).
- drm/i915: Limit audio CDCLK>=2*BCLK constraint back to GLK only (git-fixes).
- drm/i915: Propagate error from completed fences (git-fixes).
- drm/i915: Whitelist context-local timestamp in the gen9 cmdparser (git-fixes).
- drm/i915: work around false-positive maybe-uninitialized warning (git-fixes).
- drm/mcde: dsi: Fix return value check in mcde_dsi_bind() (git-fixes).
- drm/qxl: lost qxl_bo_kunmap_atomic_page in qxl_image_init_helper() (git-fixes).
- drm/sun4i: hdmi ddc clk: Fix size of m divider (git-fixes).
- drm/vkms: Hold gem object while still in-use (git-fixes).
- dwc3: Remove check for HWO flag in dwc3_gadget_ep_reclaim_trb_sg() (git-fixes).
- e1000e: Disable TSO for buffer overrun workaround (git-fixes).
- e1000e: Do not wake up the system via WOL if device wakeup is disabled (git-fixes).
- EDAC/amd64: Add PCI device IDs for family 17h, model 70h (bsc#1165975).
- EDAC/ghes: Setup DIMM label from DMI and use it in error reports (bsc#1168779).
- EDAC/skx: Use the mcmtr register to retrieve close_pg/bank_xor_enable (bsc#1152489).
- EDAC/synopsys: Do not dump uninitialized pinf->col (bsc#1152489).
- efi/efivars: Add missing kobject_put() in sysfs entry creation error path (git-fixes).
- efi/random: Treat EFI_RNG_PROTOCOL output as bootloader randomness (jsc#SLE-12424).
- efi: READ_ONCE rng seed size before munmap (jsc#SLE-12424).
- efi/tpm: Verify event log header before parsing (bsc#1173461).
- eventpoll: fix missing wakeup for ovflist in ep_poll_callback (bsc#1159867).
- evm: Check also if *tfm is an error pointer in init_desc() (git-fixes).
- evm: Fix a small race in init_desc() (git-fixes).
- evm: Fix possible memory leak in evm_calc_hmac_or_hash() (git-fixes).
- evm: Fix RCU list related warnings (git-fixes).
- extcon: adc-jack: Fix an error handling path in 'adc_jack_probe()' (git-fixes).
- fanotify: fix ignore mask logic for events on child and on dir (bsc#1172719).
- fdt: add support for rng-seed (jsc#SLE-12424).
- fdt: Update CRC check for rng-seed (jsc#SLE-12424).
- firmware: imx: scu: Fix corruption of header (git-fixes).
- firmware: imx: scu: Fix possible memory leak in imx_scu_probe() (git-fixes).
- firmware: imx-scu: Support one TX and one RX (git-fixes).
- firmware: imx: warn on unexpected RX (git-fixes).
- firmware: qcom_scm: fix bogous abuse of dma-direct internals (git-fixes).
- firmware: xilinx: Fix an error handling path in 'zynqmp_firmware_probe()' (git-fixes).
- Fix a regression of AF_ALG crypto interface hang with aes_s390 (bsc#1167651)
- fpga: dfl: afu: Corrected error handling levels (git-fixes).
- fs: Do not check if there is a fsnotify watcher on pseudo inodes (bsc#1158765).
- fsnotify: Rearrange fast path to minimise overhead when there is no watcher (bsc#1158765).
- genetlink: clean up family attributes allocations (git-fixes).
- genetlink: fix memory leaks in genl_family_rcv_msg_dumpit() (bsc#1154353).
- gpio: bcm-kona: Fix return value of bcm_kona_gpio_probe() (git-fixes).
- gpio: dwapb: Append MODULE_ALIAS for platform driver (git-fixes).
- gpio: dwapb: Call acpi_gpiochip_free_interrupts() on GPIO chip de-registration (git-fixes).
- gpio: exar: Fix bad handling for ida_simple_get error path (git-fixes).
- gpiolib: Document that GPIO line names are not globally unique (git-fixes).
- gpio: pca953x: Fix pca953x_gpio_set_config (git-fixes).
- gpio: pxa: Fix return value of pxa_gpio_probe() (git-fixes).
- gpio: tegra: mask GPIO IRQs during IRQ shutdown (git-fixes).
- gpu/drm: Ingenic: Fix opaque pointer casted to wrong type (git-fixes).
- habanalabs: Align protection bits configuration of all TPCs (git-fixes).
- HID: alps: Add AUI1657 device ID (git-fixes).
- HID: alps: ALPS_1657 is too specific; use U1_UNICORN_LEGACY instead (git-fixes).
- HID: i2c-hid: add Schneider SCL142ALM to descriptor override (git-fixes).
- HID: i2c-hid: reset Synaptics SYNA2393 on resume (git-fixes).
- HID: intel-ish-hid: avoid bogus uninitialized-variable warning (git-fixes).
- HID: multitouch: add eGalaxTouch P80H84 support (git-fixes).
- HID: multitouch: enable multi-input as a quirk for some devices (git-fixes).
- HID: quirks: Add HID_QUIRK_NO_INIT_REPORTS quirk for Dell K12A keyboard-dock (git-fixes).
- HID: sony: Fix for broken buttons on DS3 USB dongles (git-fixes).
- hsr: check protocol version in hsr_newlink() (networking-stable-20_04_17).
- i2c: acpi: put device when verifying client fails (git-fixes).
- i2c: altera: Fix race between xfer_msg and isr thread (git-fixes).
- i2c: designware-pci: Add support for Elkhart Lake PSE I2C (jsc#SLE-12734).
- i2c: designware-pci: Fix BUG_ON during device removal (jsc#SLE-12734).
- i2c: designware-pci: Switch over to MSI interrupts (jsc#SLE-12734).
- i2c: dev: Fix the race between the release of i2c_dev and cdev (git-fixes).
- i2c: fix missing pm_runtime_put_sync in i2c_device_probe (git-fixes).
- i2c: mux: demux-pinctrl: Fix an error handling path in 'i2c_demux_pinctrl_probe()' (git-fixes).
- ibmveth: Fix max MTU limit (bsc#1173428 ltc#186397).
- ibmvnic: continue to init in CRQ reset returns H_CLOSED (bsc#1173280 ltc#185369).
- ibmvnic: Flush existing work items before device removal (bsc#1065729).
- ibmvnic: Harden device login requests (bsc#1170011 ltc#183538).
- ice: Fix error return code in ice_add_prof() (jsc#SLE-7926).
- ice: Fix inability to set channels when down (jsc#SLE-7926).
- ieee80211: Fix incorrect mask for default PE duration (git-fixes).
- iio: adc: stm32-adc: fix device used to request dma (git-fixes).
- iio: adc: stm32-adc: Use dma_request_chan() instead dma_request_slave_channel() (git-fixes).
- iio: adc: stm32-dfsdm: fix device used to request dma (git-fixes).
- iio: adc: stm32-dfsdm: Use dma_request_chan() instead dma_request_slave_channel() (git-fixes).
- iio: adc: ti-ads8344: Fix channel selection (git-fixes).
- iio: buffer: Do not allow buffers without any channels enabled to be activated (git-fixes).
- iio:chemical:pms7003: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:chemical:sps30: Fix timestamp alignment (git-fixes).
- iio: dac: vf610: Fix an error handling path in 'vf610_dac_probe()' (git-fixes).
- iio: pressure: bmp280: Tolerate IRQ before registering (git-fixes).
- iio: sca3000: Remove an erroneous 'get_device()' (git-fixes).
- iio: vcnl4000: Fix i2c swapped word reading (git-fixes).
- ima: Call ima_calc_boot_aggregate() in ima_eventdigest_init() (bsc#1172223).
- ima: Directly assign the ima_default_policy pointer to ima_rules (bsc#1172223)
- ima: Directly free *entry in ima_alloc_init_template() if digests is NULL (bsc#1172223).
- ima: Remove __init annotation from ima_pcrread() (git-fixes).
- include/asm-generic/topology.h: guard cpumask_of_node() macro argument (bsc#1148868).
- Input: dlink-dir685-touchkeys - fix a typo in driver name (git-fixes).
- Input: edt-ft5x06 - fix get_default register write access (git-fixes).
- Input: evdev - call input_flush_device() on release(), not flush() (git-fixes).
- Input: i8042 - add ThinkPad S230u to i8042 reset list (git-fixes).
- Input: mms114 - fix handling of mms345l (git-fixes).
- Input: synaptics - add a second working PNP_ID for Lenovo T470s (git-fixes).
- Input: synaptics-rmi4 - fix error return code in rmi_driver_probe() (git-fixes).
- Input: synaptics-rmi4 - really fix attn_data use-after-free (git-fixes).
- Input: usbtouchscreen - add support for BonXeon TP (git-fixes).
- Input: xpad - add custom init packet for Xbox One S controllers (git-fixes).
- iocost: check active_list of all the ancestors in iocg_activate() (bsc#1173206).
- iocost: do not let vrate run wild while there's no saturation signal (bsc1173206).
- iocost: over-budget forced IOs should schedule async delay (bsc#1173206).
- iommu/amd: Call domain_flush_complete() in update_domain() (bsc#1172061).
- iommu/amd: Do not flush Device Table in iommu_map_page() (bsc#1172062).
- iommu/amd: Do not loop forever when trying to increase address space (bsc#1172063).
- iommu/amd: Fix legacy interrupt remapping for x2APIC-enabled system (bsc#1172393).
- iommu/amd: Fix over-read of ACPI UID from IVRS table (bsc#1172064).
- iommu/amd: Fix race in increase_address_space()/fetch_pte() (bsc#1172065).
- iommu/amd: Update Device Table in increase_address_space() (bsc#1172066).
- iommu: Fix reference count leak in iommu_group_alloc (bsc#1172394).
- iommu/qcom: Fix local_base status check (bsc#1172067).
- iommu/virtio: Reverse arguments to list_add (bsc#1172068).
- ipv4: Update fib_select_default to handle nexthop objects (networking-stable-20_04_27).
- ipv6: fix IPV6_ADDRFORM operation logic (bsc#1171662).
- ipvs: Improve robustness to the ipvs sysctl (git-fixes).
- irqchip/al-fic: Add support for irq retrigger (jsc#SLE-10505).
- irqchip/ti-sci-inta: Fix processing of masked irqs (git-fixes).
- irqchip/versatile-fpga: Apply clear-mask earlier (git-fixes).
- irqchip/versatile-fpga: Handle chained IRQs properly (git-fixes).
- iwlwifi: avoid debug max amsdu config overwriting itself (git-fixes).
- iwlwifi: mvm: limit maximum queue appropriately (git-fixes).
- iwlwifi: pcie: handle QuZ configs with killer NICs as well (bsc#1172374).
- jbd2: fix data races at struct journal_head (bsc#1173438).
- kabi: ppc64le: prevent struct dma_map_ops to become defined (jsc#SLE-12424).
- kabi/severities: Ingnore get_dev_data() The function is internal to the AMD IOMMU driver and must not be called by any third party.
- kABI workaround for struct hdac_bus changes (git-fixes).
- ktest: Add timeout for ssh sync testing (git-fixes).
- KVM: Check validity of resolved slot when searching memslots (bsc#1172069).
- KVM: x86/mmu: Set mmio_value to '0' if reserved #PF can't be generated (bsc#1171904).
- KVM: x86: only do L1TF workaround on affected processors (bsc#1171904).
- l2tp: Allow management of tunnels and session in user namespace (networking-stable-20_04_17).
- libbpf: Fix perf_buffer__free() API for sparse allocs (bsc#1155518).
- libceph: ignore pool overlay and cache logic on redirects (bsc#1172938).
- lib: devres: add a helper function for ioremap_uc (git-fixes).
- libertas_tf: avoid a null dereference in pointer priv (git-fixes).
- lib/lzo: fix ambiguous encoding bug in lzo-rle (git-fixes).
- libnvdimm/btt: fix variable 'rc' set but not used (bsc#1162400).
- libnvdimm: cover up nd_pfn_sb changes (bsc#1171759).
- libnvdimm: cover up nd_region changes (bsc#1162400).
- libnvdimm/dax: Pick the right alignment default when creating dax devices (bsc#1171759).
- libnvdimm/label: Remove the dpa align check (bsc#1171759).
- libnvdimm/namespace: Enforce memremap_compat_align() (bsc#1162400).
- libnvdimm/namsepace: Do not set claim_class on error (bsc#1162400).
- libnvdimm/of_pmem: Provide a unique name for bus provider (bsc#1171739).
- libnvdimm: Out of bounds read in __nd_ioctl() (bsc#1065729).
- libnvdimm/pfn_dev: Add a build check to make sure we notice when struct page size change (bsc#1171743).
- libnvdimm/pfn_dev: Add page size and struct page size to pfn superblock (bsc#1171759).
- libnvdimm/pfn: Prevent raw mode fallback if pfn-infoblock valid (bsc#1171743).
- libnvdimm/pmem: Advance namespace seed for specific probe errors (bsc#1171743).
- libnvdimm/region: Fix build error (bsc#1162400).
- libnvdimm/region: Introduce an 'align' attribute (bsc#1162400).
- libnvdimm/region: Introduce NDD_LABELING (bsc#1162400).
- libnvdimm/region: Rewrite _probe_success() to _advance_seeds() (bsc#1171743).
- libnvdimm: Use PAGE_SIZE instead of SZ_4K for align check (bsc#1171759).
- lib: Uplevel the pmem 'region' ida to a global allocator (bc#1162400).
- list: Add hlist_unhashed_lockless() (bsc#1173438).
- livepatch: Apply vmlinux-specific KLP relocations early (bsc#1071995).
- livepatch: Disallow vmlinux.ko (bsc#1071995).
- livepatch: Make klp_apply_object_relocs static (bsc#1071995).
- livepatch: Prevent module-specific KLP rela sections from referencing vmlinux symbols (bsc#1071995).
- livepatch: Remove .klp.arch (bsc#1071995).
- locktorture: Allow CPU-hotplug to be disabled via --bootargs (bsc#1173068).
- lpfc_debugfs: get rid of pointless access_ok() (bsc#1171530).
- lpfc: fix axchg pointer reference after free and double frees (bsc#1171530).
- lpfc: Fix pointer checks and comments in LS receive refactoring (bsc#1171530).
- lpfc: Fix return value in __lpfc_nvme_ls_abort (bsc#1171530).
- lpfc: Synchronize NVME transport and lpfc driver devloss_tmo (bcs#1173060).
- mac80211: mesh: fix discovery timer re-arming issue / crash (git-fixes).
- mailbox: zynqmp-ipi: Fix NULL vs IS_ERR() check in zynqmp_ipi_mbox_probe() (git-fixes).
- Make the 'Reducing compressed framebufer size' message be DRM_INFO_ONCE() (git-fixes).
- mdraid: fix read/write bytes accounting (bsc#1172537).
- media: cedrus: Program output format during each run (git-fixes).
- media: dvb: return -EREMOTEIO on i2c transfer failure (git-fixes).
- media: platform: fcp: Set appropriate DMA parameters (git-fixes).
- media: Revert 'staging: imgu: Address a compiler warning on alignment' (git-fixes).
- media: staging: ipu3: Fix stale list entries on parameter queue failure (git-fixes).
- media: staging: ipu3-imgu: Move alignment attribute to field (git-fixes).
- mei: release me_cl object reference (git-fixes).
- mfd: intel-lpss: Add Intel Tiger Lake PCI IDs (jsc#SLE-12737).
- mfd: intel-lpss: Use devm_ioremap_uc for MMIO (git-fixes).
- mfd: stmfx: Fix stmfx_irq_init error path (git-fixes).
- mfd: stmfx: Reset chip on resume as supply was disabled (git-fixes).
- misc: fastrpc: fix potential fastrpc_invoke_ctx leak (git-fixes).
- misc: rtsx: Add short delay after exit from ASPM (git-fixes).
- mlxsw: Fix some IS_ERR() vs NULL bugs (networking-stable-20_04_27).
- mm: adjust vm_committed_as_batch according to vm overcommit policy (bnc#1173271).
- mmc: block: Fix use-after-free issue for rpmb (git-fixes).
- mmc: core: Use DEFINE_DEBUGFS_ATTRIBUTE instead of DEFINE_SIMPLE_ATTRIBUTE (git-fixes).
- mmc: fix compilation of user API (git-fixes).
- mmc: meson-mx-sdio: trigger a soft reset after a timeout or CRC error (git-fixes).
- mmc: mmci_sdmmc: fix DMA API warning overlapping mappings (git-fixes).
- mmc: sdhci-esdhc-imx: fix the mask for tuning start point (git-fixes).
- mmc: sdhci-msm: Clear tuning done flag while hs400 tuning (git-fixes).
- mmc: sdio: Fix potential NULL pointer error in mmc_sdio_init_card() (git-fixes).
- mmc: sdio: Fix several potential memory leaks in mmc_sdio_init_card() (git-fixes).
- mmc: tmio: Further fixup runtime PM management at remove (git-fixes).
- mmc: uniphier-sd: call devm_request_irq() after tmio_mmc_host_probe() (git-fixes).
- mm: do not prepare anon_vma if vma has VM_WIPEONFORK (bsc#1169681).
- mm: memcontrol: fix memory.low proportional distribution (bsc#1168230).
- mm/memremap: drop unused SECTION_SIZE and SECTION_MASK (bsc#1162400 bsc#1170895 ltc#184375 ltc#185686).
- mm/memremap_pages: Introduce memremap_compat_align() (bsc#1162400).
- mm/memremap_pages: Kill unused __devm_memremap_pages() (bsc#1162400).
- mm/util.c: make vm_memory_committed() more accurate (bnc#1173271).
- mt76: mt76x02u: Add support for newer versions of the XBox One wifi adapter (git-fixes).
- mtd: Fix mtd not registered due to nvmem name collision (git-fixes).
- mtd: rawnand: brcmnand: correctly verify erased pages (git-fixes).
- mtd: rawnand: brcmnand: fix CS0 layout (git-fixes).
- mtd: rawnand: brcmnand: fix hamming oob layout (git-fixes).
- mtd: rawnand: diskonchip: Fix the probe error path (git-fixes).
- mtd: rawnand: Fix nand_gpio_waitrdy() (git-fixes).
- mtd: rawnand: ingenic: Fix the probe error path (git-fixes).
- mtd: rawnand: marvell: Fix probe error path (git-fixes).
- mtd: rawnand: marvell: Fix the condition on a return code (git-fixes).
- mtd: rawnand: marvell: Use nand_cleanup() when the device is not yet registered (git-fixes).
- mtd: rawnand: mtk: Fix the probe error path (git-fixes).
- mtd: rawnand: onfi: Fix redundancy detection check (git-fixes).
- mtd: rawnand: orion: Fix the probe error path (git-fixes).
- mtd: rawnand: oxnas: Keep track of registered devices (git-fixes).
- mtd: rawnand: oxnas: Release all devices in the _remove() path (git-fixes).
- mtd: rawnand: pasemi: Fix the probe error path (git-fixes).
- mtd: rawnand: plat_nand: Fix the probe error path (git-fixes).
- mtd: rawnand: sharpsl: Fix the probe error path (git-fixes).
- mtd: rawnand: socrates: Fix the probe error path (git-fixes).
- mtd: rawnand: sunxi: Fix the probe error path (git-fixes).
- mtd: rawnand: timings: Fix default tR_max and tCCS_min timings (git-fixes).
- mtd: rawnand: tmio: Fix the probe error path (git-fixes).
- mtd: rawnand: xway: Fix the probe error path (git-fixes).
- mtd: spinand: Propagate ECC information to the MTD structure (git-fixes).
- mtd: spi-nor: intel-spi: Add support for Intel Tiger Lake SPI serial flash (jsc#SLE-12737).
- mwifiex: avoid -Wstringop-overflow warning (git-fixes).
- mwifiex: Fix memory corruption in dump_station (git-fixes).
- net: bcmgenet: correct per TX/RX ring statistics (networking-stable-20_04_27).
- net: dsa: b53: b53_arl_rw_op() needs to select IVL or SVL (networking-stable-20_04_27).
- net: dsa: b53: Fix ARL register definitions (networking-stable-20_04_27).
- net: dsa: b53: Lookup VID in ARL searches when VLAN is enabled (networking-stable-20_04_27).
- net: dsa: b53: Rework ARL bin logic (networking-stable-20_04_27).
- net: dsa: declare lockless TX feature for slave ports (bsc#1154353).
- net: dsa: mt7530: fix tagged frames pass-through in VLAN-unaware mode (networking-stable-20_04_17).
- net: ena: xdp: update napi budget for DROP and ABORTED (bsc#1154492).
- net: ena: xdp: XDP_TX: fix memory leak (bsc#1154492).
- netfilter: connlabels: prefer static lock initialiser (git-fixes).
- netfilter: nf_queue: enqueue skbs with NULL dst (git-fixes).
- netfilter: nf_tables_offload: return EOPNOTSUPP if rule specifies no actions (git-fixes).
- netfilter: nft_tproxy: Fix port selector on Big Endian (git-fixes).
- netfilter: nft_tunnel: add the missing ERSPAN_VERSION nla_policy (git-fixes).
- netfilter: not mark a spinlock as __read_mostly (git-fixes).
- net: ipv4: devinet: Fix crash when add/del multicast IP with autojoin (networking-stable-20_04_17).
- net: ipv6: do not consider routes via gateways for anycast address check (networking-stable-20_04_17).
- net/mlx4_en: avoid indirect call in TX completion (networking-stable-20_04_27).
- net/mlx5e: Add missing release firmware call (networking-stable-20_04_17).
- net/mlx5e: Fix pfnum in devlink port attribute (networking-stable-20_04_17).
- net/mlx5e: Fix stats update for matchall classifier (jsc#SLE-8464).
- net/mlx5e: replace EINVAL in mlx5e_flower_parse_meta() (jsc#SLE-8464).
- net/mlx5: Fix cleaning unmanaged flow tables (jsc#SLE-8464).
- net/mlx5: Fix crash upon suspend/resume (bsc#1172365).
- net/mlx5: Fix frequent ioread PCI access during recovery (networking-stable-20_04_17).
- net: netrom: Fix potential nr_neigh refcnt leak in nr_add_node (networking-stable-20_04_27).
- net: openvswitch: ovs_ct_exit to be done under ovs_lock (networking-stable-20_04_27).
- net: phy: propagate an error back to the callers of phy_sfp_probe (bsc#1154353).
- net: qrtr: send msgs from local of same id as broadcast (networking-stable-20_04_17).
- net: revert default NAPI poll timeout to 2 jiffies (networking-stable-20_04_17).
- net: revert 'net: get rid of an signed integer overflow in ip_idents_reserve()' (bnc#1158748 (network regression)).
- net: tun: record RX queue in skb before do_xdp_generic() (networking-stable-20_04_17).
- net: vmxnet3: fix possible buffer overflow caused by bad DMA value in vmxnet3_get_rss() (bsc#1172484).
- net/x25: Fix x25_neigh refcnt leak when receiving frame (networking-stable-20_04_27).
- NFC: st21nfca: add missed kfree_skb() in an error path (git-fixes).
- nfs: add minor version to nfs_server_key for fscache (bsc#1172467).
- nfsd4: make drc_slab global, not per-net (git-fixes).
- nfsd: always check return value of find_any_file (bsc#1172208).
- NFS: Fix fscache super_cookie index_key from changing after umount (git-fixes).
- nfs: fix NULL deference in nfs4_get_valid_delegation.
- nfs: fscache: use timespec64 in inode auxdata (git-fixes).
- nfs: set invalid blocks after NFSv4 writes (git-fixes).
- NFSv4.1 fix rpc_call_done assignment for BIND_CONN_TO_SESSION (git-fixes).
- NFSv4: Fix fscache cookie aux_data to ensure change_attr is included (git-fixes).
- ntb: intel: add hw workaround for NTB BAR alignment (jsc#SLE-12710).
- ntb: intel: Add Icelake (gen4) support for Intel NTB (jsc#SLE-12710).
- ntb: intel: fix static declaration (jsc#SLE-12710).
- nvdimm: Avoid race between probe and reading device attributes (bsc#1170442).
- nvme-fc: avoid gcc-10 zero-length-bounds warning (bsc#1173206).
- nvme-fc: do not call nvme_cleanup_cmd() for AENs (bsc#1171688).
- nvme-fc: print proper nvme-fc devloss_tmo value (bsc#1172391).
- objtool: Allow no-op CFI ops in alternatives (bsc#1169514).
- objtool: Clean instruction state before each function validation (bsc#1169514).
- objtool: Fix !CFI insn_state propagation (bsc#1169514).
- objtool: Fix ORC vs alternatives (bsc#1169514).
- objtool: Ignore empty alternatives (bsc#1169514).
- objtool: Remove check preventing branches within alternative (bsc#1169514).
- objtool: Rename struct cfi_state (bsc#1169514).
- objtool: Uniquely identify alternative instruction groups (bsc#1169514).
- p54usb: add AirVasT USB stick device-id (git-fixes).
- panic: do not print uninitialized taint_flags (bsc#1172814).
- PCI: Allow pci_resize_resource() for devices on root bus (git-fixes).
- PCI: amlogic: meson: Do not use FAST_LINK_MODE to set up link (git-fixes).
- PCI: brcmstb: Assert fundamental reset on initialization (git-fixes).
- PCI: brcmstb: Assert fundamental reset on initialization (git-fixes).
- PCI: brcmstb: Fix window register offset from 4 to 8 (git-fixes).
- PCI: brcmstb: Fix window register offset from 4 to 8 (git-fixes).
- pcie: mobiveil: remove patchset v9 Prepare to backport upstream version.
- PCI: Fix pci_register_host_bridge() device_register() error handling (git-fixes).
- PCI: mobiveil: Add 8-bit and 16-bit CSR register accessors (bsc#1161495).
- PCI: mobiveil: Add callback function for interrupt initialization (bsc#1161495).
- PCI: mobiveil: Add callback function for link up check (bsc#1161495).
- PCI: mobiveil: Add Header Type field check (bsc#1161495).
- PCI: mobiveil: Add PCIe Gen4 RC driver for Layerscape SoCs (bsc#1161495).
- PCI: mobiveil: Allow mobiveil_host_init() to be used to re-init host (bsc#1161495).
- PCI: mobiveil: Collect the interrupt related operations into a function (bsc#1161495).
- PCI: mobiveil: Fix sparse different address space warnings (bsc#1161495).
- PCI: mobiveil: Fix unmet dependency warning for PCIE_MOBIVEIL_PLAT (bsc#1161495).
- PCI: mobiveil: Introduce a new structure mobiveil_root_port (bsc#1161495).
- PCI: mobiveil: ls_pcie_g4: add Workaround for A-011451 (bsc#1161495).
- PCI: mobiveil: ls_pcie_g4: add Workaround for A-011577 (bsc#1161495).
- PCI: mobiveil: ls_pcie_g4: fix SError when accessing config space (bsc#1161495).
- PCI: mobiveil: Modularize the Mobiveil PCIe Host Bridge IP driver (bsc#1161495).
- PCI: mobiveil: Move the host initialization into a function (bsc#1161495).
- PCI/PM: Adjust pcie_wait_for_link_delay() for caller delay (git-fixes).
- PCI/PM: Call .bridge_d3() hook only if non-NULL (git-fixes).
- PCI: Program MPS for RCiEP devices (git-fixes).
- PCI/PTM: Inherit Switch Downstream Port PTM settings from Upstream Port (git-fixes).
- PCI: rcar: Fix incorrect programming of OB windows (git-fixes).
- PCI: v3-semi: Fix a memory leak in v3_pci_probe() error handling paths (git-fixes).
- PCI: vmd: Filter resource type bits from shadow register (git-fixes).
- pcm_native: result of put_user() needs to be checked (git-fixes).
- perf/core: Fix endless multiplex timer (git-fixes).
- perf/core: fix parent pid/tid in task exit events (git-fixes).
- pinctrl: freescale: imx: Fix an error handling path in 'imx_pinctrl_probe()' (git-fixes).
- pinctrl: freescale: imx: Use 'devm_of_iomap()' to avoid a resource leak in case of error in 'imx_pinctrl_probe()' (git-fixes).
- pinctrl: imxl: Fix an error handling path in 'imx1_pinctrl_core_probe()' (git-fixes).
- pinctrl: intel: Add Intel Tiger Lake pin controller support (jsc#SLE-12737).
- pinctrl: ocelot: Fix GPIO interrupt decoding on Jaguar2 (git-fixes).
- pinctrl: rza1: Fix wrong array assignment of rza1l_swio_entries (git-fixes).
- pinctrl: samsung: Correct setting of eint wakeup mask on s5pv210 (git-fixes).
- pinctrl: samsung: Save/restore eint_mask over suspend for EINT_TYPE GPIOs (git-fixes).
- pinctrl: sprd: Fix the incorrect pull-up definition (git-fixes).
- pinctrl: stmfx: stmfx_pinconf_set does not require to get direction anymore (git-fixes).
- pinctrl: tigerlake: Tiger Lake uses _HID enumeration (jsc#SLE-12737).
- platform/x86: asus-nb-wmi: Do not load on Asus T100TA and T200TA (git-fixes).
- platform/x86: dell-laptop: do not register micmute LED if there is no token (git-fixes).
- platform/x86: intel-vbtn: Also handle tablet-mode switch on 'Detachable' and 'Portable' chassis-types (git-fixes).
- platform/x86: intel-vbtn: Do not advertise switches to userspace if they are not there (git-fixes).
- platform/x86: intel-vbtn: Only blacklist SW_TABLET_MODE on the 9 / 'Laptop' chasis-type (git-fixes).
- platform/x86: intel-vbtn: Split keymap into buttons and switches parts (git-fixes).
- platform/x86: intel-vbtn: Use acpi_evaluate_integer() (git-fixes).
- PM: runtime: clk: Fix clk_pm_runtime_get() error path (git-fixes).
- pnp: Use list_for_each_entry() instead of open coding (git-fixes).
- powerpc/64s: Do not let DT CPU features set FSCR_DSCR (bsc#1065729).
- powerpc/64s/exception: Fix machine check no-loss idle wakeup (bsc#1156395).
- powerpc/64s/kuap: Restore AMR in system reset exception (bsc#1156395).
- powerpc/64s: Save FSCR to init_task.thread.fscr after feature init (bsc#1065729).
- powerpc/book3s64: Export has_transparent_hugepage() related functions (bsc#1171759).
- powerpc/bpf: Enable bpf_probe_read{, str}() on powerpc again (bsc#1172344).
- powerpc/fadump: Account for memory_limit while reserving memory (jsc#SLE-9099 git-fixes).
- powerpc/fadump: consider reserved ranges while reserving memory (jsc#SLE-9099 git-fixes).
- powerpc/fadump: use static allocation for reserved memory ranges (jsc#SLE-9099 git-fixes).
- powerpc/kuap: PPC_KUAP_DEBUG should depend on PPC_KUAP (bsc#1156395).
- powerpc/powernv: Fix a warning message (bsc#1156395).
- powerpc/setup_64: Set cache-line-size based on cache-block-size (bsc#1065729).
- powerpc/xive: Clear the page tables for the ESB IO mapping (bsc#1085030).
- power: reset: qcom-pon: reg write mask depends on pon generation (git-fixes).
- power: supply: bq24257_charger: Replace depends on REGMAP_I2C with select (git-fixes).
- power: supply: core: fix HWMON temperature labels (git-fixes).
- power: supply: core: fix memory leak in HWMON error path (git-fixes).
- power: supply: lp8788: Fix an error handling path in 'lp8788_charger_probe()' (git-fixes).
- power: supply: smb347-charger: IRQSTAT_D is volatile (git-fixes).
- printk: queue wake_up_klogd irq_work only if per-CPU areas are ready (bsc#1172095).
- proc/meminfo: avoid open coded reading of vm_committed_as (bnc#1173271).
- pwm: sun4i: Move pwm_calculate() out of spin_lock() (git-fixes).
- r8152: support additional Microsoft Surface Ethernet Adapter variant (git-fixes).
- r8169: Revive default chip version for r8168 (bsc#1173085).
- raid5: remove gfp flags from scribble_alloc() (bsc#1166985).
- random: fix data races at timer_rand_state (bsc#1173438).
- rcu: Avoid data-race in rcu_gp_fqs_check_wake() (bsc#1171828).
- rcu: Fix data-race due to atomic_t copy-by-value (bsc#1171828).
- rcu: Make rcu_read_unlock_special() checks match raise_softirq_irqoff() (bsc#1172046).
- rcu: Simplify rcu_read_unlock_special() deferred wakeups (bsc#1172046).
- rcutorture: Add 100-CPU configuration (bsc#1173068).
- rcutorture: Add worst-case call_rcu() forward-progress results (bsc#1173068).
- rcutorture: Dispense with Dracut for initrd creation (bsc#1173068).
- rcutorture: Make kvm-find-errors.sh abort on bad directory (bsc#1173068).
- rcutorture: Remove CONFIG_HOTPLUG_CPU=n from scenarios (bsc#1173068).
- rcutorture: Summarize summary of build and run results (bsc#1173068).
- rcutorture: Test TREE03 with the threadirqs kernel boot parameter (bsc#1173068).
- rcu: Use *_ONCE() to protect lockless ->expmask accesses (bsc#1171828).
- rcu: Use WRITE_ONCE() for assignments to ->pprev for hlist_nulls (bsc#1173438).
- RDMA/bnxt_re: Remove dead code from rcfw (bsc#1170774).
- RDMA/core: Move and rename trace_cm_id_create() (jsc#SLE-8449).
- RDMA/mlx5: Fix NULL pointer dereference in destroy_prefetch_work (jsc#SLE-8446).
- RDMA/nl: Do not permit empty devices names during RDMA_NLDEV_CMD_NEWLINK/SET (bsc#1172841).
- RDMA/srpt: Fix disabling device management (jsc#SLE-8449).
- RDMA/uverbs: Make the event_queue fds return POLLERR when disassociated (jsc#SLE-8449).
- remoteproc: Add missing '\n' in log messages (git-fixes).
- remoteproc: Fall back to using parent memory pool if no dedicated available (git-fixes).
- remoteproc: Fix and restore the parenting hierarchy for vdev (git-fixes).
- remoteproc: Fix IDR initialisation in rproc_alloc() (git-fixes).
- Revert 'drm/amd/display: disable dcn20 abm feature for bring up' (git-fixes).
- Revert 'fs/seq_file.c: seq_read(): add info message about buggy .next functions' (bsc#1172751) The message floods dmesg and its benefit is marginal in default kernel.
- Revert 'pinctrl: freescale: imx: Use 'devm_of_iomap()' to avoid a resource leak in case of error in 'imx_pinctrl_probe()'' (git-fixes).
- rpm/kernel-source.spec.in: Add obsolete_rebuilds (boo#1172073).
- rpm/modules.fips: * add aes-ce-ccm and des3_ede-x86_64 (boo#173030) * add aes_ti and aes_neon_bs (boo#1172956)
- rtc: mc13xxx: fix a double-unlock issue (git-fixes).
- rtc: rv3028: Add missed check for devm_regmap_init_i2c() (git-fixes).
- rtlwifi: Fix a double free in _rtl_usb_tx_urb_setup() (git-fixes).
- rtw88: fix an issue about leak system resources (git-fixes).
- rxrpc: Fix call RCU cleanup using non-bh-safe locks (git-fixes).
- s390/bpf: Maintain 8-byte stack alignment (bsc#1169194, LTC#185911).
- s390/pci: Log new handle in clp_disable_fh() (git-fixes).
- sched/cfs: change initial value of runnable_avg (bsc#1158765).
- sched/core: Check cpus_mask, not cpus_ptr in __set_cpus_allowed_ptr(), to fix mask corruption (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/core: Fix PI boosting between RT and DEADLINE tasks (bsc#1172823).
- sched/core: Fix PI boosting between RT and DEADLINE tasks (git fixes (sched)).
- sched/core: Fix ttwu() race (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/core: s/WF_ON_RQ/WQ_ON_CPU/ (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/cpuacct: Fix charge cpuacct.usage_sys (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/deadline: Initialize ->dl_boosted (bsc#1172823).
- sched/deadline: Initialize ->dl_boosted (git fixes (sched)).
- sched: etf: do not assume all sockets are full blown (networking-stable-20_04_27).
- sched/fair: find_idlest_group(): Remove unused sd_flag parameter (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Fix enqueue_task_fair() warning some more (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: fix nohz next idle balance (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Optimize dequeue_task_fair() (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Optimize enqueue_task_fair() (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Simplify the code of should_we_balance() (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched: Make newidle_balance() static again (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched: Offload wakee task activation if it the wakee is descheduling (bnc#1158748, bnc#1159781).
- sched: Optimize ttwu() spinning on p->on_cpu (bnc#1158748, bnc#1159781).
- sched/pelt: Sync util/runnable_sum with PELT window when propagating (bnc#1155798 (CPU scheduler functional and performance backports)).
- scripts/decodecode: fix trapping instruction formatting (bsc#1065729).
- scsi: ibmvscsi: Do not send host info in adapter info MAD after LPM (bsc#1172759 ltc#184814).
- scsi: lpfc: Change default queue allocation for reduced memory consumption (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Copyright updates for 12.6.0.4 patches (bsc#1171530).
- scsi: lpfc: fix build failure with DEBUGFS disabled (bsc#1171530).
- scsi: lpfc: Fix incomplete NVME discovery when target (bsc#1171530).
- scsi: lpfc: Fix lpfc_nodelist leak when processing unsolicited event (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Fix MDS Diagnostic Enablement definition (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Fix memory leak on lpfc_bsg_write_ebuf_set func (bsc#1171530).
- scsi: lpfc: Fix negation of else clause in lpfc_prep_node_fc4type (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Fix noderef and address space warnings (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: fix spelling mistakes of asynchronous (bsc#1171530).
- scsi: lpfc: Maintain atomic consistency of queue_claimed flag (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Make lpfc_defer_acc_rsp static (bsc#1171530).
- scsi: lpfc: remove duplicate unloading checks (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Remove re-binding of nvme rport during registration (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Remove redundant initialization to variable rc (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Remove unnecessary lockdep_assert_held calls (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Update lpfc version to 12.8.0.1 (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: megaraid_sas: Replace undefined MFI_BIG_ENDIAN macro with __BIG_ENDIAN_BITFIELD macro (bsc#1173206).
- scsi: qla2xxx: Delete all sessions before unregister local nvme port (jsc#SLE-9714 jsc#SLE-10327 jsc#SLE-10334 bsc#1157169).
- scsi: qla2xxx: Do not log message when reading port speed via sysfs (jsc#SLE-9714 jsc#SLE-10327 jsc#SLE-10334 bsc#1157169).
- scsi: qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV (jsc#SLE-9714 jsc#SLE-10327 jsc#SLE-10334 bsc#1157169).
- scsi: sd_zbc: Fix sd_zbc_complete() (bsc#1173206).
- scsi: smartpqi: Update attribute name to `driver_version` (bsc#1173206).
- scsi: zfcp: add diagnostics buffer for exchange config data (bsc#1158050).
- scsi: zfcp: auto variables for dereferenced structs in open port handler (bsc#1158050).
- scsi: zfcp: diagnostics buffer caching and use for exchange port data (bsc#1158050).
- scsi: zfcp: enhance handling of FC Endpoint Security errors (bsc#1158050).
- scsi: zfcp: expose fabric name as common fc_host sysfs attribute (bsc#1158050).
- scsi: zfcp: Fence adapter status propagation for common statuses (bsc#1158050).
- scsi: zfcp: Fence early sysfs interfaces for accesses of shost objects (bsc#1158050).
- scsi: zfcp: Fence fc_host updates during link-down handling (bsc#1158050).
- scsi: zfcp: fix fc_host attributes that should be unknown on local link down (bsc#1158050).
- scsi: zfcp: fix wrong data and display format of SFP+ temperature (bsc#1158050).
- scsi: zfcp: implicitly refresh config-data diagnostics when reading sysfs (bsc#1158050).
- scsi: zfcp: implicitly refresh port-data diagnostics when reading sysfs (bsc#1158050).
- scsi: zfcp: introduce sysfs interface for diagnostics of local SFP transceiver (bsc#1158050).
- scsi: zfcp: introduce sysfs interface to read the local B2B-Credit (bsc#1158050).
- scsi: zfcp: log FC Endpoint Security errors (bsc#1158050).
- scsi: zfcp: log FC Endpoint Security of connections (bsc#1158050).
- scsi: zfcp: Move allocation of the shost object to after xconf- and xport-data (bsc#1158050).
- scsi: zfcp: Move fc_host updates during xport data handling into fenced function (bsc#1158050).
- scsi: zfcp: move maximum age of diagnostic buffers into a per-adapter variable (bsc#1158050).
- scsi: zfcp: Move p-t-p port allocation to after xport data (bsc#1158050).
- scsi: zfcp: Move shost modification after QDIO (re-)open into fenced function (bsc#1158050).
- scsi: zfcp: Move shost updates during xconfig data handling into fenced function (bsc#1158050).
- scsi: zfcp: proper indentation to reduce confusion in zfcp_erp_required_act (bsc#1158050).
- scsi: zfcp: report FC Endpoint Security in sysfs (bsc#1158050).
- scsi: zfcp: signal incomplete or error for sync exchange config/port data (bsc#1158050).
- scsi: zfcp: support retrieval of SFP Data via Exchange Port Data (bsc#1158050).
- scsi: zfcp: trace FC Endpoint Security of FCP devices and connections (bsc#1158050).
- scsi: zfcp: wire previously driver-specific sysfs attributes also to fc_host (bsc#1158050).
- selftests/bpf: CONFIG_IPV6_SEG6_BPF required for test_seg6_loop.o (bsc#1155518).
- selftests/bpf: CONFIG_LIRC required for test_lirc_mode2.sh (bsc#1155518).
- selftests/bpf: Fix invalid memory reads in core_relo selftest (bsc#1155518).
- selftests/bpf: Fix memory leak in extract_build_id() (bsc#1155518).
- selftests/bpf, flow_dissector: Close TAP device FD after the test (bsc#1155518).
- selftests/timens: handle a case when alarm clocks are not supported (bsc#1164648,jsc#SLE-11493).
- serial: 8250: Fix max baud limit in generic 8250 port (git-fixes).
- slimbus: core: Fix mismatch in of_node_get/put (git-fixes).
- soc: mediatek: cmdq: return send msg error code (git-fixes).
- soc: qcom: rpmh: Dirt can only make you dirtier, not cleaner (git-fixes).
- soc: qcom: rpmh: Invalidate SLEEP and WAKE TCSes before flushing new data (git-fixes).
- soc: qcom: rpmh-rsc: Allow using free WAKE TCS for active request (git-fixes).
- soc: qcom: rpmh-rsc: Clear active mode configuration for wake TCS (git-fixes).
- soc: qcom: rpmh: Update dirty flag only when data changes (git-fixes).
- soc/tegra: pmc: Select GENERIC_PINCONF (git-fixes).
- spi: bcm2835aux: Fix controller unregister order (git-fixes).
- spi: bcm2835: Fix controller unregister order (git-fixes).
- spi: bcm-qspi: Handle clock probe deferral (git-fixes).
- spi: bcm-qspi: when tx/rx buffer is NULL set to 0 (git-fixes).
- SPI: designware: pci: Switch over to MSI interrupts (jsc#SLE-12735).
- spi: dt-bindings: spi-controller: Fix #address-cells for slave mode (git-fixes).
- spi: dw: Add SPI Rx-done wait method to DMA-based transfer (git-fixes).
- spi: dw: Add SPI Tx-done wait method to DMA-based transfer (git-fixes).
- spi: dw: Fix controller unregister order (git-fixes).
- spi: dw: Fix native CS being unset (git-fixes).
- spi: dw-pci: Add MODULE_DEVICE_TABLE (jsc#SLE-12735).
- spi: dw-pci: Add runtime power management support (jsc#SLE-12735).
- spi: dw-pci: Add support for Intel Elkhart Lake PSE SPI (jsc#SLE-12735).
- spi: dw-pci: Fix Chip Select amount on Intel Elkhart Lake PSE SPI (jsc#SLE-12735).
- spi: dw: use 'smp_mb()' to avoid sending spi data error (git-fixes).
- spi: dw: Zero DMA Tx and Rx configurations on stack (git-fixes).
- spi: Fix controller unregister order (git-fixes).
- spi: fsl: do not map irq during probe (git-fixes).
- spi: fsl: use platform_get_irq() instead of of_irq_to_resource() (git-fixes).
- spi: pxa2xx: Fix controller unregister order (git-fixes).
- spi: pxa2xx: Fix runtime PM ref imbalance on probe error (git-fixes).
- spi: Respect DataBitLength field of SpiSerialBusV2() ACPI resource (git-fixes).
- spi: spi-fsl-dspi: Change usage pattern of SPI_MCR_* and SPI_CTAR_* macros (git-fixes).
- spi: spi-fsl-dspi: Do not access reserved fields in SPI_MCR (git-fixes).
- spi: spi-fsl-dspi: Fix 16-bit word order in 32-bit XSPI mode (git-fixes).
- spi: spi-fsl-dspi: Replace interruptible wait queue with a simple completion (git-fixes).
- spi: spi-mem: Fix Dual/Quad modes on Octal-capable devices (git-fixes).
- staging: iio: ad2s1210: Fix SPI reading (git-fixes).
- staging: kpc2000: fix error return code in kp2000_pcie_probe() (git-fixes).
- staging: rtl8712: Fix IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK (git-fixes).
- staging: sm750fb: add missing case while setting FB_VISUAL (git-fixes).
- sun6i: dsi: fix gcc-4.8 (bsc#1152489)
- SUNRPC: Signalled ASYNC tasks need to exit (git-fixes).
- supported.conf: Add pinctrl-tigerlake as supported
- supported.conf: Mark two hwtracing helper modules as externally supported (bsc#1170879)
- svcrdma: Fix leak of svc_rdma_recv_ctxt objects (git-fixes).
- tcp: cache line align MAX_TCP_HEADER (networking-stable-20_04_27).
- team: fix hang in team_mode_get() (networking-stable-20_04_27).
- thermal: intel: intel_pch_thermal: Add Comet Lake (CML) platform support (jsc#SLE-12668).
- tick/sched: Annotate lockless access to last_jiffies_update (bsc#1173438).
- timer: Use hlist_unhashed_lockless() in timer_pending() (bsc#1173438).
- torture: Allow 'CFLIST' to specify default list of scenarios (bsc#1173068).
- torture: Expand last_ts variable in kvm-test-1-run.sh (bsc#1173068).
- torture: Handle jitter for CPUs that cannot be offlined (bsc#1173068).
- torture: Handle systems lacking the mpstat command (bsc#1173068).
- torture: Hoist calls to lscpu to higher-level kvm.sh script (bsc#1173068).
- torture: Make results-directory date format completion-friendly (bsc#1173068).
- torture: Use gawk instead of awk for systime() function (bsc#1173068).
- tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send() (bsc#1065729).
- tty: n_gsm: Fix bogus i++ in gsm_data_kick (git-fixes).
- tty: n_gsm: Fix SOF skipping (git-fixes).
- tty: n_gsm: Fix waking up upper tty layer when room available (git-fixes).
- tty: serial: add missing spin_lock_init for SiFive serial console (git-fixes).
- tun: correct header offsets in napi frags mode (git-fixes).
- Update config files: Add CONFIG_PINCTRL_TIGERLAKE=m
- Update patch reference for intel_th patch (jsc#SLE-12705)
- Update the patch reference for ish-hid fix (jsc#SLE-12683)
- usb: core: Fix misleading driver bug report (git-fixes).
- usb: core: hub: limit HUB_QUIRK_DISABLE_AUTOSUSPEND to USB5534B (git-fixes).
- usb: dwc2: gadget: move gadget resume after the core is in L0 state (git-fixes).
- usb: dwc3: gadget: Properly handle ClearFeature(halt) (git-fixes).
- usb: dwc3: gadget: Properly handle failed kick_transfer (git-fixes).
- usb: dwc3: pci: Enable extcon driver for Intel Merrifield (git-fixes).
- usb: gadget: audio: Fix a missing error return value in audio_bind() (git-fixes).
- usb: gadget: fix illegal array access in binding with UDC (git-fixes).
- usb: gadget: fix potential double-free in m66592_probe (git-fixes).
- usb: gadget: legacy: fix error return code in cdc_bind() (git-fixes).
- usb: gadget: legacy: fix error return code in gncm_bind() (git-fixes).
- usb: gadget: legacy: fix redundant initialization warnings (git-fixes).
- usb: gadget: lpc32xx_udc: do not dereference ep pointer before null check (git-fixes).
- usb: gadget: net2272: Fix a memory leak in an error handling path in 'net2272_plat_probe()' (git-fixes).
- usb: gadget: udc: atmel: Make some symbols static (git-fixes).
- usb: gadget: udc: s3c2410_udc: Remove pointless NULL check in s3c2410_udc_nuke (git-fixes).
- usb: host: ehci-mxc: Add error handling in ehci_mxc_drv_probe() (git-fixes).
- usb: host: xhci-plat: keep runtime active when removing host (git-fixes).
- usb: musb: Fix runtime PM imbalance on error (git-fixes).
- usb: musb: start session in resume for host port (git-fixes).
- usb: ohci-sm501: fix error return code in ohci_hcd_sm501_drv_probe() (git-fixes).
- usb: serial: option: add Telit LE910C1-EUX compositions (git-fixes).
- usb: serial: qcserial: add DW5816e QDL support (git-fixes).
- usb: serial: usb_wwan: do not resubmit rx urb on fatal errors (git-fixes).
- usb: usbfs: correct kernel->user page attribute mismatch (git-fixes).
- usb: usbfs: fix mmap dma mismatch (git-fixes).
- vfio: avoid possible overflow in vfio_iommu_type1_pin_pages (git-fixes).
- vfio: Ignore -ENODEV when getting MSI cookie (git-fixes).
- vfio/mdev: Fix reference count leak in add_mdev_supported_type (git-fixes).
- vfio/pci: fix memory leaks in alloc_perm_bits() (git-fixes).
- vfio/type1: Fix VA->PA translation for PFNMAP VMAs in vaddr_get_pfn() (git-fixes).
- video: fbdev: w100fb: Fix a potential double free (git-fixes).
- virtio-blk: handle block_device_operations callbacks after hot unplug (git fixes (block drivers)).
- vmxnet3: add geneve and vxlan tunnel offload support (bsc#1172484).
- vmxnet3: add support to get/set rx flow hash (bsc#1172484).
- vmxnet3: allow rx flow hash ops only when rss is enabled (bsc#1172484).
- vmxnet3: prepare for version 4 changes (bsc#1172484).
- vmxnet3: update to version 4 (bsc#1172484).
- vmxnet3: use correct hdr reference when packet is encapsulated (bsc#1172484).
- vrf: Check skb for XFRM_TRANSFORMED flag (networking-stable-20_04_27).
- vrf: Fix IPv6 with qdisc and xfrm (networking-stable-20_04_27).
- vsprintf: do not obfuscate NULL and error pointers (bsc#1172086).
- vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console (git-fixes).
- vt: vt_ioctl: remove unnecessary console allocation checks (git-fixes).
- vxlan: use the correct nlattr array in NL_SET_ERR_MSG_ATTR (networking-stable-20_04_27).
- w1: omap-hdq: cleanup to add missing newline for some dev_dbg (git-fixes).
- watchdog: imx_sc_wdt: Fix reboot on crash (git-fixes).
- wcn36xx: Fix error handling path in 'wcn36xx_probe()' (git-fixes).
- wireguard: device: avoid circular netns references (git-fixes).
- wireguard: noise: do not assign initiation time in if condition (git-fixes).
- wireguard: noise: read preshared key while taking lock (bsc#1169021 jsc#SLE-12250).
- wireguard: noise: separate receive counter from send counter (bsc#1169021 jsc#SLE-12250).
- wireguard: queueing: preserve flow hash across packet scrubbing (bsc#1169021 jsc#SLE-12250).
- wireguard: receive: account for napi_gro_receive never returning GRO_DROP (git-fixes).
- wireguard: selftests: use newer iproute2 for gcc-10 (bsc#1169021 jsc#SLE-12250).
- work around mvfs bug (bsc#1162063).
- workqueue: do not use wq_select_unbound_cpu() for bound works (git-fixes).
- workqueue: Remove the warning in wq_worker_sleeping() (git-fixes).
- x86/cpu/amd: Make erratum #1054 a legacy erratum (bsc#1152489).
- x86: Fix early boot crash on gcc-10, third try (bsc#1152489).
- x86/mm/cpa: Flush direct map alias during cpa (bsc#1152489).
- x86/PCI: Mark Intel C620 MROMs as having non-compliant BARs (git-fixes).
- x86/reboot/quirks: Add MacBook6,1 reboot quirk (git-fixes).
- x86/resctrl: Fix invalid attempt at removing the default resource group (bsc#1152489).
- x86/resctrl: Preserve CDP enable over CPU hotplug (bsc#1152489).
- x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks (bsc#1058115).
- xfrm: Always set XFRM_TRANSFORMED in xfrm{4,6}_output_finish (networking-stable-20_04_27).
- xfrm: fix error in comment (git fixes (block drivers)).
- xfs: clean up the error handling in xfs_swap_extents (git-fixes).
- xfs: do not commit sunit/swidth updates to disk if that would cause repair failures (bsc#1172169).
- xfs: do not fail unwritten extent conversion on writeback due to edquot (bsc#1158242).
- xfs: fix duplicate verification from xfs_qm_dqflush() (git-fixes).
- xfs: force writes to delalloc regions to unwritten (bsc#1158242).
- xfs: measure all contiguous previous extents for prealloc size (bsc#1158242).
- xfs: preserve default grace interval during quotacheck (bsc#1172170).
- xfs: refactor agfl length computation function (bsc#1172169).
- xfs: split the sunit parameter update into two parts (bsc#1172169).
- wireguard: selftests: initalize ipv6 members to NULL to squelch clang warning (git-fixes).
Patchnames
openSUSE-2020-935
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe openSUSE Leap 15.2 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2019-19462: relay_open in kernel/relay.c allowed local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result (bnc#1158265).\n- CVE-2019-20810: go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c did not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586 (bnc#1172458).\n- CVE-2019-20812: The prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067 (bnc#1172453).\n- CVE-2020-10711: A NULL pointer dereference flaw was found in the Linux kernel\u0027s SELinux subsystem. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol\u0027s category bitmap into the SELinux extensible bitmap via the\u0027 ebitmap_netlbl_import\u0027 routine. While processing the CIPSO restricted bitmap tag in the \u0027cipso_v4_parsetag_rbm\u0027 routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allowed a remote network user to crash the system kernel, resulting in a denial of service (bnc#1171191).\n- CVE-2020-10732: A flaw was found in the implementation of Userspace core dumps. This flaw allowed an attacker with a local account to crash a trivial program and exfiltrate private kernel data (bnc#1171220).\n- CVE-2020-10751: SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing (bnc#1171189).\n- CVE-2020-10766: Fixed rogue cross-process SSBD shutdown. Linux scheduler logical bug allowed an attacker to turn off the SSBD protection. (bnc#1172781).\n- CVE-2020-10767: Fixed that Indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available. (bnc#1172782).\n- CVE-2020-10768: Fixed that indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command (bnc#1172783).\n- CVE-2020-10773: Fixed a kernel stack information leak on s390/s390x. (bnc#1172999).\n- CVE-2020-12656: Fixed a memory leak in gss_mech_free in the rpcsec_gss_krb5 implementation due to lack of certain domain_release calls (bnc#1171219).\n- CVE-2020-12769: An issue was discovered in drivers/spi/spi-dw.c allowed attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one, aka CID-19b61392c5a8 (bnc#1171983).\n- CVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).\n- CVE-2020-13143: gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c relied on kstrdup without considering the possibility of an internal \u0027\\0\u0027 value, which allowed attackers to trigger an out-of-bounds read, aka CID-15753588bcd4 (bnc#1171982).\n- CVE-2020-13974: tty/vt/keyboard.c had an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. (bnc#1172775).\n- CVE-2020-14416: A race condition in tty-\u003edisc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).\n\nThe following non-security bugs were fixed:\n\n- ACPICA: Fixes for acpiExec namespace init file (git-fixes).\n- ACPI: CPPC: Fix reference count leak in acpi_cppc_processor_probe() (git-fixes).\n- ACPI: GED: add support for _Exx / _Lxx handler methods (git-fixes).\n- ACPI: GED: use correct trigger type field in _Exx / _Lxx handling (git-fixes).\n- ACPI: PM: Avoid using power resources if there are none for D0 (git-fixes).\n- ACPI: sysfs: Fix reference count leak in acpi_sysfs_add_hotplug_profile() (git-fixes).\n- af_unix: add compat_ioctl support (git-fixes).\n- agp/intel: Reinforce the barrier after GTT updates (git-fixes).\n- ALSA: emu10k1: delete an unnecessary condition (git-fixes).\n- ALSA: es1688: Add the missed snd_card_free() (git-fixes).\n- ALSA: fireface: fix configuration error for nominal sampling transfer frequency (git-fixes).\n- ALSA: firewire-lib: fix invalid assignment to union data for directional parameter (git-fixes).\n- ALSA: hda: Add ElkhartLake HDMI codec vid (git-fixes).\n- ALSA: hda: add member to store ratio for stripe control (git-fixes).\n- ALSA: hda: add sienna_cichlid audio asic id for sienna_cichlid up (git-fixes).\n- ALSA: hda: Fix potential race in unsol event handler (git-fixes).\n- ALSA: hda/realtek - Add a model for Thinkpad T570 without DAC workaround (bsc#1172017).\n- ALSA: hda/realtek - add a pintbl quirk for several Lenovo machines (git-fixes).\n- ALSA: hda/realtek - Add LED class support for micmute LED (git-fixes).\n- ALSA: hda/realtek - Add more fixup entries for Clevo machines (git-fixes).\n- ALSA: hda/realtek - Add new codec supported for ALC287 (git-fixes).\n- ALSA: hda/realtek - Enable micmute LED on and HP system (git-fixes).\n- ALSA: hda/realtek - Fix silent output on Gigabyte X570 Aorus Xtreme (git-fixes).\n- ALSA: hda/realtek - Fix unused variable warning w/o CONFIG_LEDS_TRIGGER_AUDIO (git-fixes).\n- ALSA: hda/realtek - Introduce polarity for micmute LED GPIO (git-fixes).\n- ALSA: hda/tegra: correct number of SDO lines for Tegra194 (git-fixes).\n- ALSA: hda/tegra: workaround playback failure on Tegra194 (git-fixes).\n- ALSA: hwdep: fix a left shifting 1 by 31 UB bug (git-fixes).\n- ALSA: iec1712: Initialize STDSP24 properly when using the model=staudio option (git-fixes).\n- ALSA: pcm: disallow linking stream to itself (git-fixes).\n- ALSA: pcm: fix incorrect hw_base increase (git-fixes).\n- ALSA: pcm: fix snd_pcm_link() lockdep splat (git-fixes).\n- ALSA: usb-audio: Add duplex sound support for USB devices using implicit feedback (git-fixes).\n- ALSA: usb-audio: Add Pioneer DJ DJM-900NXS2 support (git-fixes).\n- ALSA: usb-audio: Add vendor, product and profile name for HP Thunderbolt Dock (git-fixes).\n- ALSA: usb-audio: Clean up quirk entries with macros (git-fixes).\n- ALSA: usb-audio: Fix a limit check in proc_dump_substream_formats() (git-fixes).\n- ALSA: usb-audio: Fix inconsistent card PM state after resume (git-fixes).\n- ALSA: usb-audio: fixing upper volume limit for RME Babyface Pro routing crosspoints (git-fixes).\n- ALSA: usb-audio: Fixing usage of plain int instead of NULL (git-fixes).\n- ALSA: usb-audio: Fix racy list management in output queue (git-fixes).\n- ALSA: usb-audio: Improve frames size computation (git-fixes).\n- ALSA: usb-audio: Manage auto-pm of all bundled interfaces (git-fixes).\n- ALSA: usb-audio: mixer: volume quirk for ESS Technology Asus USB DAC (git-fixes).\n- ALSA: usb-audio: Print more information in stream proc files (git-fixes).\n- ALSA: usb-audio: Quirks for Gigabyte TRX40 Aorus Master onboard audio (git-fixes).\n- ALSA: usb-audio: Remove async workaround for Scarlett 2nd gen (git-fixes).\n- ALSA: usb-audio: RME Babyface Pro mixer patch (git-fixes).\n- ALSA: usb-audio: Use the new macro for HP Dock rename quirks (git-fixes).\n- amd-xgbe: Use __napi_schedule() in BH context (networking-stable-20_04_17).\n- arm64: map FDT as RW for early_init_dt_scan() (jsc#SLE-12424).\n- ARM: oxnas: make ox820_boot_secondary static (git-fixes).\n- asm-gemeric/tlb: remove stray function declarations (bsc#1156395).\n- ASoC: fix incomplete error-handling in img_i2s_in_probe (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for Toshiba Encore WT10-A tablet (git-fixes).\n- ASoC: intel: cht_bsw_max98090_ti: Add all Chromebooks that need pmc_plt_clk_0 quirk (bsc#1171246).\n- ASoC: intel - fix the card names (git-fixes).\n- ASoC: max9867: fix volume controls (git-fixes).\n- ASoC: meson: add missing free_irq() in error path (git-fixes).\n- ASoC: rt5645: Add platform-data for Asus T101HA (git-fixes).\n- ASoC: SOF: core: fix error return code in sof_probe_continue() (git-fixes).\n- ASoC: ux500: mop500: Fix some refcounted resources issues (git-fixes).\n- ath10k: Remove ath10k_qmi_register_service_notifier() declaration (git-fixes).\n- ath10k: remove the max_sched_scan_reqs value (git-fixes).\n- ath10k: Skip handling del_server during driver exit (git-fixes).\n- ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb (git-fixes).\n- ath9k: Fix use-after-free Read in ath9k_wmi_ctrl_rx (git-fixes).\n- ath9k: Fix use-after-free Read in htc_connect_service (git-fixes).\n- ath9k: Fix use-after-free Write in ath9k_htc_rx_msg (git-fixes).\n- ath9k_htc: Silence undersized packet warnings (git-fixes).\n- ath9x: Fix stack-out-of-bounds Write in ath9k_hif_usb_rx_cb (git-fixes).\n- ax25: fix setsockopt(SO_BINDTODEVICE) (git-fixes).\n- b43legacy: Fix case where channel status is corrupted (git-fixes).\n- bfq: Avoid false bfq queue merging (bsc#1171513).\n- bfq: Fix check detecting whether waker queue should be selected (bsc#1168838).\n- bfq: Use only idle IO periods for think time calculations (bsc#1171513).\n- bfq: Use \u0027ttime\u0027 local variable (bsc#1171513).\n- blk-iocost: Fix error on iocost_ioc_vrate_adj (bsc#1173206).\n- blk-iocost: fix incorrect vtime comparison in iocg_is_idle() (bsc#1173206).\n- bluetooth: btmtkuart: Improve exception handling in btmtuart_probe() (git-fixes).\n- bluetooth: hci_bcm: fix freeing not-requested IRQ (git-fixes).\n- bnxt_en: Improve TQM ring context memory sizing formulas (jsc#SLE-8371 bsc#1153274).\n- bpf: Fix map permissions check (bsc#1155518).\n- bpf: Prevent mmap()\u0027ing read-only maps as writable (bsc#1155518).\n- bpf: Restrict bpf_probe_read{, str}() only to archs where they work (bsc#1172344).\n- bpf, sockhash: Synchronize_rcu before free\u0027ing map (git-fixes).\n- bpf, sockmap: Check update requirements after locking (git-fixes).\n- bpf: Undo internal BPF_PROBE_MEM in BPF insns dump (bsc#1155518).\n- brcmfmac: fix wrong location to get firmware feature (git-fixes).\n- btrfs: fix log context list corruption after rename whiteout error (bsc#1172342).\n- btrfs: fix partial loss of prealloc extent past i_size after fsync (bsc#1172343).\n- btrfs: reloc: clear DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417 bsc#1160947 bsc#1172366).\n- btrfs: reloc: fix reloc root leak and NULL pointer dereference (bsc#1171417 bsc#1160947 bsc#1172366).\n- CDC-ACM: heed quirk also in error handling (git-fixes).\n- CDC-ACM: heed quirk also in error handling (git-fixes).\n- ceph: add comments for handle_cap_flush_ack logic (bsc#1172940).\n- ceph: allow rename operation under different quota realms (bsc#1172988).\n- ceph: ceph_kick_flushing_caps needs the s_mutex (bsc#1172986).\n- ceph: convert mdsc-\u003ecap_dirty to a per-session list (bsc#1172984 bsc#1167104).\n- ceph: document what protects i_dirty_item and i_flushing_item (bsc#1172940).\n- ceph: do not release i_ceph_lock in handle_cap_trunc (bsc#1172940).\n- ceph: do not return -ESTALE if there\u0027s still an open file (bsc#1171915).\n- ceph: do not take i_ceph_lock in handle_cap_import (bsc#1172940).\n- ceph: fix potential race in ceph_check_caps (bsc#1172940).\n- ceph: flush release queue when handling caps for unknown inode (bsc#1172939).\n- ceph: make sure mdsc-\u003emutex is nested in s-\u003es_mutex to fix dead lock (bsc#1172989).\n- ceph: normalize \u0027delta\u0027 parameter usage in check_quota_exceeded (bsc#1172987).\n- ceph: reorganize __send_cap for less spinlock abuse (bsc#1172940).\n- ceph: request expedited service on session\u0027s last cap flush (bsc#1172985 bsc#1167104).\n- ceph: reset i_requested_max_size if file write is not wanted (bsc#1172983).\n- ceph: skip checking caps when session reconnecting and releasing reqs (bsc#1172990).\n- ceph: split up __finish_cap_flush (bsc#1172940).\n- ceph: throw a warning if we destroy session with mutex still locked (bsc#1172940).\n- char/random: Add a newline at the end of the file (jsc#SLE-12424).\n- clk: bcm2835: Fix return type of bcm2835_register_gate (git-fixes).\n- clk: bcm2835: Remove casting to bcm2835_clk_register (git-fixes).\n- clk: clk-flexgen: fix clock-critical handling (git-fixes).\n- clk: mediatek: assign the initial value to clk_init_data of mtk_mux (git-fixes).\n- clk: meson: meson8b: Do not rely on u-boot to init all GP_PLL registers (git-fixes).\n- clk: meson: meson8b: Fix the polarity of the RESET_N lines (git-fixes).\n- clk: meson: meson8b: Fix the vclk_div{1, 2, 4, 6, 12}_en gate bits (git-fixes).\n- clk: qcom: Add missing msm8998 ufs_unipro_core_clk_src (git-fixes).\n- clk: renesas: cpg-mssr: Fix STBCR suspend/resume handling (git-fixes).\n- clk: samsung: Mark top ISP and CAM clocks on Exynos542x as critical (git-fixes).\n- clk: sprd: return correct type of value for _sprd_pll_recalc_rate (git-fixes).\n- clk: sunxi: Fix incorrect usage of round_down() (git-fixes).\n- clk: ti: am33xx: fix RTC clock parent (git-fixes).\n- clocksource: dw_apb_timer_of: Fix missing clockevent timers (git-fixes).\n- component: Silence bind error on -EPROBE_DEFER (git-fixes).\n- config: arm64: enable CONFIG_IOMMU_DEFAULT_PASSTHROUGH References: bsc#1172739\n- coredump: fix crash when umh is disabled (git-fixes).\n- coredump: fix null pointer dereference on coredump (git-fixes).\n- crypto: algapi - Avoid spurious modprobe on LOADED (git-fixes).\n- crypto: algboss - do not wait during notifier callback (git-fixes).\n- crypto: cavium/nitrox - Fix \u0027nitrox_get_first_device()\u0027 when ndevlist is fully iterated (git-fixes).\n- crypto: ccp -- do not \u0027select\u0027 CONFIG_DMADEVICES (git-fixes).\n- crypto: chelsio/chtls: properly set tp-\u003elsndtime (git-fixes).\n- crypto: drbg - fix error return code in drbg_alloc_state() (git-fixes).\n- crypto: stm32/crc32 - fix ext4 chksum BUG_ON() (git-fixes).\n- crypto: stm32/crc32 - fix multi-instance (git-fixes).\n- crypto: stm32/crc32 - fix run-time self test issue (git-fixes).\n- cxgb4: fix adapter crash due to wrong MC size (networking-stable-20_04_27).\n- cxgb4: fix large delays in PTP synchronization (networking-stable-20_04_27).\n- Delete patches.suse/seltests-powerpc-Add-a-selftest-for-memcpy_mcsafe.patch (bsc#1171699).\n- dma-coherent: fix integer overflow in the reserved-memory dma allocation (git-fixes).\n- dma-debug: fix displaying of dma allocation type (git-fixes).\n- dma-direct: fix data truncation in dma_direct_get_required_mask() (git-fixes).\n- dmaengine: dmatest: Fix process hang when reading \u0027wait\u0027 parameter (git-fixes).\n- dmaengine: dmatest: Restore default for channel (git-fixes).\n- dmaengine: mmp_tdma: Do not ignore slave config validation errors (git-fixes).\n- dmaengine: mmp_tdma: Reset channel error on release (git-fixes).\n- dmaengine: owl: Use correct lock in owl_dma_get_pchan() (git-fixes).\n- dmaengine: pch_dma.c: Avoid data race between probe and irq handler (git-fixes).\n- dmaengine: tegra210-adma: Fix an error handling path in \u0027tegra_adma_probe()\u0027 (git-fixes).\n- dm verity fec: fix hash block number in verity_fec_decode (git fixes (block drivers)).\n- dm writecache: fix data corruption when reloading the target (git fixes (block drivers)).\n- drivers/net/ibmvnic: Update VNIC protocol version reporting (bsc#1065729).\n- drivers: phy: sr-usb: do not use internal fsm for USB2 phy init (git-fixes).\n- drivers: soc: ti: knav_qmss_queue: Make knav_gp_range_ops static (git-fixes).\n- drm/amd/display: add basic atomic check for cursor plane (git-fixes).\n- drm/amd/display: drop cursor position check in atomic test (git-fixes).\n- drm/amd/display: Prevent dpcd reads with passive dongles (git-fixes).\n- drm/amdgpu: force fbdev into vram (bsc#1152472) \t* context changes\n- drm/amdgpu: invalidate L2 before SDMA IBs (v2) (git-fixes).\n- drm/amdgpu: simplify padding calculations (v2) (git-fixes).\n- drm/amd/powerplay: avoid using pm_en before it is initialized revised (git-fixes).\n- drm/amd/powerplay: perform PG ungate prior to CG ungate (git-fixes).\n- drm/dp_mst: Increase ACT retry timeout to 3s (bsc#1152472) \t* context changes\n- drm/dp_mst: Reformat drm_dp_check_act_status() a bit (git-fixes).\n- drm/edid: Add Oculus Rift S to non-desktop list (git-fixes).\n- drm: encoder_slave: fix refcouting error for modules (git-fixes).\n- drm/etnaviv: fix perfmon domain interation (git-fixes).\n- drm/etnaviv: rework perfmon query infrastructure (git-fixes).\n- drm/i915: Do not enable WaIncreaseLatencyIPCEnabled when IPC is (bsc#1152489)\n- drm/i915: Do not enable WaIncreaseLatencyIPCEnabled when IPC is disabled (git-fixes).\n- drm/i915: extend audio CDCLK\u003e=2*BCLK constraint to more platforms (git-fixes).\n- drm/i915: Extend WaDisableDARBFClkGating to icl,ehl,tgl (bsc#1152489)\n- drm/i915: fix port checks for MST support on gen \u003e= 11 (git-fixes).\n- drm/i915/gem: Avoid iterating an empty list (git-fixes).\n- drm/i915/gvt: Fix kernel oops for 3-level ppgtt guest (bsc#1152489)\n- drm/i915/gvt: Fix kernel oops for 3-level ppgtt guest (git-fixes).\n- drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of (bsc#1152489)\n- drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of inheritance (git-fixes).\n- drm/i915: HDCP: fix Ri prime check done during link check (bsc#1152489) \t* context changes\n- drm/i915: HDCP: fix Ri prime check done during link check (git-fixes).\n- drm/i915: Limit audio CDCLK\u003e=2*BCLK constraint back to GLK only (git-fixes).\n- drm/i915: Propagate error from completed fences (git-fixes).\n- drm/i915: Whitelist context-local timestamp in the gen9 cmdparser (git-fixes).\n- drm/i915: work around false-positive maybe-uninitialized warning (git-fixes).\n- drm/mcde: dsi: Fix return value check in mcde_dsi_bind() (git-fixes).\n- drm/qxl: lost qxl_bo_kunmap_atomic_page in qxl_image_init_helper() (git-fixes).\n- drm/sun4i: hdmi ddc clk: Fix size of m divider (git-fixes).\n- drm/vkms: Hold gem object while still in-use (git-fixes).\n- dwc3: Remove check for HWO flag in dwc3_gadget_ep_reclaim_trb_sg() (git-fixes).\n- e1000e: Disable TSO for buffer overrun workaround (git-fixes).\n- e1000e: Do not wake up the system via WOL if device wakeup is disabled (git-fixes).\n- EDAC/amd64: Add PCI device IDs for family 17h, model 70h (bsc#1165975).\n- EDAC/ghes: Setup DIMM label from DMI and use it in error reports (bsc#1168779).\n- EDAC/skx: Use the mcmtr register to retrieve close_pg/bank_xor_enable (bsc#1152489).\n- EDAC/synopsys: Do not dump uninitialized pinf-\u003ecol (bsc#1152489).\n- efi/efivars: Add missing kobject_put() in sysfs entry creation error path (git-fixes).\n- efi/random: Treat EFI_RNG_PROTOCOL output as bootloader randomness (jsc#SLE-12424).\n- efi: READ_ONCE rng seed size before munmap (jsc#SLE-12424).\n- efi/tpm: Verify event log header before parsing (bsc#1173461).\n- eventpoll: fix missing wakeup for ovflist in ep_poll_callback (bsc#1159867).\n- evm: Check also if *tfm is an error pointer in init_desc() (git-fixes).\n- evm: Fix a small race in init_desc() (git-fixes).\n- evm: Fix possible memory leak in evm_calc_hmac_or_hash() (git-fixes).\n- evm: Fix RCU list related warnings (git-fixes).\n- extcon: adc-jack: Fix an error handling path in \u0027adc_jack_probe()\u0027 (git-fixes).\n- fanotify: fix ignore mask logic for events on child and on dir (bsc#1172719).\n- fdt: add support for rng-seed (jsc#SLE-12424).\n- fdt: Update CRC check for rng-seed (jsc#SLE-12424).\n- firmware: imx: scu: Fix corruption of header (git-fixes).\n- firmware: imx: scu: Fix possible memory leak in imx_scu_probe() (git-fixes).\n- firmware: imx-scu: Support one TX and one RX (git-fixes).\n- firmware: imx: warn on unexpected RX (git-fixes).\n- firmware: qcom_scm: fix bogous abuse of dma-direct internals (git-fixes).\n- firmware: xilinx: Fix an error handling path in \u0027zynqmp_firmware_probe()\u0027 (git-fixes).\n- Fix a regression of AF_ALG crypto interface hang with aes_s390 (bsc#1167651)\n- fpga: dfl: afu: Corrected error handling levels (git-fixes).\n- fs: Do not check if there is a fsnotify watcher on pseudo inodes (bsc#1158765).\n- fsnotify: Rearrange fast path to minimise overhead when there is no watcher (bsc#1158765).\n- genetlink: clean up family attributes allocations (git-fixes).\n- genetlink: fix memory leaks in genl_family_rcv_msg_dumpit() (bsc#1154353).\n- gpio: bcm-kona: Fix return value of bcm_kona_gpio_probe() (git-fixes).\n- gpio: dwapb: Append MODULE_ALIAS for platform driver (git-fixes).\n- gpio: dwapb: Call acpi_gpiochip_free_interrupts() on GPIO chip de-registration (git-fixes).\n- gpio: exar: Fix bad handling for ida_simple_get error path (git-fixes).\n- gpiolib: Document that GPIO line names are not globally unique (git-fixes).\n- gpio: pca953x: Fix pca953x_gpio_set_config (git-fixes).\n- gpio: pxa: Fix return value of pxa_gpio_probe() (git-fixes).\n- gpio: tegra: mask GPIO IRQs during IRQ shutdown (git-fixes).\n- gpu/drm: Ingenic: Fix opaque pointer casted to wrong type (git-fixes).\n- habanalabs: Align protection bits configuration of all TPCs (git-fixes).\n- HID: alps: Add AUI1657 device ID (git-fixes).\n- HID: alps: ALPS_1657 is too specific; use U1_UNICORN_LEGACY instead (git-fixes).\n- HID: i2c-hid: add Schneider SCL142ALM to descriptor override (git-fixes).\n- HID: i2c-hid: reset Synaptics SYNA2393 on resume (git-fixes).\n- HID: intel-ish-hid: avoid bogus uninitialized-variable warning (git-fixes).\n- HID: multitouch: add eGalaxTouch P80H84 support (git-fixes).\n- HID: multitouch: enable multi-input as a quirk for some devices (git-fixes).\n- HID: quirks: Add HID_QUIRK_NO_INIT_REPORTS quirk for Dell K12A keyboard-dock (git-fixes).\n- HID: sony: Fix for broken buttons on DS3 USB dongles (git-fixes).\n- hsr: check protocol version in hsr_newlink() (networking-stable-20_04_17).\n- i2c: acpi: put device when verifying client fails (git-fixes).\n- i2c: altera: Fix race between xfer_msg and isr thread (git-fixes).\n- i2c: designware-pci: Add support for Elkhart Lake PSE I2C (jsc#SLE-12734).\n- i2c: designware-pci: Fix BUG_ON during device removal (jsc#SLE-12734).\n- i2c: designware-pci: Switch over to MSI interrupts (jsc#SLE-12734).\n- i2c: dev: Fix the race between the release of i2c_dev and cdev (git-fixes).\n- i2c: fix missing pm_runtime_put_sync in i2c_device_probe (git-fixes).\n- i2c: mux: demux-pinctrl: Fix an error handling path in \u0027i2c_demux_pinctrl_probe()\u0027 (git-fixes).\n- ibmveth: Fix max MTU limit (bsc#1173428 ltc#186397).\n- ibmvnic: continue to init in CRQ reset returns H_CLOSED (bsc#1173280 ltc#185369).\n- ibmvnic: Flush existing work items before device removal (bsc#1065729).\n- ibmvnic: Harden device login requests (bsc#1170011 ltc#183538).\n- ice: Fix error return code in ice_add_prof() (jsc#SLE-7926).\n- ice: Fix inability to set channels when down (jsc#SLE-7926).\n- ieee80211: Fix incorrect mask for default PE duration (git-fixes).\n- iio: adc: stm32-adc: fix device used to request dma (git-fixes).\n- iio: adc: stm32-adc: Use dma_request_chan() instead dma_request_slave_channel() (git-fixes).\n- iio: adc: stm32-dfsdm: fix device used to request dma (git-fixes).\n- iio: adc: stm32-dfsdm: Use dma_request_chan() instead dma_request_slave_channel() (git-fixes).\n- iio: adc: ti-ads8344: Fix channel selection (git-fixes).\n- iio: buffer: Do not allow buffers without any channels enabled to be activated (git-fixes).\n- iio:chemical:pms7003: Fix timestamp alignment and prevent data leak (git-fixes).\n- iio:chemical:sps30: Fix timestamp alignment (git-fixes).\n- iio: dac: vf610: Fix an error handling path in \u0027vf610_dac_probe()\u0027 (git-fixes).\n- iio: pressure: bmp280: Tolerate IRQ before registering (git-fixes).\n- iio: sca3000: Remove an erroneous \u0027get_device()\u0027 (git-fixes).\n- iio: vcnl4000: Fix i2c swapped word reading (git-fixes).\n- ima: Call ima_calc_boot_aggregate() in ima_eventdigest_init() (bsc#1172223).\n- ima: Directly assign the ima_default_policy pointer to ima_rules (bsc#1172223)\n- ima: Directly free *entry in ima_alloc_init_template() if digests is NULL (bsc#1172223).\n- ima: Remove __init annotation from ima_pcrread() (git-fixes).\n- include/asm-generic/topology.h: guard cpumask_of_node() macro argument (bsc#1148868).\n- Input: dlink-dir685-touchkeys - fix a typo in driver name (git-fixes).\n- Input: edt-ft5x06 - fix get_default register write access (git-fixes).\n- Input: evdev - call input_flush_device() on release(), not flush() (git-fixes).\n- Input: i8042 - add ThinkPad S230u to i8042 reset list (git-fixes).\n- Input: mms114 - fix handling of mms345l (git-fixes).\n- Input: synaptics - add a second working PNP_ID for Lenovo T470s (git-fixes).\n- Input: synaptics-rmi4 - fix error return code in rmi_driver_probe() (git-fixes).\n- Input: synaptics-rmi4 - really fix attn_data use-after-free (git-fixes).\n- Input: usbtouchscreen - add support for BonXeon TP (git-fixes).\n- Input: xpad - add custom init packet for Xbox One S controllers (git-fixes).\n- iocost: check active_list of all the ancestors in iocg_activate() (bsc#1173206).\n- iocost: do not let vrate run wild while there\u0027s no saturation signal (bsc1173206).\n- iocost: over-budget forced IOs should schedule async delay (bsc#1173206).\n- iommu/amd: Call domain_flush_complete() in update_domain() (bsc#1172061).\n- iommu/amd: Do not flush Device Table in iommu_map_page() (bsc#1172062).\n- iommu/amd: Do not loop forever when trying to increase address space (bsc#1172063).\n- iommu/amd: Fix legacy interrupt remapping for x2APIC-enabled system (bsc#1172393).\n- iommu/amd: Fix over-read of ACPI UID from IVRS table (bsc#1172064).\n- iommu/amd: Fix race in increase_address_space()/fetch_pte() (bsc#1172065).\n- iommu/amd: Update Device Table in increase_address_space() (bsc#1172066).\n- iommu: Fix reference count leak in iommu_group_alloc (bsc#1172394).\n- iommu/qcom: Fix local_base status check (bsc#1172067).\n- iommu/virtio: Reverse arguments to list_add (bsc#1172068).\n- ipv4: Update fib_select_default to handle nexthop objects (networking-stable-20_04_27).\n- ipv6: fix IPV6_ADDRFORM operation logic (bsc#1171662).\n- ipvs: Improve robustness to the ipvs sysctl (git-fixes).\n- irqchip/al-fic: Add support for irq retrigger (jsc#SLE-10505).\n- irqchip/ti-sci-inta: Fix processing of masked irqs (git-fixes).\n- irqchip/versatile-fpga: Apply clear-mask earlier (git-fixes).\n- irqchip/versatile-fpga: Handle chained IRQs properly (git-fixes).\n- iwlwifi: avoid debug max amsdu config overwriting itself (git-fixes).\n- iwlwifi: mvm: limit maximum queue appropriately (git-fixes).\n- iwlwifi: pcie: handle QuZ configs with killer NICs as well (bsc#1172374).\n- jbd2: fix data races at struct journal_head (bsc#1173438).\n- kabi: ppc64le: prevent struct dma_map_ops to become defined (jsc#SLE-12424).\n- kabi/severities: Ingnore get_dev_data() The function is internal to the AMD IOMMU driver and must not be called by any third party.\n- kABI workaround for struct hdac_bus changes (git-fixes).\n- ktest: Add timeout for ssh sync testing (git-fixes).\n- KVM: Check validity of resolved slot when searching memslots (bsc#1172069).\n- KVM: x86/mmu: Set mmio_value to \u00270\u0027 if reserved #PF can\u0027t be generated (bsc#1171904).\n- KVM: x86: only do L1TF workaround on affected processors (bsc#1171904).\n- l2tp: Allow management of tunnels and session in user namespace (networking-stable-20_04_17).\n- libbpf: Fix perf_buffer__free() API for sparse allocs (bsc#1155518).\n- libceph: ignore pool overlay and cache logic on redirects (bsc#1172938).\n- lib: devres: add a helper function for ioremap_uc (git-fixes).\n- libertas_tf: avoid a null dereference in pointer priv (git-fixes).\n- lib/lzo: fix ambiguous encoding bug in lzo-rle (git-fixes).\n- libnvdimm/btt: fix variable \u0027rc\u0027 set but not used (bsc#1162400).\n- libnvdimm: cover up nd_pfn_sb changes (bsc#1171759).\n- libnvdimm: cover up nd_region changes (bsc#1162400).\n- libnvdimm/dax: Pick the right alignment default when creating dax devices (bsc#1171759).\n- libnvdimm/label: Remove the dpa align check (bsc#1171759).\n- libnvdimm/namespace: Enforce memremap_compat_align() (bsc#1162400).\n- libnvdimm/namsepace: Do not set claim_class on error (bsc#1162400).\n- libnvdimm/of_pmem: Provide a unique name for bus provider (bsc#1171739).\n- libnvdimm: Out of bounds read in __nd_ioctl() (bsc#1065729).\n- libnvdimm/pfn_dev: Add a build check to make sure we notice when struct page size change (bsc#1171743).\n- libnvdimm/pfn_dev: Add page size and struct page size to pfn superblock (bsc#1171759).\n- libnvdimm/pfn: Prevent raw mode fallback if pfn-infoblock valid (bsc#1171743).\n- libnvdimm/pmem: Advance namespace seed for specific probe errors (bsc#1171743).\n- libnvdimm/region: Fix build error (bsc#1162400).\n- libnvdimm/region: Introduce an \u0027align\u0027 attribute (bsc#1162400).\n- libnvdimm/region: Introduce NDD_LABELING (bsc#1162400).\n- libnvdimm/region: Rewrite _probe_success() to _advance_seeds() (bsc#1171743).\n- libnvdimm: Use PAGE_SIZE instead of SZ_4K for align check (bsc#1171759).\n- lib: Uplevel the pmem \u0027region\u0027 ida to a global allocator (bc#1162400).\n- list: Add hlist_unhashed_lockless() (bsc#1173438).\n- livepatch: Apply vmlinux-specific KLP relocations early (bsc#1071995).\n- livepatch: Disallow vmlinux.ko (bsc#1071995).\n- livepatch: Make klp_apply_object_relocs static (bsc#1071995).\n- livepatch: Prevent module-specific KLP rela sections from referencing vmlinux symbols (bsc#1071995).\n- livepatch: Remove .klp.arch (bsc#1071995).\n- locktorture: Allow CPU-hotplug to be disabled via --bootargs (bsc#1173068).\n- lpfc_debugfs: get rid of pointless access_ok() (bsc#1171530).\n- lpfc: fix axchg pointer reference after free and double frees (bsc#1171530).\n- lpfc: Fix pointer checks and comments in LS receive refactoring (bsc#1171530).\n- lpfc: Fix return value in __lpfc_nvme_ls_abort (bsc#1171530).\n- lpfc: Synchronize NVME transport and lpfc driver devloss_tmo (bcs#1173060).\n- mac80211: mesh: fix discovery timer re-arming issue / crash (git-fixes).\n- mailbox: zynqmp-ipi: Fix NULL vs IS_ERR() check in zynqmp_ipi_mbox_probe() (git-fixes).\n- Make the \u0027Reducing compressed framebufer size\u0027 message be DRM_INFO_ONCE() (git-fixes).\n- mdraid: fix read/write bytes accounting (bsc#1172537).\n- media: cedrus: Program output format during each run (git-fixes).\n- media: dvb: return -EREMOTEIO on i2c transfer failure (git-fixes).\n- media: platform: fcp: Set appropriate DMA parameters (git-fixes).\n- media: Revert \u0027staging: imgu: Address a compiler warning on alignment\u0027 (git-fixes).\n- media: staging: ipu3: Fix stale list entries on parameter queue failure (git-fixes).\n- media: staging: ipu3-imgu: Move alignment attribute to field (git-fixes).\n- mei: release me_cl object reference (git-fixes).\n- mfd: intel-lpss: Add Intel Tiger Lake PCI IDs (jsc#SLE-12737).\n- mfd: intel-lpss: Use devm_ioremap_uc for MMIO (git-fixes).\n- mfd: stmfx: Fix stmfx_irq_init error path (git-fixes).\n- mfd: stmfx: Reset chip on resume as supply was disabled (git-fixes).\n- misc: fastrpc: fix potential fastrpc_invoke_ctx leak (git-fixes).\n- misc: rtsx: Add short delay after exit from ASPM (git-fixes).\n- mlxsw: Fix some IS_ERR() vs NULL bugs (networking-stable-20_04_27).\n- mm: adjust vm_committed_as_batch according to vm overcommit policy (bnc#1173271).\n- mmc: block: Fix use-after-free issue for rpmb (git-fixes).\n- mmc: core: Use DEFINE_DEBUGFS_ATTRIBUTE instead of DEFINE_SIMPLE_ATTRIBUTE (git-fixes).\n- mmc: fix compilation of user API (git-fixes).\n- mmc: meson-mx-sdio: trigger a soft reset after a timeout or CRC error (git-fixes).\n- mmc: mmci_sdmmc: fix DMA API warning overlapping mappings (git-fixes).\n- mmc: sdhci-esdhc-imx: fix the mask for tuning start point (git-fixes).\n- mmc: sdhci-msm: Clear tuning done flag while hs400 tuning (git-fixes).\n- mmc: sdio: Fix potential NULL pointer error in mmc_sdio_init_card() (git-fixes).\n- mmc: sdio: Fix several potential memory leaks in mmc_sdio_init_card() (git-fixes).\n- mmc: tmio: Further fixup runtime PM management at remove (git-fixes).\n- mmc: uniphier-sd: call devm_request_irq() after tmio_mmc_host_probe() (git-fixes).\n- mm: do not prepare anon_vma if vma has VM_WIPEONFORK (bsc#1169681).\n- mm: memcontrol: fix memory.low proportional distribution (bsc#1168230).\n- mm/memremap: drop unused SECTION_SIZE and SECTION_MASK (bsc#1162400 bsc#1170895 ltc#184375 ltc#185686).\n- mm/memremap_pages: Introduce memremap_compat_align() (bsc#1162400).\n- mm/memremap_pages: Kill unused __devm_memremap_pages() (bsc#1162400).\n- mm/util.c: make vm_memory_committed() more accurate (bnc#1173271).\n- mt76: mt76x02u: Add support for newer versions of the XBox One wifi adapter (git-fixes).\n- mtd: Fix mtd not registered due to nvmem name collision (git-fixes).\n- mtd: rawnand: brcmnand: correctly verify erased pages (git-fixes).\n- mtd: rawnand: brcmnand: fix CS0 layout (git-fixes).\n- mtd: rawnand: brcmnand: fix hamming oob layout (git-fixes).\n- mtd: rawnand: diskonchip: Fix the probe error path (git-fixes).\n- mtd: rawnand: Fix nand_gpio_waitrdy() (git-fixes).\n- mtd: rawnand: ingenic: Fix the probe error path (git-fixes).\n- mtd: rawnand: marvell: Fix probe error path (git-fixes).\n- mtd: rawnand: marvell: Fix the condition on a return code (git-fixes).\n- mtd: rawnand: marvell: Use nand_cleanup() when the device is not yet registered (git-fixes).\n- mtd: rawnand: mtk: Fix the probe error path (git-fixes).\n- mtd: rawnand: onfi: Fix redundancy detection check (git-fixes).\n- mtd: rawnand: orion: Fix the probe error path (git-fixes).\n- mtd: rawnand: oxnas: Keep track of registered devices (git-fixes).\n- mtd: rawnand: oxnas: Release all devices in the _remove() path (git-fixes).\n- mtd: rawnand: pasemi: Fix the probe error path (git-fixes).\n- mtd: rawnand: plat_nand: Fix the probe error path (git-fixes).\n- mtd: rawnand: sharpsl: Fix the probe error path (git-fixes).\n- mtd: rawnand: socrates: Fix the probe error path (git-fixes).\n- mtd: rawnand: sunxi: Fix the probe error path (git-fixes).\n- mtd: rawnand: timings: Fix default tR_max and tCCS_min timings (git-fixes).\n- mtd: rawnand: tmio: Fix the probe error path (git-fixes).\n- mtd: rawnand: xway: Fix the probe error path (git-fixes).\n- mtd: spinand: Propagate ECC information to the MTD structure (git-fixes).\n- mtd: spi-nor: intel-spi: Add support for Intel Tiger Lake SPI serial flash (jsc#SLE-12737).\n- mwifiex: avoid -Wstringop-overflow warning (git-fixes).\n- mwifiex: Fix memory corruption in dump_station (git-fixes).\n- net: bcmgenet: correct per TX/RX ring statistics (networking-stable-20_04_27).\n- net: dsa: b53: b53_arl_rw_op() needs to select IVL or SVL (networking-stable-20_04_27).\n- net: dsa: b53: Fix ARL register definitions (networking-stable-20_04_27).\n- net: dsa: b53: Lookup VID in ARL searches when VLAN is enabled (networking-stable-20_04_27).\n- net: dsa: b53: Rework ARL bin logic (networking-stable-20_04_27).\n- net: dsa: declare lockless TX feature for slave ports (bsc#1154353).\n- net: dsa: mt7530: fix tagged frames pass-through in VLAN-unaware mode (networking-stable-20_04_17).\n- net: ena: xdp: update napi budget for DROP and ABORTED (bsc#1154492).\n- net: ena: xdp: XDP_TX: fix memory leak (bsc#1154492).\n- netfilter: connlabels: prefer static lock initialiser (git-fixes).\n- netfilter: nf_queue: enqueue skbs with NULL dst (git-fixes).\n- netfilter: nf_tables_offload: return EOPNOTSUPP if rule specifies no actions (git-fixes).\n- netfilter: nft_tproxy: Fix port selector on Big Endian (git-fixes).\n- netfilter: nft_tunnel: add the missing ERSPAN_VERSION nla_policy (git-fixes).\n- netfilter: not mark a spinlock as __read_mostly (git-fixes).\n- net: ipv4: devinet: Fix crash when add/del multicast IP with autojoin (networking-stable-20_04_17).\n- net: ipv6: do not consider routes via gateways for anycast address check (networking-stable-20_04_17).\n- net/mlx4_en: avoid indirect call in TX completion (networking-stable-20_04_27).\n- net/mlx5e: Add missing release firmware call (networking-stable-20_04_17).\n- net/mlx5e: Fix pfnum in devlink port attribute (networking-stable-20_04_17).\n- net/mlx5e: Fix stats update for matchall classifier (jsc#SLE-8464).\n- net/mlx5e: replace EINVAL in mlx5e_flower_parse_meta() (jsc#SLE-8464).\n- net/mlx5: Fix cleaning unmanaged flow tables (jsc#SLE-8464).\n- net/mlx5: Fix crash upon suspend/resume (bsc#1172365).\n- net/mlx5: Fix frequent ioread PCI access during recovery (networking-stable-20_04_17).\n- net: netrom: Fix potential nr_neigh refcnt leak in nr_add_node (networking-stable-20_04_27).\n- net: openvswitch: ovs_ct_exit to be done under ovs_lock (networking-stable-20_04_27).\n- net: phy: propagate an error back to the callers of phy_sfp_probe (bsc#1154353).\n- net: qrtr: send msgs from local of same id as broadcast (networking-stable-20_04_17).\n- net: revert default NAPI poll timeout to 2 jiffies (networking-stable-20_04_17).\n- net: revert \u0027net: get rid of an signed integer overflow in ip_idents_reserve()\u0027 (bnc#1158748 (network regression)).\n- net: tun: record RX queue in skb before do_xdp_generic() (networking-stable-20_04_17).\n- net: vmxnet3: fix possible buffer overflow caused by bad DMA value in vmxnet3_get_rss() (bsc#1172484).\n- net/x25: Fix x25_neigh refcnt leak when receiving frame (networking-stable-20_04_27).\n- NFC: st21nfca: add missed kfree_skb() in an error path (git-fixes).\n- nfs: add minor version to nfs_server_key for fscache (bsc#1172467).\n- nfsd4: make drc_slab global, not per-net (git-fixes).\n- nfsd: always check return value of find_any_file (bsc#1172208).\n- NFS: Fix fscache super_cookie index_key from changing after umount (git-fixes).\n- nfs: fix NULL deference in nfs4_get_valid_delegation.\n- nfs: fscache: use timespec64 in inode auxdata (git-fixes).\n- nfs: set invalid blocks after NFSv4 writes (git-fixes).\n- NFSv4.1 fix rpc_call_done assignment for BIND_CONN_TO_SESSION (git-fixes).\n- NFSv4: Fix fscache cookie aux_data to ensure change_attr is included (git-fixes).\n- ntb: intel: add hw workaround for NTB BAR alignment (jsc#SLE-12710).\n- ntb: intel: Add Icelake (gen4) support for Intel NTB (jsc#SLE-12710).\n- ntb: intel: fix static declaration (jsc#SLE-12710).\n- nvdimm: Avoid race between probe and reading device attributes (bsc#1170442).\n- nvme-fc: avoid gcc-10 zero-length-bounds warning (bsc#1173206).\n- nvme-fc: do not call nvme_cleanup_cmd() for AENs (bsc#1171688).\n- nvme-fc: print proper nvme-fc devloss_tmo value (bsc#1172391).\n- objtool: Allow no-op CFI ops in alternatives (bsc#1169514).\n- objtool: Clean instruction state before each function validation (bsc#1169514).\n- objtool: Fix !CFI insn_state propagation (bsc#1169514).\n- objtool: Fix ORC vs alternatives (bsc#1169514).\n- objtool: Ignore empty alternatives (bsc#1169514).\n- objtool: Remove check preventing branches within alternative (bsc#1169514).\n- objtool: Rename struct cfi_state (bsc#1169514).\n- objtool: Uniquely identify alternative instruction groups (bsc#1169514).\n- p54usb: add AirVasT USB stick device-id (git-fixes).\n- panic: do not print uninitialized taint_flags (bsc#1172814).\n- PCI: Allow pci_resize_resource() for devices on root bus (git-fixes).\n- PCI: amlogic: meson: Do not use FAST_LINK_MODE to set up link (git-fixes).\n- PCI: brcmstb: Assert fundamental reset on initialization (git-fixes).\n- PCI: brcmstb: Assert fundamental reset on initialization (git-fixes).\n- PCI: brcmstb: Fix window register offset from 4 to 8 (git-fixes).\n- PCI: brcmstb: Fix window register offset from 4 to 8 (git-fixes).\n- pcie: mobiveil: remove patchset v9 Prepare to backport upstream version.\n- PCI: Fix pci_register_host_bridge() device_register() error handling (git-fixes).\n- PCI: mobiveil: Add 8-bit and 16-bit CSR register accessors (bsc#1161495).\n- PCI: mobiveil: Add callback function for interrupt initialization (bsc#1161495).\n- PCI: mobiveil: Add callback function for link up check (bsc#1161495).\n- PCI: mobiveil: Add Header Type field check (bsc#1161495).\n- PCI: mobiveil: Add PCIe Gen4 RC driver for Layerscape SoCs (bsc#1161495).\n- PCI: mobiveil: Allow mobiveil_host_init() to be used to re-init host (bsc#1161495).\n- PCI: mobiveil: Collect the interrupt related operations into a function (bsc#1161495).\n- PCI: mobiveil: Fix sparse different address space warnings (bsc#1161495).\n- PCI: mobiveil: Fix unmet dependency warning for PCIE_MOBIVEIL_PLAT (bsc#1161495).\n- PCI: mobiveil: Introduce a new structure mobiveil_root_port (bsc#1161495).\n- PCI: mobiveil: ls_pcie_g4: add Workaround for A-011451 (bsc#1161495).\n- PCI: mobiveil: ls_pcie_g4: add Workaround for A-011577 (bsc#1161495).\n- PCI: mobiveil: ls_pcie_g4: fix SError when accessing config space (bsc#1161495).\n- PCI: mobiveil: Modularize the Mobiveil PCIe Host Bridge IP driver (bsc#1161495).\n- PCI: mobiveil: Move the host initialization into a function (bsc#1161495).\n- PCI/PM: Adjust pcie_wait_for_link_delay() for caller delay (git-fixes).\n- PCI/PM: Call .bridge_d3() hook only if non-NULL (git-fixes).\n- PCI: Program MPS for RCiEP devices (git-fixes).\n- PCI/PTM: Inherit Switch Downstream Port PTM settings from Upstream Port (git-fixes).\n- PCI: rcar: Fix incorrect programming of OB windows (git-fixes).\n- PCI: v3-semi: Fix a memory leak in v3_pci_probe() error handling paths (git-fixes).\n- PCI: vmd: Filter resource type bits from shadow register (git-fixes).\n- pcm_native: result of put_user() needs to be checked (git-fixes).\n- perf/core: Fix endless multiplex timer (git-fixes).\n- perf/core: fix parent pid/tid in task exit events (git-fixes).\n- pinctrl: freescale: imx: Fix an error handling path in \u0027imx_pinctrl_probe()\u0027 (git-fixes).\n- pinctrl: freescale: imx: Use \u0027devm_of_iomap()\u0027 to avoid a resource leak in case of error in \u0027imx_pinctrl_probe()\u0027 (git-fixes).\n- pinctrl: imxl: Fix an error handling path in \u0027imx1_pinctrl_core_probe()\u0027 (git-fixes).\n- pinctrl: intel: Add Intel Tiger Lake pin controller support (jsc#SLE-12737).\n- pinctrl: ocelot: Fix GPIO interrupt decoding on Jaguar2 (git-fixes).\n- pinctrl: rza1: Fix wrong array assignment of rza1l_swio_entries (git-fixes).\n- pinctrl: samsung: Correct setting of eint wakeup mask on s5pv210 (git-fixes).\n- pinctrl: samsung: Save/restore eint_mask over suspend for EINT_TYPE GPIOs (git-fixes).\n- pinctrl: sprd: Fix the incorrect pull-up definition (git-fixes).\n- pinctrl: stmfx: stmfx_pinconf_set does not require to get direction anymore (git-fixes).\n- pinctrl: tigerlake: Tiger Lake uses _HID enumeration (jsc#SLE-12737).\n- platform/x86: asus-nb-wmi: Do not load on Asus T100TA and T200TA (git-fixes).\n- platform/x86: dell-laptop: do not register micmute LED if there is no token (git-fixes).\n- platform/x86: intel-vbtn: Also handle tablet-mode switch on \u0027Detachable\u0027 and \u0027Portable\u0027 chassis-types (git-fixes).\n- platform/x86: intel-vbtn: Do not advertise switches to userspace if they are not there (git-fixes).\n- platform/x86: intel-vbtn: Only blacklist SW_TABLET_MODE on the 9 / \u0027Laptop\u0027 chasis-type (git-fixes).\n- platform/x86: intel-vbtn: Split keymap into buttons and switches parts (git-fixes).\n- platform/x86: intel-vbtn: Use acpi_evaluate_integer() (git-fixes).\n- PM: runtime: clk: Fix clk_pm_runtime_get() error path (git-fixes).\n- pnp: Use list_for_each_entry() instead of open coding (git-fixes).\n- powerpc/64s: Do not let DT CPU features set FSCR_DSCR (bsc#1065729).\n- powerpc/64s/exception: Fix machine check no-loss idle wakeup (bsc#1156395).\n- powerpc/64s/kuap: Restore AMR in system reset exception (bsc#1156395).\n- powerpc/64s: Save FSCR to init_task.thread.fscr after feature init (bsc#1065729).\n- powerpc/book3s64: Export has_transparent_hugepage() related functions (bsc#1171759).\n- powerpc/bpf: Enable bpf_probe_read{, str}() on powerpc again (bsc#1172344).\n- powerpc/fadump: Account for memory_limit while reserving memory (jsc#SLE-9099 git-fixes).\n- powerpc/fadump: consider reserved ranges while reserving memory (jsc#SLE-9099 git-fixes).\n- powerpc/fadump: use static allocation for reserved memory ranges (jsc#SLE-9099 git-fixes).\n- powerpc/kuap: PPC_KUAP_DEBUG should depend on PPC_KUAP (bsc#1156395).\n- powerpc/powernv: Fix a warning message (bsc#1156395).\n- powerpc/setup_64: Set cache-line-size based on cache-block-size (bsc#1065729).\n- powerpc/xive: Clear the page tables for the ESB IO mapping (bsc#1085030).\n- power: reset: qcom-pon: reg write mask depends on pon generation (git-fixes).\n- power: supply: bq24257_charger: Replace depends on REGMAP_I2C with select (git-fixes).\n- power: supply: core: fix HWMON temperature labels (git-fixes).\n- power: supply: core: fix memory leak in HWMON error path (git-fixes).\n- power: supply: lp8788: Fix an error handling path in \u0027lp8788_charger_probe()\u0027 (git-fixes).\n- power: supply: smb347-charger: IRQSTAT_D is volatile (git-fixes).\n- printk: queue wake_up_klogd irq_work only if per-CPU areas are ready (bsc#1172095).\n- proc/meminfo: avoid open coded reading of vm_committed_as (bnc#1173271).\n- pwm: sun4i: Move pwm_calculate() out of spin_lock() (git-fixes).\n- r8152: support additional Microsoft Surface Ethernet Adapter variant (git-fixes).\n- r8169: Revive default chip version for r8168 (bsc#1173085).\n- raid5: remove gfp flags from scribble_alloc() (bsc#1166985).\n- random: fix data races at timer_rand_state (bsc#1173438).\n- rcu: Avoid data-race in rcu_gp_fqs_check_wake() (bsc#1171828).\n- rcu: Fix data-race due to atomic_t copy-by-value (bsc#1171828).\n- rcu: Make rcu_read_unlock_special() checks match raise_softirq_irqoff() (bsc#1172046).\n- rcu: Simplify rcu_read_unlock_special() deferred wakeups (bsc#1172046).\n- rcutorture: Add 100-CPU configuration (bsc#1173068).\n- rcutorture: Add worst-case call_rcu() forward-progress results (bsc#1173068).\n- rcutorture: Dispense with Dracut for initrd creation (bsc#1173068).\n- rcutorture: Make kvm-find-errors.sh abort on bad directory (bsc#1173068).\n- rcutorture: Remove CONFIG_HOTPLUG_CPU=n from scenarios (bsc#1173068).\n- rcutorture: Summarize summary of build and run results (bsc#1173068).\n- rcutorture: Test TREE03 with the threadirqs kernel boot parameter (bsc#1173068).\n- rcu: Use *_ONCE() to protect lockless -\u003eexpmask accesses (bsc#1171828).\n- rcu: Use WRITE_ONCE() for assignments to -\u003epprev for hlist_nulls (bsc#1173438).\n- RDMA/bnxt_re: Remove dead code from rcfw (bsc#1170774).\n- RDMA/core: Move and rename trace_cm_id_create() (jsc#SLE-8449).\n- RDMA/mlx5: Fix NULL pointer dereference in destroy_prefetch_work (jsc#SLE-8446).\n- RDMA/nl: Do not permit empty devices names during RDMA_NLDEV_CMD_NEWLINK/SET (bsc#1172841).\n- RDMA/srpt: Fix disabling device management (jsc#SLE-8449).\n- RDMA/uverbs: Make the event_queue fds return POLLERR when disassociated (jsc#SLE-8449).\n- remoteproc: Add missing \u0027\\n\u0027 in log messages (git-fixes).\n- remoteproc: Fall back to using parent memory pool if no dedicated available (git-fixes).\n- remoteproc: Fix and restore the parenting hierarchy for vdev (git-fixes).\n- remoteproc: Fix IDR initialisation in rproc_alloc() (git-fixes).\n- Revert \u0027drm/amd/display: disable dcn20 abm feature for bring up\u0027 (git-fixes).\n- Revert \u0027fs/seq_file.c: seq_read(): add info message about buggy .next functions\u0027 (bsc#1172751) The message floods dmesg and its benefit is marginal in default kernel.\n- Revert \u0027pinctrl: freescale: imx: Use \u0027devm_of_iomap()\u0027 to avoid a resource leak in case of error in \u0027imx_pinctrl_probe()\u0027\u0027 (git-fixes).\n- rpm/kernel-source.spec.in: Add obsolete_rebuilds (boo#1172073).\n- rpm/modules.fips: * add aes-ce-ccm and des3_ede-x86_64 (boo#173030) * add aes_ti and aes_neon_bs (boo#1172956)\n- rtc: mc13xxx: fix a double-unlock issue (git-fixes).\n- rtc: rv3028: Add missed check for devm_regmap_init_i2c() (git-fixes).\n- rtlwifi: Fix a double free in _rtl_usb_tx_urb_setup() (git-fixes).\n- rtw88: fix an issue about leak system resources (git-fixes).\n- rxrpc: Fix call RCU cleanup using non-bh-safe locks (git-fixes).\n- s390/bpf: Maintain 8-byte stack alignment (bsc#1169194, LTC#185911).\n- s390/pci: Log new handle in clp_disable_fh() (git-fixes).\n- sched/cfs: change initial value of runnable_avg (bsc#1158765).\n- sched/core: Check cpus_mask, not cpus_ptr in __set_cpus_allowed_ptr(), to fix mask corruption (bnc#1155798 (CPU scheduler functional and performance backports)).\n- sched/core: Fix PI boosting between RT and DEADLINE tasks (bsc#1172823).\n- sched/core: Fix PI boosting between RT and DEADLINE tasks (git fixes (sched)).\n- sched/core: Fix ttwu() race (bnc#1155798 (CPU scheduler functional and performance backports)).\n- sched/core: s/WF_ON_RQ/WQ_ON_CPU/ (bnc#1155798 (CPU scheduler functional and performance backports)).\n- sched/cpuacct: Fix charge cpuacct.usage_sys (bnc#1155798 (CPU scheduler functional and performance backports)).\n- sched/deadline: Initialize -\u003edl_boosted (bsc#1172823).\n- sched/deadline: Initialize -\u003edl_boosted (git fixes (sched)).\n- sched: etf: do not assume all sockets are full blown (networking-stable-20_04_27).\n- sched/fair: find_idlest_group(): Remove unused sd_flag parameter (bnc#1155798 (CPU scheduler functional and performance backports)).\n- sched/fair: Fix enqueue_task_fair() warning some more (bnc#1155798 (CPU scheduler functional and performance backports)).\n- sched/fair: fix nohz next idle balance (bnc#1155798 (CPU scheduler functional and performance backports)).\n- sched/fair: Optimize dequeue_task_fair() (bnc#1155798 (CPU scheduler functional and performance backports)).\n- sched/fair: Optimize enqueue_task_fair() (bnc#1155798 (CPU scheduler functional and performance backports)).\n- sched/fair: Simplify the code of should_we_balance() (bnc#1155798 (CPU scheduler functional and performance backports)).\n- sched: Make newidle_balance() static again (bnc#1155798 (CPU scheduler functional and performance backports)).\n- sched: Offload wakee task activation if it the wakee is descheduling (bnc#1158748, bnc#1159781).\n- sched: Optimize ttwu() spinning on p-\u003eon_cpu (bnc#1158748, bnc#1159781).\n- sched/pelt: Sync util/runnable_sum with PELT window when propagating (bnc#1155798 (CPU scheduler functional and performance backports)).\n- scripts/decodecode: fix trapping instruction formatting (bsc#1065729).\n- scsi: ibmvscsi: Do not send host info in adapter info MAD after LPM (bsc#1172759 ltc#184814).\n- scsi: lpfc: Change default queue allocation for reduced memory consumption (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n- scsi: lpfc: Copyright updates for 12.6.0.4 patches (bsc#1171530).\n- scsi: lpfc: fix build failure with DEBUGFS disabled (bsc#1171530).\n- scsi: lpfc: Fix incomplete NVME discovery when target (bsc#1171530).\n- scsi: lpfc: Fix lpfc_nodelist leak when processing unsolicited event (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n- scsi: lpfc: Fix MDS Diagnostic Enablement definition (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n- scsi: lpfc: Fix memory leak on lpfc_bsg_write_ebuf_set func (bsc#1171530).\n- scsi: lpfc: Fix negation of else clause in lpfc_prep_node_fc4type (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n- scsi: lpfc: Fix noderef and address space warnings (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n- scsi: lpfc: fix spelling mistakes of asynchronous (bsc#1171530).\n- scsi: lpfc: Maintain atomic consistency of queue_claimed flag (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n- scsi: lpfc: Make lpfc_defer_acc_rsp static (bsc#1171530).\n- scsi: lpfc: remove duplicate unloading checks (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n- scsi: lpfc: Remove re-binding of nvme rport during registration (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n- scsi: lpfc: Remove redundant initialization to variable rc (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n- scsi: lpfc: Remove unnecessary lockdep_assert_held calls (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n- scsi: lpfc: Update lpfc version to 12.8.0.1 (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n- scsi: megaraid_sas: Replace undefined MFI_BIG_ENDIAN macro with __BIG_ENDIAN_BITFIELD macro (bsc#1173206).\n- scsi: qla2xxx: Delete all sessions before unregister local nvme port (jsc#SLE-9714 jsc#SLE-10327 jsc#SLE-10334 bsc#1157169).\n- scsi: qla2xxx: Do not log message when reading port speed via sysfs (jsc#SLE-9714 jsc#SLE-10327 jsc#SLE-10334 bsc#1157169).\n- scsi: qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV (jsc#SLE-9714 jsc#SLE-10327 jsc#SLE-10334 bsc#1157169).\n- scsi: sd_zbc: Fix sd_zbc_complete() (bsc#1173206).\n- scsi: smartpqi: Update attribute name to `driver_version` (bsc#1173206).\n- scsi: zfcp: add diagnostics buffer for exchange config data (bsc#1158050).\n- scsi: zfcp: auto variables for dereferenced structs in open port handler (bsc#1158050).\n- scsi: zfcp: diagnostics buffer caching and use for exchange port data (bsc#1158050).\n- scsi: zfcp: enhance handling of FC Endpoint Security errors (bsc#1158050).\n- scsi: zfcp: expose fabric name as common fc_host sysfs attribute (bsc#1158050).\n- scsi: zfcp: Fence adapter status propagation for common statuses (bsc#1158050).\n- scsi: zfcp: Fence early sysfs interfaces for accesses of shost objects (bsc#1158050).\n- scsi: zfcp: Fence fc_host updates during link-down handling (bsc#1158050).\n- scsi: zfcp: fix fc_host attributes that should be unknown on local link down (bsc#1158050).\n- scsi: zfcp: fix wrong data and display format of SFP+ temperature (bsc#1158050).\n- scsi: zfcp: implicitly refresh config-data diagnostics when reading sysfs (bsc#1158050).\n- scsi: zfcp: implicitly refresh port-data diagnostics when reading sysfs (bsc#1158050).\n- scsi: zfcp: introduce sysfs interface for diagnostics of local SFP transceiver (bsc#1158050).\n- scsi: zfcp: introduce sysfs interface to read the local B2B-Credit (bsc#1158050).\n- scsi: zfcp: log FC Endpoint Security errors (bsc#1158050).\n- scsi: zfcp: log FC Endpoint Security of connections (bsc#1158050).\n- scsi: zfcp: Move allocation of the shost object to after xconf- and xport-data (bsc#1158050).\n- scsi: zfcp: Move fc_host updates during xport data handling into fenced function (bsc#1158050).\n- scsi: zfcp: move maximum age of diagnostic buffers into a per-adapter variable (bsc#1158050).\n- scsi: zfcp: Move p-t-p port allocation to after xport data (bsc#1158050).\n- scsi: zfcp: Move shost modification after QDIO (re-)open into fenced function (bsc#1158050).\n- scsi: zfcp: Move shost updates during xconfig data handling into fenced function (bsc#1158050).\n- scsi: zfcp: proper indentation to reduce confusion in zfcp_erp_required_act (bsc#1158050).\n- scsi: zfcp: report FC Endpoint Security in sysfs (bsc#1158050).\n- scsi: zfcp: signal incomplete or error for sync exchange config/port data (bsc#1158050).\n- scsi: zfcp: support retrieval of SFP Data via Exchange Port Data (bsc#1158050).\n- scsi: zfcp: trace FC Endpoint Security of FCP devices and connections (bsc#1158050).\n- scsi: zfcp: wire previously driver-specific sysfs attributes also to fc_host (bsc#1158050).\n- selftests/bpf: CONFIG_IPV6_SEG6_BPF required for test_seg6_loop.o (bsc#1155518).\n- selftests/bpf: CONFIG_LIRC required for test_lirc_mode2.sh (bsc#1155518).\n- selftests/bpf: Fix invalid memory reads in core_relo selftest (bsc#1155518).\n- selftests/bpf: Fix memory leak in extract_build_id() (bsc#1155518).\n- selftests/bpf, flow_dissector: Close TAP device FD after the test (bsc#1155518).\n- selftests/timens: handle a case when alarm clocks are not supported (bsc#1164648,jsc#SLE-11493).\n- serial: 8250: Fix max baud limit in generic 8250 port (git-fixes).\n- slimbus: core: Fix mismatch in of_node_get/put (git-fixes).\n- soc: mediatek: cmdq: return send msg error code (git-fixes).\n- soc: qcom: rpmh: Dirt can only make you dirtier, not cleaner (git-fixes).\n- soc: qcom: rpmh: Invalidate SLEEP and WAKE TCSes before flushing new data (git-fixes).\n- soc: qcom: rpmh-rsc: Allow using free WAKE TCS for active request (git-fixes).\n- soc: qcom: rpmh-rsc: Clear active mode configuration for wake TCS (git-fixes).\n- soc: qcom: rpmh: Update dirty flag only when data changes (git-fixes).\n- soc/tegra: pmc: Select GENERIC_PINCONF (git-fixes).\n- spi: bcm2835aux: Fix controller unregister order (git-fixes).\n- spi: bcm2835: Fix controller unregister order (git-fixes).\n- spi: bcm-qspi: Handle clock probe deferral (git-fixes).\n- spi: bcm-qspi: when tx/rx buffer is NULL set to 0 (git-fixes).\n- SPI: designware: pci: Switch over to MSI interrupts (jsc#SLE-12735).\n- spi: dt-bindings: spi-controller: Fix #address-cells for slave mode (git-fixes).\n- spi: dw: Add SPI Rx-done wait method to DMA-based transfer (git-fixes).\n- spi: dw: Add SPI Tx-done wait method to DMA-based transfer (git-fixes).\n- spi: dw: Fix controller unregister order (git-fixes).\n- spi: dw: Fix native CS being unset (git-fixes).\n- spi: dw-pci: Add MODULE_DEVICE_TABLE (jsc#SLE-12735).\n- spi: dw-pci: Add runtime power management support (jsc#SLE-12735).\n- spi: dw-pci: Add support for Intel Elkhart Lake PSE SPI (jsc#SLE-12735).\n- spi: dw-pci: Fix Chip Select amount on Intel Elkhart Lake PSE SPI (jsc#SLE-12735).\n- spi: dw: use \u0027smp_mb()\u0027 to avoid sending spi data error (git-fixes).\n- spi: dw: Zero DMA Tx and Rx configurations on stack (git-fixes).\n- spi: Fix controller unregister order (git-fixes).\n- spi: fsl: do not map irq during probe (git-fixes).\n- spi: fsl: use platform_get_irq() instead of of_irq_to_resource() (git-fixes).\n- spi: pxa2xx: Fix controller unregister order (git-fixes).\n- spi: pxa2xx: Fix runtime PM ref imbalance on probe error (git-fixes).\n- spi: Respect DataBitLength field of SpiSerialBusV2() ACPI resource (git-fixes).\n- spi: spi-fsl-dspi: Change usage pattern of SPI_MCR_* and SPI_CTAR_* macros (git-fixes).\n- spi: spi-fsl-dspi: Do not access reserved fields in SPI_MCR (git-fixes).\n- spi: spi-fsl-dspi: Fix 16-bit word order in 32-bit XSPI mode (git-fixes).\n- spi: spi-fsl-dspi: Replace interruptible wait queue with a simple completion (git-fixes).\n- spi: spi-mem: Fix Dual/Quad modes on Octal-capable devices (git-fixes).\n- staging: iio: ad2s1210: Fix SPI reading (git-fixes).\n- staging: kpc2000: fix error return code in kp2000_pcie_probe() (git-fixes).\n- staging: rtl8712: Fix IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK (git-fixes).\n- staging: sm750fb: add missing case while setting FB_VISUAL (git-fixes).\n- sun6i: dsi: fix gcc-4.8 (bsc#1152489)\n- SUNRPC: Signalled ASYNC tasks need to exit (git-fixes).\n- supported.conf: Add pinctrl-tigerlake as supported\n- supported.conf: Mark two hwtracing helper modules as externally supported (bsc#1170879)\n- svcrdma: Fix leak of svc_rdma_recv_ctxt objects (git-fixes).\n- tcp: cache line align MAX_TCP_HEADER (networking-stable-20_04_27).\n- team: fix hang in team_mode_get() (networking-stable-20_04_27).\n- thermal: intel: intel_pch_thermal: Add Comet Lake (CML) platform support (jsc#SLE-12668).\n- tick/sched: Annotate lockless access to last_jiffies_update (bsc#1173438).\n- timer: Use hlist_unhashed_lockless() in timer_pending() (bsc#1173438).\n- torture: Allow \u0027CFLIST\u0027 to specify default list of scenarios (bsc#1173068).\n- torture: Expand last_ts variable in kvm-test-1-run.sh (bsc#1173068).\n- torture: Handle jitter for CPUs that cannot be offlined (bsc#1173068).\n- torture: Handle systems lacking the mpstat command (bsc#1173068).\n- torture: Hoist calls to lscpu to higher-level kvm.sh script (bsc#1173068).\n- torture: Make results-directory date format completion-friendly (bsc#1173068).\n- torture: Use gawk instead of awk for systime() function (bsc#1173068).\n- tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send() (bsc#1065729).\n- tty: n_gsm: Fix bogus i++ in gsm_data_kick (git-fixes).\n- tty: n_gsm: Fix SOF skipping (git-fixes).\n- tty: n_gsm: Fix waking up upper tty layer when room available (git-fixes).\n- tty: serial: add missing spin_lock_init for SiFive serial console (git-fixes).\n- tun: correct header offsets in napi frags mode (git-fixes).\n- Update config files: Add CONFIG_PINCTRL_TIGERLAKE=m\n- Update patch reference for intel_th patch (jsc#SLE-12705)\n- Update the patch reference for ish-hid fix (jsc#SLE-12683)\n- usb: core: Fix misleading driver bug report (git-fixes).\n- usb: core: hub: limit HUB_QUIRK_DISABLE_AUTOSUSPEND to USB5534B (git-fixes).\n- usb: dwc2: gadget: move gadget resume after the core is in L0 state (git-fixes).\n- usb: dwc3: gadget: Properly handle ClearFeature(halt) (git-fixes).\n- usb: dwc3: gadget: Properly handle failed kick_transfer (git-fixes).\n- usb: dwc3: pci: Enable extcon driver for Intel Merrifield (git-fixes).\n- usb: gadget: audio: Fix a missing error return value in audio_bind() (git-fixes).\n- usb: gadget: fix illegal array access in binding with UDC (git-fixes).\n- usb: gadget: fix potential double-free in m66592_probe (git-fixes).\n- usb: gadget: legacy: fix error return code in cdc_bind() (git-fixes).\n- usb: gadget: legacy: fix error return code in gncm_bind() (git-fixes).\n- usb: gadget: legacy: fix redundant initialization warnings (git-fixes).\n- usb: gadget: lpc32xx_udc: do not dereference ep pointer before null check (git-fixes).\n- usb: gadget: net2272: Fix a memory leak in an error handling path in \u0027net2272_plat_probe()\u0027 (git-fixes).\n- usb: gadget: udc: atmel: Make some symbols static (git-fixes).\n- usb: gadget: udc: s3c2410_udc: Remove pointless NULL check in s3c2410_udc_nuke (git-fixes).\n- usb: host: ehci-mxc: Add error handling in ehci_mxc_drv_probe() (git-fixes).\n- usb: host: xhci-plat: keep runtime active when removing host (git-fixes).\n- usb: musb: Fix runtime PM imbalance on error (git-fixes).\n- usb: musb: start session in resume for host port (git-fixes).\n- usb: ohci-sm501: fix error return code in ohci_hcd_sm501_drv_probe() (git-fixes).\n- usb: serial: option: add Telit LE910C1-EUX compositions (git-fixes).\n- usb: serial: qcserial: add DW5816e QDL support (git-fixes).\n- usb: serial: usb_wwan: do not resubmit rx urb on fatal errors (git-fixes).\n- usb: usbfs: correct kernel-\u003euser page attribute mismatch (git-fixes).\n- usb: usbfs: fix mmap dma mismatch (git-fixes).\n- vfio: avoid possible overflow in vfio_iommu_type1_pin_pages (git-fixes).\n- vfio: Ignore -ENODEV when getting MSI cookie (git-fixes).\n- vfio/mdev: Fix reference count leak in add_mdev_supported_type (git-fixes).\n- vfio/pci: fix memory leaks in alloc_perm_bits() (git-fixes).\n- vfio/type1: Fix VA-\u003ePA translation for PFNMAP VMAs in vaddr_get_pfn() (git-fixes).\n- video: fbdev: w100fb: Fix a potential double free (git-fixes).\n- virtio-blk: handle block_device_operations callbacks after hot unplug (git fixes (block drivers)).\n- vmxnet3: add geneve and vxlan tunnel offload support (bsc#1172484).\n- vmxnet3: add support to get/set rx flow hash (bsc#1172484).\n- vmxnet3: allow rx flow hash ops only when rss is enabled (bsc#1172484).\n- vmxnet3: prepare for version 4 changes (bsc#1172484).\n- vmxnet3: update to version 4 (bsc#1172484).\n- vmxnet3: use correct hdr reference when packet is encapsulated (bsc#1172484).\n- vrf: Check skb for XFRM_TRANSFORMED flag (networking-stable-20_04_27).\n- vrf: Fix IPv6 with qdisc and xfrm (networking-stable-20_04_27).\n- vsprintf: do not obfuscate NULL and error pointers (bsc#1172086).\n- vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console (git-fixes).\n- vt: vt_ioctl: remove unnecessary console allocation checks (git-fixes).\n- vxlan: use the correct nlattr array in NL_SET_ERR_MSG_ATTR (networking-stable-20_04_27).\n- w1: omap-hdq: cleanup to add missing newline for some dev_dbg (git-fixes).\n- watchdog: imx_sc_wdt: Fix reboot on crash (git-fixes).\n- wcn36xx: Fix error handling path in \u0027wcn36xx_probe()\u0027 (git-fixes).\n- wireguard: device: avoid circular netns references (git-fixes).\n- wireguard: noise: do not assign initiation time in if condition (git-fixes).\n- wireguard: noise: read preshared key while taking lock (bsc#1169021 jsc#SLE-12250).\n- wireguard: noise: separate receive counter from send counter (bsc#1169021 jsc#SLE-12250).\n- wireguard: queueing: preserve flow hash across packet scrubbing (bsc#1169021 jsc#SLE-12250).\n- wireguard: receive: account for napi_gro_receive never returning GRO_DROP (git-fixes).\n- wireguard: selftests: use newer iproute2 for gcc-10 (bsc#1169021 jsc#SLE-12250).\n- work around mvfs bug (bsc#1162063).\n- workqueue: do not use wq_select_unbound_cpu() for bound works (git-fixes).\n- workqueue: Remove the warning in wq_worker_sleeping() (git-fixes).\n- x86/cpu/amd: Make erratum #1054 a legacy erratum (bsc#1152489).\n- x86: Fix early boot crash on gcc-10, third try (bsc#1152489).\n- x86/mm/cpa: Flush direct map alias during cpa (bsc#1152489).\n- x86/PCI: Mark Intel C620 MROMs as having non-compliant BARs (git-fixes).\n- x86/reboot/quirks: Add MacBook6,1 reboot quirk (git-fixes).\n- x86/resctrl: Fix invalid attempt at removing the default resource group (bsc#1152489).\n- x86/resctrl: Preserve CDP enable over CPU hotplug (bsc#1152489).\n- x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks (bsc#1058115).\n- xfrm: Always set XFRM_TRANSFORMED in xfrm{4,6}_output_finish (networking-stable-20_04_27).\n- xfrm: fix error in comment (git fixes (block drivers)).\n- xfs: clean up the error handling in xfs_swap_extents (git-fixes).\n- xfs: do not commit sunit/swidth updates to disk if that would cause repair failures (bsc#1172169).\n- xfs: do not fail unwritten extent conversion on writeback due to edquot (bsc#1158242).\n- xfs: fix duplicate verification from xfs_qm_dqflush() (git-fixes).\n- xfs: force writes to delalloc regions to unwritten (bsc#1158242).\n- xfs: measure all contiguous previous extents for prealloc size (bsc#1158242).\n- xfs: preserve default grace interval during quotacheck (bsc#1172170).\n- xfs: refactor agfl length computation function (bsc#1172169).\n- xfs: split the sunit parameter update into two parts (bsc#1172169).\n- wireguard: selftests: initalize ipv6 members to NULL to squelch clang warning (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2020-935", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_0935-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2020:0935-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z6FEYXFXT2CJAAJJVCMBHT3BT2ZBZC3G/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2020:0935-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z6FEYXFXT2CJAAJJVCMBHT3BT2ZBZC3G/" }, { "category": "self", "summary": "SUSE Bug 1058115", "url": "https://bugzilla.suse.com/1058115" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1085030", "url": "https://bugzilla.suse.com/1085030" }, { "category": "self", "summary": "SUSE Bug 1148868", "url": "https://bugzilla.suse.com/1148868" }, { "category": "self", "summary": "SUSE Bug 1152472", "url": "https://bugzilla.suse.com/1152472" }, { "category": "self", "summary": "SUSE Bug 1152489", "url": "https://bugzilla.suse.com/1152489" }, { "category": "self", "summary": "SUSE Bug 1153274", "url": "https://bugzilla.suse.com/1153274" }, { "category": "self", "summary": "SUSE Bug 1154353", "url": "https://bugzilla.suse.com/1154353" }, { "category": "self", "summary": "SUSE Bug 1154492", "url": "https://bugzilla.suse.com/1154492" }, { "category": "self", "summary": "SUSE Bug 1155518", "url": "https://bugzilla.suse.com/1155518" }, { "category": "self", "summary": "SUSE Bug 1155798", "url": "https://bugzilla.suse.com/1155798" }, { "category": "self", "summary": "SUSE Bug 1156395", "url": "https://bugzilla.suse.com/1156395" }, { "category": "self", "summary": "SUSE Bug 1157169", "url": "https://bugzilla.suse.com/1157169" }, { "category": "self", "summary": "SUSE Bug 1158050", "url": "https://bugzilla.suse.com/1158050" }, { "category": "self", "summary": "SUSE Bug 1158242", "url": "https://bugzilla.suse.com/1158242" }, { "category": "self", "summary": "SUSE Bug 1158265", "url": "https://bugzilla.suse.com/1158265" }, { "category": "self", "summary": "SUSE Bug 1158748", "url": "https://bugzilla.suse.com/1158748" }, { "category": "self", "summary": "SUSE Bug 1158765", "url": "https://bugzilla.suse.com/1158765" }, { "category": "self", "summary": "SUSE Bug 1159781", "url": "https://bugzilla.suse.com/1159781" }, { "category": "self", "summary": "SUSE Bug 1159867", "url": "https://bugzilla.suse.com/1159867" }, { "category": "self", "summary": "SUSE Bug 1160947", "url": "https://bugzilla.suse.com/1160947" }, { "category": "self", "summary": "SUSE Bug 1161495", "url": "https://bugzilla.suse.com/1161495" }, { "category": "self", "summary": "SUSE Bug 1162002", "url": "https://bugzilla.suse.com/1162002" }, { "category": "self", "summary": "SUSE Bug 1162063", "url": "https://bugzilla.suse.com/1162063" }, { "category": "self", "summary": "SUSE Bug 1162400", "url": "https://bugzilla.suse.com/1162400" }, { "category": "self", "summary": "SUSE Bug 1164648", "url": "https://bugzilla.suse.com/1164648" }, { "category": "self", "summary": "SUSE Bug 1164777", "url": "https://bugzilla.suse.com/1164777" }, { "category": "self", "summary": "SUSE Bug 1164780", "url": "https://bugzilla.suse.com/1164780" }, { "category": "self", "summary": "SUSE Bug 1165211", "url": "https://bugzilla.suse.com/1165211" }, { "category": "self", "summary": "SUSE Bug 1165975", "url": "https://bugzilla.suse.com/1165975" }, { "category": "self", "summary": "SUSE Bug 1166985", "url": "https://bugzilla.suse.com/1166985" }, { "category": "self", "summary": "SUSE Bug 1167104", "url": "https://bugzilla.suse.com/1167104" }, { "category": "self", "summary": "SUSE Bug 1167651", "url": "https://bugzilla.suse.com/1167651" }, { "category": "self", "summary": "SUSE Bug 1168230", "url": "https://bugzilla.suse.com/1168230" }, { "category": "self", "summary": "SUSE Bug 1168779", "url": "https://bugzilla.suse.com/1168779" }, { "category": "self", "summary": "SUSE Bug 1168838", "url": "https://bugzilla.suse.com/1168838" }, { "category": "self", "summary": "SUSE Bug 1169021", "url": "https://bugzilla.suse.com/1169021" }, { "category": "self", "summary": "SUSE Bug 1169194", "url": "https://bugzilla.suse.com/1169194" }, { "category": "self", "summary": "SUSE Bug 1169514", "url": "https://bugzilla.suse.com/1169514" }, { "category": "self", "summary": "SUSE Bug 1169681", "url": "https://bugzilla.suse.com/1169681" }, { "category": "self", "summary": "SUSE Bug 1170011", "url": "https://bugzilla.suse.com/1170011" }, { "category": "self", "summary": "SUSE Bug 1170442", "url": "https://bugzilla.suse.com/1170442" }, { "category": "self", "summary": "SUSE Bug 1170774", "url": "https://bugzilla.suse.com/1170774" }, { "category": "self", "summary": "SUSE Bug 1170879", "url": "https://bugzilla.suse.com/1170879" }, { "category": "self", "summary": "SUSE Bug 1170891", "url": "https://bugzilla.suse.com/1170891" }, { "category": "self", "summary": "SUSE Bug 1170895", "url": "https://bugzilla.suse.com/1170895" }, { "category": "self", "summary": "SUSE Bug 1171189", "url": "https://bugzilla.suse.com/1171189" }, { "category": "self", "summary": "SUSE Bug 1171191", "url": "https://bugzilla.suse.com/1171191" }, { "category": "self", "summary": "SUSE Bug 1171219", "url": "https://bugzilla.suse.com/1171219" }, { "category": "self", "summary": "SUSE Bug 1171220", "url": "https://bugzilla.suse.com/1171220" }, { "category": "self", "summary": "SUSE Bug 1171246", "url": "https://bugzilla.suse.com/1171246" }, { "category": "self", "summary": "SUSE Bug 1171417", "url": "https://bugzilla.suse.com/1171417" }, { "category": "self", "summary": "SUSE Bug 1171513", "url": "https://bugzilla.suse.com/1171513" }, { "category": "self", "summary": "SUSE Bug 1171530", "url": "https://bugzilla.suse.com/1171530" }, { "category": "self", "summary": "SUSE Bug 1171662", "url": "https://bugzilla.suse.com/1171662" }, { "category": "self", "summary": "SUSE Bug 1171688", "url": "https://bugzilla.suse.com/1171688" }, { "category": "self", "summary": "SUSE Bug 1171699", "url": "https://bugzilla.suse.com/1171699" }, { "category": "self", "summary": "SUSE Bug 1171739", "url": "https://bugzilla.suse.com/1171739" }, { "category": "self", "summary": "SUSE Bug 1171743", "url": "https://bugzilla.suse.com/1171743" }, { "category": "self", "summary": "SUSE Bug 1171759", "url": "https://bugzilla.suse.com/1171759" }, { "category": "self", "summary": "SUSE Bug 1171828", "url": "https://bugzilla.suse.com/1171828" }, { "category": "self", "summary": "SUSE Bug 1171868", "url": "https://bugzilla.suse.com/1171868" }, { "category": "self", "summary": "SUSE Bug 1171904", "url": "https://bugzilla.suse.com/1171904" }, { "category": "self", "summary": "SUSE Bug 1171915", "url": "https://bugzilla.suse.com/1171915" }, { "category": "self", "summary": "SUSE Bug 1171982", "url": "https://bugzilla.suse.com/1171982" }, { "category": "self", "summary": "SUSE Bug 1171983", "url": "https://bugzilla.suse.com/1171983" }, { "category": "self", "summary": "SUSE Bug 1172017", "url": "https://bugzilla.suse.com/1172017" }, { "category": "self", "summary": "SUSE Bug 1172046", "url": "https://bugzilla.suse.com/1172046" }, { "category": "self", "summary": "SUSE Bug 1172061", "url": "https://bugzilla.suse.com/1172061" }, { "category": "self", "summary": "SUSE Bug 1172062", "url": "https://bugzilla.suse.com/1172062" }, { "category": "self", "summary": "SUSE Bug 1172063", "url": "https://bugzilla.suse.com/1172063" }, { "category": "self", "summary": "SUSE Bug 1172064", "url": "https://bugzilla.suse.com/1172064" }, { "category": "self", "summary": "SUSE Bug 1172065", "url": "https://bugzilla.suse.com/1172065" }, { "category": "self", "summary": "SUSE Bug 1172066", "url": "https://bugzilla.suse.com/1172066" }, { "category": "self", "summary": "SUSE Bug 1172067", "url": "https://bugzilla.suse.com/1172067" }, { "category": "self", "summary": "SUSE Bug 1172068", "url": "https://bugzilla.suse.com/1172068" }, { "category": "self", "summary": "SUSE Bug 1172069", "url": "https://bugzilla.suse.com/1172069" }, { "category": "self", "summary": "SUSE Bug 1172073", "url": "https://bugzilla.suse.com/1172073" }, { "category": "self", "summary": "SUSE Bug 1172086", "url": "https://bugzilla.suse.com/1172086" }, { "category": "self", "summary": "SUSE Bug 1172095", "url": "https://bugzilla.suse.com/1172095" }, { "category": "self", "summary": "SUSE Bug 1172169", "url": "https://bugzilla.suse.com/1172169" }, { "category": "self", "summary": "SUSE Bug 1172170", "url": "https://bugzilla.suse.com/1172170" }, { "category": "self", "summary": "SUSE Bug 1172208", "url": "https://bugzilla.suse.com/1172208" }, { "category": "self", "summary": "SUSE Bug 1172223", "url": "https://bugzilla.suse.com/1172223" }, { "category": "self", "summary": "SUSE Bug 1172342", "url": "https://bugzilla.suse.com/1172342" }, { "category": "self", "summary": "SUSE Bug 1172343", "url": "https://bugzilla.suse.com/1172343" }, { "category": "self", "summary": "SUSE Bug 1172344", "url": "https://bugzilla.suse.com/1172344" }, { "category": "self", "summary": "SUSE Bug 1172365", "url": "https://bugzilla.suse.com/1172365" }, { "category": "self", "summary": "SUSE Bug 1172366", "url": "https://bugzilla.suse.com/1172366" }, { "category": "self", "summary": "SUSE Bug 1172374", "url": "https://bugzilla.suse.com/1172374" }, { "category": "self", "summary": "SUSE Bug 1172391", "url": "https://bugzilla.suse.com/1172391" }, { "category": "self", "summary": "SUSE Bug 1172393", "url": "https://bugzilla.suse.com/1172393" }, { "category": "self", "summary": "SUSE Bug 1172394", "url": "https://bugzilla.suse.com/1172394" }, { "category": "self", "summary": "SUSE Bug 1172453", "url": "https://bugzilla.suse.com/1172453" }, { "category": "self", "summary": "SUSE Bug 1172458", "url": "https://bugzilla.suse.com/1172458" }, { "category": "self", "summary": "SUSE Bug 1172467", "url": "https://bugzilla.suse.com/1172467" }, { "category": "self", "summary": "SUSE Bug 1172484", "url": "https://bugzilla.suse.com/1172484" }, { "category": "self", "summary": "SUSE Bug 1172537", "url": "https://bugzilla.suse.com/1172537" }, { "category": "self", "summary": "SUSE Bug 1172719", "url": "https://bugzilla.suse.com/1172719" }, { "category": "self", "summary": "SUSE Bug 1172739", "url": "https://bugzilla.suse.com/1172739" }, { "category": "self", "summary": "SUSE Bug 1172751", "url": "https://bugzilla.suse.com/1172751" }, { "category": "self", "summary": "SUSE Bug 1172759", "url": "https://bugzilla.suse.com/1172759" }, { "category": "self", "summary": "SUSE Bug 1172775", "url": "https://bugzilla.suse.com/1172775" }, { "category": "self", "summary": "SUSE Bug 1172781", "url": "https://bugzilla.suse.com/1172781" }, { "category": "self", "summary": "SUSE Bug 1172782", "url": "https://bugzilla.suse.com/1172782" }, { "category": "self", "summary": "SUSE Bug 1172783", "url": "https://bugzilla.suse.com/1172783" }, { "category": "self", "summary": "SUSE Bug 1172814", "url": "https://bugzilla.suse.com/1172814" }, { "category": "self", "summary": "SUSE Bug 1172823", "url": "https://bugzilla.suse.com/1172823" }, { "category": "self", "summary": "SUSE Bug 1172841", "url": "https://bugzilla.suse.com/1172841" }, { "category": "self", "summary": "SUSE Bug 1172938", "url": "https://bugzilla.suse.com/1172938" }, { "category": "self", "summary": "SUSE Bug 1172939", "url": "https://bugzilla.suse.com/1172939" }, { "category": "self", "summary": "SUSE Bug 1172940", "url": "https://bugzilla.suse.com/1172940" }, { "category": "self", "summary": "SUSE Bug 1172956", "url": "https://bugzilla.suse.com/1172956" }, { "category": "self", "summary": "SUSE Bug 1172983", "url": "https://bugzilla.suse.com/1172983" }, { "category": "self", "summary": "SUSE Bug 1172984", "url": "https://bugzilla.suse.com/1172984" }, { "category": "self", "summary": "SUSE Bug 1172985", "url": "https://bugzilla.suse.com/1172985" }, { "category": "self", "summary": "SUSE Bug 1172986", "url": "https://bugzilla.suse.com/1172986" }, { "category": "self", "summary": "SUSE Bug 1172987", "url": "https://bugzilla.suse.com/1172987" }, { "category": "self", "summary": "SUSE Bug 1172988", "url": "https://bugzilla.suse.com/1172988" }, { "category": "self", "summary": "SUSE Bug 1172989", "url": "https://bugzilla.suse.com/1172989" }, { "category": "self", "summary": "SUSE Bug 1172990", "url": "https://bugzilla.suse.com/1172990" }, { "category": "self", "summary": "SUSE Bug 1172999", "url": "https://bugzilla.suse.com/1172999" }, { "category": "self", "summary": "SUSE Bug 1173060", "url": "https://bugzilla.suse.com/1173060" }, { "category": "self", "summary": "SUSE Bug 1173068", "url": "https://bugzilla.suse.com/1173068" }, { "category": "self", "summary": "SUSE Bug 1173085", "url": "https://bugzilla.suse.com/1173085" }, { "category": "self", "summary": "SUSE Bug 1173139", "url": "https://bugzilla.suse.com/1173139" }, { "category": "self", "summary": "SUSE Bug 1173206", "url": "https://bugzilla.suse.com/1173206" }, { "category": "self", "summary": "SUSE Bug 1173271", "url": "https://bugzilla.suse.com/1173271" }, { "category": "self", "summary": "SUSE Bug 1173280", "url": "https://bugzilla.suse.com/1173280" }, { "category": "self", "summary": "SUSE Bug 1173428", "url": "https://bugzilla.suse.com/1173428" }, { "category": "self", "summary": "SUSE Bug 1173438", "url": "https://bugzilla.suse.com/1173438" }, { "category": "self", "summary": "SUSE Bug 1173461", "url": "https://bugzilla.suse.com/1173461" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19462 page", "url": "https://www.suse.com/security/cve/CVE-2019-19462/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20810 page", "url": "https://www.suse.com/security/cve/CVE-2019-20810/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20812 page", "url": "https://www.suse.com/security/cve/CVE-2019-20812/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10711 page", "url": "https://www.suse.com/security/cve/CVE-2020-10711/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10732 page", "url": "https://www.suse.com/security/cve/CVE-2020-10732/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10751 page", "url": "https://www.suse.com/security/cve/CVE-2020-10751/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10766 page", "url": "https://www.suse.com/security/cve/CVE-2020-10766/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10767 page", "url": "https://www.suse.com/security/cve/CVE-2020-10767/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10768 page", "url": "https://www.suse.com/security/cve/CVE-2020-10768/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10773 page", "url": "https://www.suse.com/security/cve/CVE-2020-10773/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12656 page", "url": "https://www.suse.com/security/cve/CVE-2020-12656/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12769 page", "url": "https://www.suse.com/security/cve/CVE-2020-12769/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12888 page", "url": "https://www.suse.com/security/cve/CVE-2020-12888/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-13143 page", "url": "https://www.suse.com/security/cve/CVE-2020-13143/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-13974 page", "url": "https://www.suse.com/security/cve/CVE-2020-13974/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14416 page", "url": "https://www.suse.com/security/cve/CVE-2020-14416/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-07-16T15:02:53Z", "generator": { "date": "2020-07-16T15:02:53Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2020:0935-1", "initial_release_date": "2020-07-16T15:02:53Z", "revision_history": [ { "date": "2020-07-16T15:02:53Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-5.3.18-lp152.26.2.noarch", "product": { "name": "kernel-devel-5.3.18-lp152.26.2.noarch", "product_id": "kernel-devel-5.3.18-lp152.26.2.noarch" } }, { "category": "product_version", "name": "kernel-docs-5.3.18-lp152.26.2.noarch", "product": { "name": "kernel-docs-5.3.18-lp152.26.2.noarch", "product_id": "kernel-docs-5.3.18-lp152.26.2.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-5.3.18-lp152.26.2.noarch", "product": { "name": "kernel-docs-html-5.3.18-lp152.26.2.noarch", "product_id": "kernel-docs-html-5.3.18-lp152.26.2.noarch" } }, { "category": "product_version", "name": "kernel-macros-5.3.18-lp152.26.2.noarch", "product": { "name": "kernel-macros-5.3.18-lp152.26.2.noarch", "product_id": "kernel-macros-5.3.18-lp152.26.2.noarch" } }, { "category": "product_version", "name": "kernel-source-5.3.18-lp152.26.2.noarch", "product": { "name": "kernel-source-5.3.18-lp152.26.2.noarch", "product_id": "kernel-source-5.3.18-lp152.26.2.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-5.3.18-lp152.26.2.noarch", "product": { "name": "kernel-source-vanilla-5.3.18-lp152.26.2.noarch", "product_id": "kernel-source-vanilla-5.3.18-lp152.26.2.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-5.3.18-lp152.26.2.x86_64", "product": { "name": "kernel-debug-5.3.18-lp152.26.2.x86_64", "product_id": "kernel-debug-5.3.18-lp152.26.2.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-5.3.18-lp152.26.2.x86_64", "product": { "name": "kernel-debug-devel-5.3.18-lp152.26.2.x86_64", "product_id": "kernel-debug-devel-5.3.18-lp152.26.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-5.3.18-lp152.26.2.x86_64", "product": { "name": "kernel-default-5.3.18-lp152.26.2.x86_64", "product_id": "kernel-default-5.3.18-lp152.26.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "product": { "name": "kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "product_id": "kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "product": { "name": "kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "product_id": "kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-lp152.26.2.x86_64", "product": { "name": "kernel-default-devel-5.3.18-lp152.26.2.x86_64", "product_id": "kernel-default-devel-5.3.18-lp152.26.2.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-5.3.18-lp152.26.2.x86_64", "product": { "name": "kernel-kvmsmall-5.3.18-lp152.26.2.x86_64", "product_id": "kernel-kvmsmall-5.3.18-lp152.26.2.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-5.3.18-lp152.26.2.x86_64", "product": { "name": "kernel-kvmsmall-devel-5.3.18-lp152.26.2.x86_64", "product_id": "kernel-kvmsmall-devel-5.3.18-lp152.26.2.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-lp152.26.2.x86_64", "product": { "name": "kernel-obs-build-5.3.18-lp152.26.2.x86_64", "product_id": "kernel-obs-build-5.3.18-lp152.26.2.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-lp152.26.2.x86_64", "product": { "name": "kernel-obs-qa-5.3.18-lp152.26.2.x86_64", "product_id": "kernel-obs-qa-5.3.18-lp152.26.2.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-5.3.18-lp152.26.2.x86_64", "product": { "name": "kernel-preempt-5.3.18-lp152.26.2.x86_64", "product_id": "kernel-preempt-5.3.18-lp152.26.2.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-devel-5.3.18-lp152.26.2.x86_64", "product": { "name": "kernel-preempt-devel-5.3.18-lp152.26.2.x86_64", "product_id": "kernel-preempt-devel-5.3.18-lp152.26.2.x86_64" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-lp152.26.2.x86_64", "product": { "name": "kernel-syms-5.3.18-lp152.26.2.x86_64", "product_id": "kernel-syms-5.3.18-lp152.26.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.2", "product": { "name": "openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-5.3.18-lp152.26.2.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.26.2.x86_64" }, "product_reference": "kernel-debug-5.3.18-lp152.26.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-5.3.18-lp152.26.2.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.26.2.x86_64" }, "product_reference": "kernel-debug-devel-5.3.18-lp152.26.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-lp152.26.2.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.26.2.x86_64" }, "product_reference": "kernel-default-5.3.18-lp152.26.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2.x86_64" }, "product_reference": "kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2.x86_64" }, "product_reference": "kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-lp152.26.2.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.26.2.x86_64" }, "product_reference": "kernel-default-devel-5.3.18-lp152.26.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.3.18-lp152.26.2.noarch as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.26.2.noarch" }, "product_reference": "kernel-devel-5.3.18-lp152.26.2.noarch", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-5.3.18-lp152.26.2.noarch as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.26.2.noarch" }, "product_reference": "kernel-docs-5.3.18-lp152.26.2.noarch", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-html-5.3.18-lp152.26.2.noarch as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.26.2.noarch" }, "product_reference": "kernel-docs-html-5.3.18-lp152.26.2.noarch", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-5.3.18-lp152.26.2.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.26.2.x86_64" }, "product_reference": "kernel-kvmsmall-5.3.18-lp152.26.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-devel-5.3.18-lp152.26.2.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.26.2.x86_64" }, "product_reference": "kernel-kvmsmall-devel-5.3.18-lp152.26.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.3.18-lp152.26.2.noarch as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.26.2.noarch" }, "product_reference": "kernel-macros-5.3.18-lp152.26.2.noarch", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-lp152.26.2.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.26.2.x86_64" }, "product_reference": "kernel-obs-build-5.3.18-lp152.26.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-qa-5.3.18-lp152.26.2.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.26.2.x86_64" }, "product_reference": "kernel-obs-qa-5.3.18-lp152.26.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-lp152.26.2.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.26.2.x86_64" }, "product_reference": "kernel-preempt-5.3.18-lp152.26.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-lp152.26.2.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.26.2.x86_64" }, "product_reference": "kernel-preempt-devel-5.3.18-lp152.26.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.3.18-lp152.26.2.noarch as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.26.2.noarch" }, "product_reference": "kernel-source-5.3.18-lp152.26.2.noarch", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-5.3.18-lp152.26.2.noarch as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.26.2.noarch" }, "product_reference": "kernel-source-vanilla-5.3.18-lp152.26.2.noarch", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-lp152.26.2.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.26.2.x86_64" }, "product_reference": "kernel-syms-5.3.18-lp152.26.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-19462", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19462" } ], "notes": [ { "category": "general", "text": "relay_open in kernel/relay.c in the Linux kernel through 5.4.1 allows local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.26.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19462", "url": "https://www.suse.com/security/cve/CVE-2019-19462" }, { "category": "external", "summary": "SUSE Bug 1158265 for CVE-2019-19462", "url": "https://bugzilla.suse.com/1158265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.26.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.26.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-07-16T15:02:53Z", "details": "low" } ], "title": "CVE-2019-19462" }, { "cve": "CVE-2019-20810", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20810" } ], "notes": [ { "category": "general", "text": "go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel before 5.6 does not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.26.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20810", "url": "https://www.suse.com/security/cve/CVE-2019-20810" }, { "category": "external", "summary": "SUSE Bug 1172458 for CVE-2019-20810", "url": "https://bugzilla.suse.com/1172458" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.26.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.26.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-07-16T15:02:53Z", "details": "low" } ], "title": "CVE-2019-20810" }, { "cve": "CVE-2019-20812", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20812" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.4.7. The prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.26.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20812", "url": "https://www.suse.com/security/cve/CVE-2019-20812" }, { "category": "external", "summary": "SUSE Bug 1172453 for CVE-2019-20812", "url": "https://bugzilla.suse.com/1172453" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.26.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.26.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-07-16T15:02:53Z", "details": "moderate" } ], "title": "CVE-2019-20812" }, { "cve": "CVE-2020-10711", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10711" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s SELinux subsystem in versions before 5.7. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol\u0027s category bitmap into the SELinux extensible bitmap via the\u0027 ebitmap_netlbl_import\u0027 routine. While processing the CIPSO restricted bitmap tag in the \u0027cipso_v4_parsetag_rbm\u0027 routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allows a remote network user to crash the system kernel, resulting in a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.26.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10711", "url": "https://www.suse.com/security/cve/CVE-2020-10711" }, { "category": "external", "summary": "SUSE Bug 1171191 for CVE-2020-10711", "url": "https://bugzilla.suse.com/1171191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.26.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.26.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-07-16T15:02:53Z", "details": "moderate" } ], "title": "CVE-2020-10711" }, { "cve": "CVE-2020-10732", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10732" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.26.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10732", "url": "https://www.suse.com/security/cve/CVE-2020-10732" }, { "category": "external", "summary": "SUSE Bug 1171220 for CVE-2020-10732", "url": "https://bugzilla.suse.com/1171220" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.26.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.26.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-07-16T15:02:53Z", "details": "low" } ], "title": "CVE-2020-10732" }, { "cve": "CVE-2020-10751", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10751" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.26.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10751", "url": "https://www.suse.com/security/cve/CVE-2020-10751" }, { "category": "external", "summary": "SUSE Bug 1171189 for CVE-2020-10751", "url": "https://bugzilla.suse.com/1171189" }, { "category": "external", "summary": "SUSE Bug 1174963 for CVE-2020-10751", "url": "https://bugzilla.suse.com/1174963" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.26.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.26.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-07-16T15:02:53Z", "details": "moderate" } ], "title": "CVE-2020-10751" }, { "cve": "CVE-2020-10766", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10766" } ], "notes": [ { "category": "general", "text": "A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.26.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10766", "url": "https://www.suse.com/security/cve/CVE-2020-10766" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172781 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1172781" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.26.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.26.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-07-16T15:02:53Z", "details": "moderate" } ], "title": "CVE-2020-10766" }, { "cve": "CVE-2020-10767", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10767" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.26.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10767", "url": "https://www.suse.com/security/cve/CVE-2020-10767" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172782 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1172782" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.26.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.26.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-07-16T15:02:53Z", "details": "moderate" } ], "title": "CVE-2020-10767" }, { "cve": "CVE-2020-10768", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10768" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.26.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10768", "url": "https://www.suse.com/security/cve/CVE-2020-10768" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172783 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1172783" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.26.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.26.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-07-16T15:02:53Z", "details": "moderate" } ], "title": "CVE-2020-10768" }, { "cve": "CVE-2020-10773", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10773" } ], "notes": [ { "category": "general", "text": "A stack information leak flaw was found in s390/s390x in the Linux kernel\u0027s memory manager functionality, where it incorrectly writes to the /proc/sys/vm/cmm_timeout file. This flaw allows a local user to see the kernel data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.26.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10773", "url": "https://www.suse.com/security/cve/CVE-2020-10773" }, { "category": "external", "summary": "SUSE Bug 1172999 for CVE-2020-10773", "url": "https://bugzilla.suse.com/1172999" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.26.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.26.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-07-16T15:02:53Z", "details": "low" } ], "title": "CVE-2020-10773" }, { "cve": "CVE-2020-12656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12656" } ], "notes": [ { "category": "general", "text": "gss_mech_free in net/sunrpc/auth_gss/gss_mech_switch.c in the rpcsec_gss_krb5 implementation in the Linux kernel through 5.6.10 lacks certain domain_release calls, leading to a memory leak. Note: This was disputed with the assertion that the issue does not grant any access not already available. It is a problem that on unloading a specific kernel module some memory is leaked, but loading kernel modules is a privileged operation. A user could also write a kernel module to consume any amount of memory they like and load that replicating the effect of this bug", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.26.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12656", "url": "https://www.suse.com/security/cve/CVE-2020-12656" }, { "category": "external", "summary": "SUSE Bug 1171219 for CVE-2020-12656", "url": "https://bugzilla.suse.com/1171219" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.26.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.26.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-07-16T15:02:53Z", "details": "low" } ], "title": "CVE-2020-12656" }, { "cve": "CVE-2020-12769", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12769" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.4.17. drivers/spi/spi-dw.c allows attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one, aka CID-19b61392c5a8.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.26.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12769", "url": "https://www.suse.com/security/cve/CVE-2020-12769" }, { "category": "external", "summary": "SUSE Bug 1171983 for CVE-2020-12769", "url": "https://bugzilla.suse.com/1171983" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.26.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.26.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-07-16T15:02:53Z", "details": "moderate" } ], "title": "CVE-2020-12769" }, { "cve": "CVE-2020-12888", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12888" } ], "notes": [ { "category": "general", "text": "The VFIO PCI driver in the Linux kernel through 5.6.13 mishandles attempts to access disabled memory space.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.26.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12888", "url": "https://www.suse.com/security/cve/CVE-2020-12888" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1171868 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1171868" }, { "category": "external", "summary": "SUSE Bug 1176979 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1176979" }, { "category": "external", "summary": "SUSE Bug 1179612 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1179612" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.26.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.26.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-07-16T15:02:53Z", "details": "moderate" } ], "title": "CVE-2020-12888" }, { "cve": "CVE-2020-13143", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-13143" } ], "notes": [ { "category": "general", "text": "gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c in the Linux kernel 3.16 through 5.6.13 relies on kstrdup without considering the possibility of an internal \u0027\\0\u0027 value, which allows attackers to trigger an out-of-bounds read, aka CID-15753588bcd4.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.26.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-13143", "url": "https://www.suse.com/security/cve/CVE-2020-13143" }, { "category": "external", "summary": "SUSE Bug 1171982 for CVE-2020-13143", "url": "https://bugzilla.suse.com/1171982" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.26.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.26.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-07-16T15:02:53Z", "details": "moderate" } ], "title": "CVE-2020-13143" }, { "cve": "CVE-2020-13974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-13974" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel 4.4 through 5.7.1. drivers/tty/vt/keyboard.c has an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. NOTE: Members in the community argue that the integer overflow does not lead to a security issue in this case.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.26.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-13974", "url": "https://www.suse.com/security/cve/CVE-2020-13974" }, { "category": "external", "summary": "SUSE Bug 1172775 for CVE-2020-13974", "url": "https://bugzilla.suse.com/1172775" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.26.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.26.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-07-16T15:02:53Z", "details": "moderate" } ], "title": "CVE-2020-13974" }, { "cve": "CVE-2020-14416", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14416" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.4.16, a race condition in tty-\u003edisc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.26.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14416", "url": "https://www.suse.com/security/cve/CVE-2020-14416" }, { "category": "external", "summary": "SUSE Bug 1162002 for CVE-2020-14416", "url": "https://bugzilla.suse.com/1162002" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.26.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.26.2.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.26.2.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.26.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-07-16T15:02:53Z", "details": "moderate" } ], "title": "CVE-2020-14416" } ] }
opensuse-su-2021:0242-1
Vulnerability from csaf_opensuse
Published
2021-02-05 15:16
Modified
2021-02-05 15:16
Summary
Security update for RT kernel
Notes
Title of the patch
Security update for RT kernel
Description of the patch
This update syncs the RT kernel from the SUSE Linux Enterprise 15-SP2 codestream.
This update was imported from the SUSE:SLE-15-SP2:Update update project.
Patchnames
openSUSE-2021-242
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for RT kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThis update syncs the RT kernel from the SUSE Linux Enterprise 15-SP2 codestream.\n \nThis update was imported from the SUSE:SLE-15-SP2:Update update project.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2021-242", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_0242-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2021:0242-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2021:0242-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/" }, { "category": "self", "summary": "SUSE Bug 1034995", "url": "https://bugzilla.suse.com/1034995" }, { "category": "self", "summary": "SUSE Bug 1040855", "url": "https://bugzilla.suse.com/1040855" }, { "category": "self", "summary": "SUSE Bug 1043347", "url": "https://bugzilla.suse.com/1043347" }, { "category": "self", "summary": "SUSE Bug 1044120", "url": "https://bugzilla.suse.com/1044120" }, { "category": "self", "summary": "SUSE Bug 1044767", "url": "https://bugzilla.suse.com/1044767" }, { "category": "self", "summary": "SUSE Bug 1055014", "url": "https://bugzilla.suse.com/1055014" }, { "category": "self", "summary": "SUSE Bug 1055117", "url": "https://bugzilla.suse.com/1055117" }, { "category": "self", "summary": "SUSE Bug 1055186", "url": "https://bugzilla.suse.com/1055186" }, { "category": "self", "summary": "SUSE Bug 1058115", "url": "https://bugzilla.suse.com/1058115" }, { "category": "self", "summary": "SUSE Bug 1061843", "url": "https://bugzilla.suse.com/1061843" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1066382", "url": "https://bugzilla.suse.com/1066382" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1077428", "url": "https://bugzilla.suse.com/1077428" }, { "category": "self", "summary": "SUSE Bug 1085030", "url": "https://bugzilla.suse.com/1085030" }, { "category": "self", "summary": "SUSE Bug 1094244", "url": "https://bugzilla.suse.com/1094244" }, { "category": "self", "summary": "SUSE Bug 1094840", "url": "https://bugzilla.suse.com/1094840" }, { "category": "self", "summary": "SUSE Bug 1109695", "url": "https://bugzilla.suse.com/1109695" }, { "category": "self", "summary": "SUSE Bug 1115431", "url": "https://bugzilla.suse.com/1115431" }, { "category": "self", "summary": "SUSE Bug 1120163", "url": "https://bugzilla.suse.com/1120163" }, { "category": "self", "summary": "SUSE Bug 1129923", "url": "https://bugzilla.suse.com/1129923" }, { "category": "self", "summary": "SUSE Bug 1133021", "url": "https://bugzilla.suse.com/1133021" }, { "category": "self", "summary": "SUSE Bug 1134760", "url": "https://bugzilla.suse.com/1134760" }, { "category": "self", "summary": "SUSE Bug 1136666", "url": "https://bugzilla.suse.com/1136666" }, { "category": "self", "summary": "SUSE Bug 1138374", "url": "https://bugzilla.suse.com/1138374" }, { "category": "self", "summary": "SUSE Bug 1139944", "url": "https://bugzilla.suse.com/1139944" }, { "category": "self", "summary": "SUSE Bug 1148868", "url": "https://bugzilla.suse.com/1148868" }, { "category": "self", "summary": "SUSE Bug 1149032", "url": "https://bugzilla.suse.com/1149032" }, { "category": "self", "summary": "SUSE Bug 1152148", "url": "https://bugzilla.suse.com/1152148" }, { "category": "self", "summary": "SUSE Bug 1152457", "url": "https://bugzilla.suse.com/1152457" }, { "category": "self", "summary": "SUSE Bug 1152472", "url": "https://bugzilla.suse.com/1152472" }, { "category": "self", "summary": "SUSE Bug 1152489", "url": "https://bugzilla.suse.com/1152489" }, { "category": "self", "summary": "SUSE Bug 1153274", "url": "https://bugzilla.suse.com/1153274" }, { "category": "self", "summary": "SUSE Bug 1154353", "url": "https://bugzilla.suse.com/1154353" }, { "category": "self", "summary": "SUSE Bug 1154488", "url": "https://bugzilla.suse.com/1154488" }, { "category": "self", "summary": "SUSE Bug 1154492", "url": "https://bugzilla.suse.com/1154492" }, { "category": "self", "summary": "SUSE Bug 1154824", "url": "https://bugzilla.suse.com/1154824" }, { "category": "self", "summary": "SUSE Bug 1155518", "url": "https://bugzilla.suse.com/1155518" }, { "category": "self", "summary": "SUSE Bug 1155798", "url": "https://bugzilla.suse.com/1155798" }, { "category": "self", "summary": "SUSE Bug 1156315", "url": "https://bugzilla.suse.com/1156315" }, { "category": "self", "summary": "SUSE Bug 1156395", "url": "https://bugzilla.suse.com/1156395" }, { "category": "self", "summary": "SUSE Bug 1157169", "url": "https://bugzilla.suse.com/1157169" }, { "category": "self", "summary": "SUSE Bug 1158050", "url": "https://bugzilla.suse.com/1158050" }, { "category": "self", "summary": "SUSE Bug 1158242", "url": "https://bugzilla.suse.com/1158242" }, { "category": "self", "summary": "SUSE Bug 1158265", "url": "https://bugzilla.suse.com/1158265" }, { "category": "self", "summary": "SUSE Bug 1158748", "url": "https://bugzilla.suse.com/1158748" }, { "category": "self", "summary": "SUSE Bug 1158765", "url": "https://bugzilla.suse.com/1158765" }, { "category": "self", "summary": "SUSE Bug 1158775", "url": "https://bugzilla.suse.com/1158775" }, { "category": "self", "summary": "SUSE Bug 1158983", "url": "https://bugzilla.suse.com/1158983" }, { "category": "self", "summary": "SUSE Bug 1159058", "url": "https://bugzilla.suse.com/1159058" }, { "category": "self", "summary": "SUSE Bug 1159781", "url": "https://bugzilla.suse.com/1159781" }, { "category": "self", "summary": "SUSE Bug 1159867", "url": "https://bugzilla.suse.com/1159867" }, { "category": "self", "summary": "SUSE Bug 1159886", "url": "https://bugzilla.suse.com/1159886" }, { "category": "self", "summary": "SUSE Bug 1160388", "url": "https://bugzilla.suse.com/1160388" }, { "category": "self", "summary": "SUSE Bug 1160634", "url": "https://bugzilla.suse.com/1160634" }, { "category": "self", "summary": "SUSE Bug 1160947", "url": "https://bugzilla.suse.com/1160947" }, { "category": "self", "summary": "SUSE Bug 1161099", "url": "https://bugzilla.suse.com/1161099" }, { "category": "self", "summary": "SUSE Bug 1161495", "url": "https://bugzilla.suse.com/1161495" }, { "category": "self", "summary": "SUSE Bug 1162002", "url": "https://bugzilla.suse.com/1162002" }, { "category": "self", "summary": "SUSE Bug 1162063", "url": "https://bugzilla.suse.com/1162063" }, { "category": "self", "summary": "SUSE Bug 1162209", "url": "https://bugzilla.suse.com/1162209" }, { "category": "self", "summary": "SUSE Bug 1162400", "url": "https://bugzilla.suse.com/1162400" }, { "category": "self", "summary": "SUSE Bug 1162702", "url": "https://bugzilla.suse.com/1162702" }, { "category": "self", "summary": "SUSE Bug 1163592", "url": "https://bugzilla.suse.com/1163592" }, { "category": "self", "summary": "SUSE Bug 1163727", "url": "https://bugzilla.suse.com/1163727" }, { "category": "self", "summary": "SUSE Bug 1164648", "url": "https://bugzilla.suse.com/1164648" }, { "category": "self", "summary": "SUSE Bug 1164777", "url": "https://bugzilla.suse.com/1164777" }, { "category": "self", "summary": "SUSE Bug 1164780", "url": "https://bugzilla.suse.com/1164780" }, { "category": "self", "summary": "SUSE Bug 1165211", "url": "https://bugzilla.suse.com/1165211" }, { "category": "self", "summary": "SUSE Bug 1165455", "url": "https://bugzilla.suse.com/1165455" }, { "category": "self", "summary": "SUSE Bug 1165629", "url": "https://bugzilla.suse.com/1165629" }, { "category": "self", "summary": "SUSE Bug 1165692", "url": "https://bugzilla.suse.com/1165692" }, { "category": "self", "summary": "SUSE Bug 1165933", "url": "https://bugzilla.suse.com/1165933" }, { "category": "self", "summary": "SUSE Bug 1165975", "url": "https://bugzilla.suse.com/1165975" }, { "category": "self", "summary": "SUSE Bug 1166146", "url": "https://bugzilla.suse.com/1166146" }, { "category": "self", "summary": "SUSE Bug 1166166", "url": "https://bugzilla.suse.com/1166166" }, { "category": "self", "summary": "SUSE Bug 1166340", "url": "https://bugzilla.suse.com/1166340" }, { "category": "self", "summary": "SUSE Bug 1166965", "url": "https://bugzilla.suse.com/1166965" }, { "category": "self", "summary": "SUSE Bug 1166985", "url": "https://bugzilla.suse.com/1166985" }, { "category": "self", "summary": "SUSE Bug 1167030", "url": "https://bugzilla.suse.com/1167030" }, { "category": "self", "summary": "SUSE Bug 1167104", "url": "https://bugzilla.suse.com/1167104" }, { "category": "self", "summary": "SUSE Bug 1167527", "url": "https://bugzilla.suse.com/1167527" }, { "category": "self", "summary": "SUSE Bug 1167651", "url": "https://bugzilla.suse.com/1167651" }, { "category": "self", "summary": "SUSE Bug 1167657", "url": "https://bugzilla.suse.com/1167657" }, { "category": "self", "summary": "SUSE Bug 1167773", "url": "https://bugzilla.suse.com/1167773" }, { "category": "self", "summary": "SUSE Bug 1167851", "url": "https://bugzilla.suse.com/1167851" }, { "category": "self", "summary": "SUSE Bug 1168230", "url": "https://bugzilla.suse.com/1168230" }, { "category": "self", "summary": "SUSE Bug 1168461", "url": "https://bugzilla.suse.com/1168461" }, { "category": "self", "summary": "SUSE Bug 1168468", "url": "https://bugzilla.suse.com/1168468" }, { "category": "self", "summary": "SUSE Bug 1168779", "url": "https://bugzilla.suse.com/1168779" }, { "category": "self", "summary": "SUSE Bug 1168838", "url": "https://bugzilla.suse.com/1168838" }, { "category": "self", "summary": "SUSE Bug 1168952", "url": "https://bugzilla.suse.com/1168952" }, { "category": "self", "summary": "SUSE Bug 1168959", "url": "https://bugzilla.suse.com/1168959" }, { "category": "self", "summary": "SUSE Bug 1169021", "url": "https://bugzilla.suse.com/1169021" }, { "category": "self", "summary": "SUSE Bug 1169094", "url": "https://bugzilla.suse.com/1169094" }, { "category": "self", "summary": "SUSE Bug 1169194", "url": "https://bugzilla.suse.com/1169194" }, { "category": "self", "summary": "SUSE Bug 1169263", "url": "https://bugzilla.suse.com/1169263" }, { "category": "self", "summary": "SUSE Bug 1169514", "url": "https://bugzilla.suse.com/1169514" }, { "category": "self", "summary": "SUSE Bug 1169681", "url": "https://bugzilla.suse.com/1169681" }, { "category": "self", "summary": "SUSE Bug 1169763", "url": "https://bugzilla.suse.com/1169763" }, { "category": "self", "summary": "SUSE Bug 1169771", "url": "https://bugzilla.suse.com/1169771" }, { "category": "self", "summary": "SUSE Bug 1169790", "url": "https://bugzilla.suse.com/1169790" }, { "category": "self", "summary": "SUSE Bug 1169795", "url": "https://bugzilla.suse.com/1169795" }, { "category": "self", "summary": "SUSE Bug 1170011", "url": "https://bugzilla.suse.com/1170011" }, { "category": "self", "summary": "SUSE Bug 1170139", "url": "https://bugzilla.suse.com/1170139" }, { "category": "self", "summary": "SUSE Bug 1170232", "url": "https://bugzilla.suse.com/1170232" }, { "category": "self", "summary": "SUSE Bug 1170284", "url": "https://bugzilla.suse.com/1170284" }, { "category": "self", "summary": "SUSE Bug 1170415", "url": "https://bugzilla.suse.com/1170415" }, { "category": "self", "summary": "SUSE Bug 1170442", "url": "https://bugzilla.suse.com/1170442" }, { "category": "self", "summary": "SUSE Bug 1170617", "url": "https://bugzilla.suse.com/1170617" }, { "category": "self", "summary": "SUSE Bug 1170621", "url": "https://bugzilla.suse.com/1170621" }, { "category": "self", "summary": "SUSE Bug 1170774", "url": "https://bugzilla.suse.com/1170774" }, { "category": "self", "summary": "SUSE Bug 1170879", "url": "https://bugzilla.suse.com/1170879" }, { "category": "self", "summary": "SUSE Bug 1170891", "url": "https://bugzilla.suse.com/1170891" }, { "category": "self", "summary": "SUSE Bug 1170895", "url": "https://bugzilla.suse.com/1170895" }, { "category": "self", "summary": "SUSE Bug 1171000", "url": "https://bugzilla.suse.com/1171000" }, { "category": "self", "summary": "SUSE Bug 1171068", "url": "https://bugzilla.suse.com/1171068" }, { "category": "self", "summary": "SUSE Bug 1171073", "url": "https://bugzilla.suse.com/1171073" }, { "category": "self", "summary": "SUSE Bug 1171078", "url": "https://bugzilla.suse.com/1171078" }, { "category": "self", "summary": "SUSE Bug 1171117", "url": "https://bugzilla.suse.com/1171117" }, { "category": "self", "summary": "SUSE Bug 1171150", "url": "https://bugzilla.suse.com/1171150" }, { "category": "self", "summary": "SUSE Bug 1171156", "url": "https://bugzilla.suse.com/1171156" }, { "category": "self", "summary": "SUSE Bug 1171189", "url": "https://bugzilla.suse.com/1171189" }, { "category": "self", "summary": "SUSE Bug 1171191", "url": "https://bugzilla.suse.com/1171191" }, { "category": "self", "summary": "SUSE Bug 1171218", "url": "https://bugzilla.suse.com/1171218" }, { "category": "self", "summary": "SUSE Bug 1171219", "url": "https://bugzilla.suse.com/1171219" }, { "category": "self", "summary": "SUSE Bug 1171220", "url": "https://bugzilla.suse.com/1171220" }, { "category": "self", "summary": "SUSE Bug 1171236", "url": "https://bugzilla.suse.com/1171236" }, { "category": "self", "summary": "SUSE Bug 1171242", "url": "https://bugzilla.suse.com/1171242" }, { "category": "self", "summary": "SUSE Bug 1171246", "url": "https://bugzilla.suse.com/1171246" }, { "category": "self", "summary": "SUSE Bug 1171285", "url": "https://bugzilla.suse.com/1171285" }, { "category": "self", "summary": "SUSE Bug 1171293", "url": "https://bugzilla.suse.com/1171293" }, { "category": "self", "summary": "SUSE Bug 1171374", "url": "https://bugzilla.suse.com/1171374" }, { "category": "self", "summary": "SUSE Bug 1171390", "url": "https://bugzilla.suse.com/1171390" }, { "category": "self", "summary": "SUSE Bug 1171391", "url": "https://bugzilla.suse.com/1171391" }, { "category": "self", "summary": "SUSE Bug 1171392", "url": "https://bugzilla.suse.com/1171392" }, { "category": "self", "summary": "SUSE Bug 1171417", "url": "https://bugzilla.suse.com/1171417" }, { "category": "self", "summary": "SUSE Bug 1171426", "url": "https://bugzilla.suse.com/1171426" }, { "category": "self", "summary": "SUSE Bug 1171507", "url": "https://bugzilla.suse.com/1171507" }, { "category": "self", "summary": "SUSE Bug 1171513", "url": "https://bugzilla.suse.com/1171513" }, { "category": "self", "summary": "SUSE Bug 1171514", "url": "https://bugzilla.suse.com/1171514" }, { "category": "self", "summary": "SUSE Bug 1171529", "url": "https://bugzilla.suse.com/1171529" }, { "category": "self", "summary": "SUSE Bug 1171530", "url": "https://bugzilla.suse.com/1171530" }, { "category": "self", "summary": "SUSE Bug 1171558", "url": "https://bugzilla.suse.com/1171558" }, { "category": "self", "summary": "SUSE Bug 1171634", "url": "https://bugzilla.suse.com/1171634" }, { "category": "self", "summary": "SUSE Bug 1171644", "url": "https://bugzilla.suse.com/1171644" }, { "category": "self", "summary": "SUSE Bug 1171662", "url": "https://bugzilla.suse.com/1171662" }, { "category": "self", "summary": "SUSE Bug 1171675", "url": "https://bugzilla.suse.com/1171675" }, { "category": "self", "summary": "SUSE Bug 1171688", "url": "https://bugzilla.suse.com/1171688" }, { "category": "self", "summary": "SUSE Bug 1171699", "url": "https://bugzilla.suse.com/1171699" }, { "category": "self", "summary": "SUSE Bug 1171709", "url": "https://bugzilla.suse.com/1171709" }, { "category": "self", "summary": "SUSE Bug 1171730", "url": "https://bugzilla.suse.com/1171730" }, { "category": "self", "summary": "SUSE Bug 1171732", "url": "https://bugzilla.suse.com/1171732" }, { "category": "self", "summary": "SUSE Bug 1171736", "url": "https://bugzilla.suse.com/1171736" }, { "category": "self", "summary": "SUSE Bug 1171739", "url": "https://bugzilla.suse.com/1171739" }, { "category": "self", "summary": "SUSE Bug 1171742", "url": "https://bugzilla.suse.com/1171742" }, { "category": "self", "summary": "SUSE Bug 1171743", "url": "https://bugzilla.suse.com/1171743" }, { "category": "self", "summary": "SUSE Bug 1171759", "url": "https://bugzilla.suse.com/1171759" }, { "category": "self", "summary": "SUSE Bug 1171773", "url": "https://bugzilla.suse.com/1171773" }, { "category": "self", "summary": "SUSE Bug 1171774", "url": "https://bugzilla.suse.com/1171774" }, { "category": "self", "summary": "SUSE Bug 1171775", "url": "https://bugzilla.suse.com/1171775" }, { "category": "self", "summary": "SUSE Bug 1171776", "url": "https://bugzilla.suse.com/1171776" }, { "category": "self", "summary": "SUSE Bug 1171777", "url": "https://bugzilla.suse.com/1171777" }, { "category": "self", "summary": "SUSE Bug 1171778", "url": "https://bugzilla.suse.com/1171778" }, { "category": "self", "summary": "SUSE Bug 1171779", "url": "https://bugzilla.suse.com/1171779" }, { "category": "self", "summary": "SUSE Bug 1171780", "url": "https://bugzilla.suse.com/1171780" }, { "category": "self", "summary": "SUSE Bug 1171781", "url": "https://bugzilla.suse.com/1171781" }, { "category": "self", "summary": "SUSE Bug 1171782", "url": "https://bugzilla.suse.com/1171782" }, { "category": "self", "summary": "SUSE Bug 1171783", "url": "https://bugzilla.suse.com/1171783" }, { "category": "self", "summary": "SUSE Bug 1171784", "url": "https://bugzilla.suse.com/1171784" }, { "category": "self", "summary": "SUSE Bug 1171785", "url": "https://bugzilla.suse.com/1171785" }, { "category": "self", "summary": "SUSE Bug 1171786", "url": "https://bugzilla.suse.com/1171786" }, { "category": "self", "summary": "SUSE Bug 1171787", "url": "https://bugzilla.suse.com/1171787" }, { "category": "self", "summary": "SUSE Bug 1171788", "url": "https://bugzilla.suse.com/1171788" }, { "category": "self", "summary": "SUSE Bug 1171789", "url": "https://bugzilla.suse.com/1171789" }, { "category": "self", "summary": "SUSE Bug 1171790", "url": "https://bugzilla.suse.com/1171790" }, { "category": "self", "summary": "SUSE Bug 1171791", "url": "https://bugzilla.suse.com/1171791" }, { "category": "self", "summary": "SUSE Bug 1171792", "url": "https://bugzilla.suse.com/1171792" }, { "category": "self", "summary": "SUSE Bug 1171793", "url": "https://bugzilla.suse.com/1171793" }, { "category": "self", "summary": "SUSE Bug 1171794", "url": "https://bugzilla.suse.com/1171794" }, { "category": "self", "summary": "SUSE Bug 1171795", "url": "https://bugzilla.suse.com/1171795" }, { "category": "self", "summary": "SUSE Bug 1171796", "url": "https://bugzilla.suse.com/1171796" }, { "category": "self", "summary": "SUSE Bug 1171797", "url": "https://bugzilla.suse.com/1171797" }, { "category": "self", "summary": "SUSE Bug 1171798", "url": "https://bugzilla.suse.com/1171798" }, { "category": "self", "summary": "SUSE Bug 1171799", "url": "https://bugzilla.suse.com/1171799" }, { "category": "self", "summary": "SUSE Bug 1171810", "url": "https://bugzilla.suse.com/1171810" }, { "category": "self", "summary": "SUSE Bug 1171827", "url": "https://bugzilla.suse.com/1171827" }, { "category": "self", "summary": "SUSE Bug 1171828", "url": "https://bugzilla.suse.com/1171828" }, { "category": "self", "summary": "SUSE Bug 1171832", "url": "https://bugzilla.suse.com/1171832" }, { "category": "self", "summary": "SUSE Bug 1171833", "url": "https://bugzilla.suse.com/1171833" }, { "category": "self", "summary": "SUSE Bug 1171834", "url": "https://bugzilla.suse.com/1171834" }, { "category": "self", "summary": "SUSE Bug 1171835", "url": "https://bugzilla.suse.com/1171835" }, { "category": "self", "summary": "SUSE Bug 1171839", "url": "https://bugzilla.suse.com/1171839" }, { "category": "self", "summary": "SUSE Bug 1171840", "url": "https://bugzilla.suse.com/1171840" }, { "category": "self", "summary": "SUSE Bug 1171841", "url": "https://bugzilla.suse.com/1171841" }, { "category": "self", "summary": "SUSE Bug 1171842", "url": "https://bugzilla.suse.com/1171842" }, { "category": "self", "summary": "SUSE Bug 1171843", "url": "https://bugzilla.suse.com/1171843" }, { "category": "self", "summary": "SUSE Bug 1171844", "url": "https://bugzilla.suse.com/1171844" }, { "category": "self", "summary": "SUSE Bug 1171849", "url": "https://bugzilla.suse.com/1171849" }, { "category": "self", "summary": "SUSE Bug 1171857", "url": "https://bugzilla.suse.com/1171857" }, { "category": "self", "summary": "SUSE Bug 1171868", "url": "https://bugzilla.suse.com/1171868" }, { "category": "self", "summary": "SUSE Bug 1171904", "url": "https://bugzilla.suse.com/1171904" }, { "category": "self", "summary": "SUSE Bug 1171915", "url": "https://bugzilla.suse.com/1171915" }, { "category": "self", "summary": "SUSE Bug 1171982", "url": "https://bugzilla.suse.com/1171982" }, { "category": "self", "summary": "SUSE Bug 1171983", "url": "https://bugzilla.suse.com/1171983" }, { "category": "self", "summary": "SUSE Bug 1171988", "url": "https://bugzilla.suse.com/1171988" }, { "category": "self", "summary": "SUSE Bug 1172017", "url": "https://bugzilla.suse.com/1172017" }, { "category": "self", "summary": "SUSE Bug 1172046", "url": "https://bugzilla.suse.com/1172046" }, { "category": "self", "summary": "SUSE Bug 1172061", "url": "https://bugzilla.suse.com/1172061" }, { "category": "self", "summary": "SUSE Bug 1172062", "url": "https://bugzilla.suse.com/1172062" }, { "category": "self", "summary": "SUSE Bug 1172063", "url": "https://bugzilla.suse.com/1172063" }, { "category": "self", "summary": "SUSE Bug 1172064", "url": "https://bugzilla.suse.com/1172064" }, { "category": "self", "summary": "SUSE Bug 1172065", "url": "https://bugzilla.suse.com/1172065" }, { "category": "self", "summary": "SUSE Bug 1172066", "url": "https://bugzilla.suse.com/1172066" }, { "category": "self", "summary": "SUSE Bug 1172067", "url": "https://bugzilla.suse.com/1172067" }, { "category": "self", "summary": "SUSE Bug 1172068", "url": "https://bugzilla.suse.com/1172068" }, { "category": "self", "summary": "SUSE Bug 1172069", "url": "https://bugzilla.suse.com/1172069" }, { "category": "self", "summary": "SUSE Bug 1172073", "url": "https://bugzilla.suse.com/1172073" }, { "category": "self", "summary": "SUSE Bug 1172086", "url": "https://bugzilla.suse.com/1172086" }, { "category": "self", "summary": "SUSE Bug 1172095", "url": "https://bugzilla.suse.com/1172095" }, { "category": "self", "summary": "SUSE Bug 1172108", "url": "https://bugzilla.suse.com/1172108" }, { "category": "self", "summary": "SUSE Bug 1172145", "url": "https://bugzilla.suse.com/1172145" }, { "category": "self", "summary": "SUSE Bug 1172169", "url": "https://bugzilla.suse.com/1172169" }, { "category": "self", "summary": "SUSE Bug 1172170", "url": "https://bugzilla.suse.com/1172170" }, { "category": "self", "summary": "SUSE Bug 1172197", "url": "https://bugzilla.suse.com/1172197" }, { "category": "self", "summary": "SUSE Bug 1172201", "url": "https://bugzilla.suse.com/1172201" }, { "category": "self", "summary": "SUSE Bug 1172208", "url": "https://bugzilla.suse.com/1172208" }, { "category": "self", "summary": "SUSE Bug 1172223", "url": "https://bugzilla.suse.com/1172223" }, { "category": "self", "summary": "SUSE Bug 1172247", "url": "https://bugzilla.suse.com/1172247" }, { "category": "self", "summary": "SUSE Bug 1172317", "url": "https://bugzilla.suse.com/1172317" }, { "category": "self", "summary": "SUSE Bug 1172342", "url": "https://bugzilla.suse.com/1172342" }, { "category": "self", "summary": "SUSE Bug 1172343", "url": "https://bugzilla.suse.com/1172343" }, { "category": "self", "summary": "SUSE Bug 1172344", "url": "https://bugzilla.suse.com/1172344" }, { "category": "self", "summary": "SUSE Bug 1172365", "url": "https://bugzilla.suse.com/1172365" }, { "category": "self", "summary": "SUSE Bug 1172366", "url": "https://bugzilla.suse.com/1172366" }, { "category": "self", "summary": "SUSE Bug 1172374", "url": "https://bugzilla.suse.com/1172374" }, { "category": "self", "summary": "SUSE Bug 1172391", "url": "https://bugzilla.suse.com/1172391" }, { "category": "self", "summary": "SUSE Bug 1172393", "url": "https://bugzilla.suse.com/1172393" }, { "category": "self", "summary": "SUSE Bug 1172394", "url": "https://bugzilla.suse.com/1172394" }, { "category": "self", "summary": "SUSE Bug 1172418", "url": "https://bugzilla.suse.com/1172418" }, { "category": "self", "summary": "SUSE Bug 1172419", "url": "https://bugzilla.suse.com/1172419" }, { "category": "self", "summary": "SUSE Bug 1172453", "url": "https://bugzilla.suse.com/1172453" }, { "category": "self", "summary": "SUSE Bug 1172458", "url": "https://bugzilla.suse.com/1172458" }, { "category": "self", "summary": "SUSE Bug 1172467", "url": "https://bugzilla.suse.com/1172467" }, { "category": "self", "summary": "SUSE Bug 1172484", "url": "https://bugzilla.suse.com/1172484" }, { "category": "self", "summary": "SUSE Bug 1172537", "url": "https://bugzilla.suse.com/1172537" }, { "category": "self", "summary": "SUSE Bug 1172543", "url": "https://bugzilla.suse.com/1172543" }, { "category": "self", "summary": "SUSE Bug 1172687", "url": "https://bugzilla.suse.com/1172687" }, { "category": "self", "summary": "SUSE Bug 1172719", "url": "https://bugzilla.suse.com/1172719" }, { "category": "self", "summary": "SUSE Bug 1172733", "url": "https://bugzilla.suse.com/1172733" }, { "category": "self", "summary": "SUSE Bug 1172739", "url": "https://bugzilla.suse.com/1172739" }, { "category": "self", "summary": "SUSE Bug 1172751", "url": "https://bugzilla.suse.com/1172751" }, { "category": "self", "summary": "SUSE Bug 1172757", "url": "https://bugzilla.suse.com/1172757" }, { "category": "self", "summary": "SUSE Bug 1172759", "url": "https://bugzilla.suse.com/1172759" }, { "category": "self", "summary": "SUSE Bug 1172775", "url": "https://bugzilla.suse.com/1172775" }, { "category": "self", "summary": "SUSE Bug 1172781", "url": "https://bugzilla.suse.com/1172781" }, { "category": "self", "summary": "SUSE Bug 1172782", "url": "https://bugzilla.suse.com/1172782" }, { "category": "self", "summary": "SUSE Bug 1172783", "url": "https://bugzilla.suse.com/1172783" }, { "category": "self", "summary": "SUSE Bug 1172814", "url": "https://bugzilla.suse.com/1172814" }, { "category": "self", "summary": "SUSE Bug 1172823", "url": "https://bugzilla.suse.com/1172823" }, { "category": "self", "summary": "SUSE Bug 1172841", "url": "https://bugzilla.suse.com/1172841" }, { "category": "self", "summary": "SUSE Bug 1172871", "url": "https://bugzilla.suse.com/1172871" }, { "category": "self", "summary": "SUSE Bug 1172873", "url": "https://bugzilla.suse.com/1172873" }, { "category": "self", "summary": "SUSE Bug 1172938", "url": "https://bugzilla.suse.com/1172938" }, { "category": "self", "summary": "SUSE Bug 1172939", "url": "https://bugzilla.suse.com/1172939" }, { "category": "self", "summary": "SUSE Bug 1172940", "url": "https://bugzilla.suse.com/1172940" }, { "category": "self", "summary": "SUSE Bug 1172956", "url": "https://bugzilla.suse.com/1172956" }, { "category": "self", "summary": "SUSE Bug 1172963", "url": "https://bugzilla.suse.com/1172963" }, { "category": "self", "summary": "SUSE Bug 1172983", "url": "https://bugzilla.suse.com/1172983" }, { "category": "self", "summary": "SUSE Bug 1172984", "url": "https://bugzilla.suse.com/1172984" }, { "category": "self", "summary": "SUSE Bug 1172985", "url": "https://bugzilla.suse.com/1172985" }, { "category": "self", "summary": "SUSE Bug 1172986", "url": "https://bugzilla.suse.com/1172986" }, { "category": "self", "summary": "SUSE Bug 1172987", "url": "https://bugzilla.suse.com/1172987" }, { "category": "self", "summary": "SUSE Bug 1172988", "url": "https://bugzilla.suse.com/1172988" }, { "category": "self", "summary": "SUSE Bug 1172989", "url": "https://bugzilla.suse.com/1172989" }, { "category": "self", "summary": "SUSE Bug 1172990", "url": "https://bugzilla.suse.com/1172990" }, { "category": "self", "summary": "SUSE Bug 1172999", "url": "https://bugzilla.suse.com/1172999" }, { "category": "self", "summary": "SUSE Bug 1173017", "url": "https://bugzilla.suse.com/1173017" }, { "category": "self", "summary": "SUSE Bug 1173068", "url": "https://bugzilla.suse.com/1173068" }, { "category": "self", "summary": "SUSE Bug 1173074", "url": "https://bugzilla.suse.com/1173074" }, { "category": "self", "summary": "SUSE Bug 1173085", "url": "https://bugzilla.suse.com/1173085" }, { "category": "self", "summary": "SUSE Bug 1173115", "url": "https://bugzilla.suse.com/1173115" }, { "category": "self", "summary": "SUSE Bug 1173139", "url": "https://bugzilla.suse.com/1173139" }, { "category": "self", "summary": "SUSE Bug 1173206", "url": "https://bugzilla.suse.com/1173206" }, { "category": "self", "summary": "SUSE Bug 1173267", "url": "https://bugzilla.suse.com/1173267" }, { "category": "self", "summary": "SUSE Bug 1173271", "url": "https://bugzilla.suse.com/1173271" }, { "category": "self", "summary": "SUSE Bug 1173280", "url": "https://bugzilla.suse.com/1173280" }, { "category": "self", "summary": "SUSE Bug 1173284", "url": "https://bugzilla.suse.com/1173284" }, { "category": "self", "summary": "SUSE Bug 1173428", "url": "https://bugzilla.suse.com/1173428" }, { "category": "self", "summary": "SUSE Bug 1173438", "url": "https://bugzilla.suse.com/1173438" }, { "category": "self", "summary": "SUSE Bug 1173461", "url": "https://bugzilla.suse.com/1173461" }, { "category": "self", "summary": "SUSE Bug 1173468", "url": "https://bugzilla.suse.com/1173468" }, { "category": "self", "summary": "SUSE Bug 1173485", "url": "https://bugzilla.suse.com/1173485" }, { "category": "self", "summary": "SUSE Bug 1173514", "url": "https://bugzilla.suse.com/1173514" }, { "category": "self", "summary": "SUSE Bug 1173552", "url": "https://bugzilla.suse.com/1173552" }, { "category": "self", "summary": "SUSE Bug 1173573", "url": "https://bugzilla.suse.com/1173573" }, { "category": "self", "summary": "SUSE Bug 1173625", "url": "https://bugzilla.suse.com/1173625" }, { "category": "self", "summary": "SUSE Bug 1173746", "url": "https://bugzilla.suse.com/1173746" }, { "category": "self", "summary": "SUSE Bug 1173776", "url": "https://bugzilla.suse.com/1173776" }, { "category": "self", "summary": "SUSE Bug 1173798", "url": "https://bugzilla.suse.com/1173798" }, { "category": "self", "summary": "SUSE Bug 1173813", "url": "https://bugzilla.suse.com/1173813" }, { "category": "self", "summary": "SUSE Bug 1173817", "url": "https://bugzilla.suse.com/1173817" }, { "category": "self", "summary": "SUSE Bug 1173818", "url": "https://bugzilla.suse.com/1173818" }, { "category": "self", "summary": "SUSE Bug 1173820", "url": "https://bugzilla.suse.com/1173820" }, { "category": "self", "summary": "SUSE Bug 1173822", "url": "https://bugzilla.suse.com/1173822" }, { "category": "self", "summary": "SUSE Bug 1173823", "url": "https://bugzilla.suse.com/1173823" }, { "category": "self", "summary": "SUSE Bug 1173824", "url": "https://bugzilla.suse.com/1173824" }, { "category": "self", "summary": "SUSE Bug 1173825", "url": "https://bugzilla.suse.com/1173825" }, { "category": "self", "summary": "SUSE Bug 1173826", "url": "https://bugzilla.suse.com/1173826" }, { "category": "self", "summary": "SUSE Bug 1173827", "url": "https://bugzilla.suse.com/1173827" }, { "category": "self", "summary": "SUSE Bug 1173828", "url": "https://bugzilla.suse.com/1173828" }, { "category": "self", "summary": "SUSE Bug 1173830", "url": "https://bugzilla.suse.com/1173830" }, { "category": "self", "summary": "SUSE Bug 1173831", "url": "https://bugzilla.suse.com/1173831" }, { "category": "self", "summary": "SUSE Bug 1173832", "url": "https://bugzilla.suse.com/1173832" }, { "category": "self", "summary": "SUSE Bug 1173833", "url": "https://bugzilla.suse.com/1173833" }, { "category": "self", "summary": "SUSE Bug 1173834", "url": "https://bugzilla.suse.com/1173834" }, { "category": "self", "summary": "SUSE Bug 1173836", "url": "https://bugzilla.suse.com/1173836" }, { "category": "self", "summary": "SUSE Bug 1173837", "url": "https://bugzilla.suse.com/1173837" }, { "category": "self", "summary": "SUSE Bug 1173838", "url": "https://bugzilla.suse.com/1173838" }, { "category": "self", "summary": "SUSE Bug 1173839", "url": "https://bugzilla.suse.com/1173839" }, { "category": "self", "summary": "SUSE Bug 1173841", "url": "https://bugzilla.suse.com/1173841" }, { "category": "self", "summary": "SUSE Bug 1173843", "url": "https://bugzilla.suse.com/1173843" }, { "category": "self", "summary": "SUSE Bug 1173844", "url": "https://bugzilla.suse.com/1173844" }, { "category": "self", "summary": "SUSE Bug 1173845", "url": "https://bugzilla.suse.com/1173845" }, { "category": "self", "summary": "SUSE Bug 1173847", "url": "https://bugzilla.suse.com/1173847" }, { "category": "self", "summary": "SUSE Bug 1173849", "url": "https://bugzilla.suse.com/1173849" }, { "category": "self", "summary": "SUSE Bug 1173860", "url": "https://bugzilla.suse.com/1173860" }, { "category": "self", "summary": "SUSE Bug 1173894", "url": "https://bugzilla.suse.com/1173894" }, { "category": "self", "summary": "SUSE Bug 1173941", "url": "https://bugzilla.suse.com/1173941" }, { "category": "self", "summary": "SUSE Bug 1173954", "url": "https://bugzilla.suse.com/1173954" }, { "category": "self", "summary": "SUSE Bug 1174002", "url": "https://bugzilla.suse.com/1174002" }, { "category": "self", "summary": "SUSE Bug 1174003", "url": "https://bugzilla.suse.com/1174003" }, { "category": "self", "summary": "SUSE Bug 1174018", "url": "https://bugzilla.suse.com/1174018" }, { "category": "self", "summary": "SUSE Bug 1174026", "url": "https://bugzilla.suse.com/1174026" }, { "category": "self", "summary": "SUSE Bug 1174029", "url": "https://bugzilla.suse.com/1174029" }, { "category": "self", "summary": "SUSE Bug 1174072", "url": "https://bugzilla.suse.com/1174072" }, { "category": "self", "summary": "SUSE Bug 1174098", "url": "https://bugzilla.suse.com/1174098" }, { "category": "self", "summary": "SUSE Bug 1174110", "url": "https://bugzilla.suse.com/1174110" }, { "category": "self", "summary": "SUSE Bug 1174111", "url": "https://bugzilla.suse.com/1174111" }, { "category": "self", "summary": "SUSE Bug 1174116", "url": "https://bugzilla.suse.com/1174116" }, { "category": "self", "summary": "SUSE Bug 1174126", "url": "https://bugzilla.suse.com/1174126" }, { "category": "self", "summary": "SUSE Bug 1174127", "url": "https://bugzilla.suse.com/1174127" }, { "category": "self", "summary": "SUSE Bug 1174128", "url": "https://bugzilla.suse.com/1174128" }, { "category": "self", "summary": "SUSE Bug 1174129", "url": "https://bugzilla.suse.com/1174129" }, { "category": "self", "summary": "SUSE Bug 1174146", "url": "https://bugzilla.suse.com/1174146" }, { "category": "self", "summary": "SUSE Bug 1174185", "url": "https://bugzilla.suse.com/1174185" }, { "category": "self", "summary": "SUSE Bug 1174205", "url": "https://bugzilla.suse.com/1174205" }, { "category": "self", "summary": "SUSE Bug 1174244", "url": "https://bugzilla.suse.com/1174244" }, { "category": "self", "summary": "SUSE Bug 1174263", "url": "https://bugzilla.suse.com/1174263" }, { "category": "self", "summary": "SUSE Bug 1174264", "url": "https://bugzilla.suse.com/1174264" }, { "category": "self", "summary": "SUSE Bug 1174331", "url": "https://bugzilla.suse.com/1174331" }, { "category": "self", "summary": "SUSE Bug 1174332", "url": "https://bugzilla.suse.com/1174332" }, { "category": "self", "summary": "SUSE Bug 1174333", "url": "https://bugzilla.suse.com/1174333" }, { "category": "self", "summary": "SUSE Bug 1174345", "url": "https://bugzilla.suse.com/1174345" }, { "category": "self", "summary": "SUSE Bug 1174356", "url": "https://bugzilla.suse.com/1174356" }, { "category": "self", "summary": "SUSE Bug 1174358", "url": "https://bugzilla.suse.com/1174358" }, { "category": "self", "summary": "SUSE Bug 1174362", "url": "https://bugzilla.suse.com/1174362" }, { "category": "self", "summary": "SUSE Bug 1174387", "url": "https://bugzilla.suse.com/1174387" }, { "category": "self", "summary": "SUSE Bug 1174396", "url": "https://bugzilla.suse.com/1174396" }, { "category": "self", "summary": "SUSE Bug 1174398", "url": "https://bugzilla.suse.com/1174398" }, { "category": "self", "summary": "SUSE Bug 1174407", "url": "https://bugzilla.suse.com/1174407" }, { "category": "self", "summary": "SUSE Bug 1174409", "url": "https://bugzilla.suse.com/1174409" }, { "category": "self", "summary": "SUSE Bug 1174411", "url": "https://bugzilla.suse.com/1174411" }, { "category": "self", "summary": "SUSE Bug 1174438", "url": "https://bugzilla.suse.com/1174438" }, { "category": "self", "summary": "SUSE Bug 1174462", "url": "https://bugzilla.suse.com/1174462" }, { "category": "self", "summary": "SUSE Bug 1174484", "url": "https://bugzilla.suse.com/1174484" }, { "category": "self", "summary": "SUSE Bug 1174486", "url": "https://bugzilla.suse.com/1174486" }, { "category": "self", "summary": "SUSE Bug 1174513", "url": "https://bugzilla.suse.com/1174513" }, { "category": "self", "summary": "SUSE Bug 1174527", "url": "https://bugzilla.suse.com/1174527" }, { "category": "self", "summary": "SUSE Bug 1174625", "url": "https://bugzilla.suse.com/1174625" }, { "category": "self", "summary": "SUSE Bug 1174627", "url": "https://bugzilla.suse.com/1174627" }, { "category": "self", "summary": "SUSE Bug 1174645", "url": "https://bugzilla.suse.com/1174645" }, { "category": "self", "summary": "SUSE Bug 1174689", "url": "https://bugzilla.suse.com/1174689" }, { "category": "self", "summary": "SUSE Bug 1174699", "url": "https://bugzilla.suse.com/1174699" }, { "category": "self", "summary": "SUSE Bug 1174737", "url": "https://bugzilla.suse.com/1174737" }, { "category": "self", "summary": "SUSE Bug 1174748", "url": "https://bugzilla.suse.com/1174748" }, { "category": "self", "summary": "SUSE Bug 1174757", "url": "https://bugzilla.suse.com/1174757" }, { "category": "self", "summary": "SUSE Bug 1174762", "url": "https://bugzilla.suse.com/1174762" }, { "category": "self", "summary": "SUSE Bug 1174770", "url": "https://bugzilla.suse.com/1174770" }, { "category": "self", "summary": "SUSE Bug 1174771", "url": "https://bugzilla.suse.com/1174771" }, { "category": "self", "summary": "SUSE Bug 1174777", "url": "https://bugzilla.suse.com/1174777" }, { "category": "self", "summary": "SUSE Bug 1174805", "url": "https://bugzilla.suse.com/1174805" }, { "category": "self", "summary": "SUSE Bug 1174824", "url": "https://bugzilla.suse.com/1174824" }, { "category": "self", "summary": "SUSE Bug 1174825", "url": "https://bugzilla.suse.com/1174825" }, { "category": "self", "summary": "SUSE Bug 1174852", "url": "https://bugzilla.suse.com/1174852" }, { "category": "self", "summary": "SUSE Bug 1174865", "url": "https://bugzilla.suse.com/1174865" }, { "category": "self", "summary": "SUSE Bug 1174880", "url": "https://bugzilla.suse.com/1174880" }, { "category": "self", "summary": "SUSE Bug 1174897", "url": "https://bugzilla.suse.com/1174897" }, { "category": "self", "summary": "SUSE Bug 1174899", "url": "https://bugzilla.suse.com/1174899" }, { "category": "self", "summary": "SUSE Bug 1174906", "url": "https://bugzilla.suse.com/1174906" }, { "category": "self", "summary": "SUSE Bug 1174969", "url": "https://bugzilla.suse.com/1174969" }, { "category": "self", "summary": "SUSE Bug 1175009", "url": "https://bugzilla.suse.com/1175009" }, { "category": "self", "summary": "SUSE Bug 1175010", "url": "https://bugzilla.suse.com/1175010" }, { "category": "self", "summary": "SUSE Bug 1175011", "url": "https://bugzilla.suse.com/1175011" }, { "category": "self", "summary": "SUSE Bug 1175012", "url": "https://bugzilla.suse.com/1175012" }, { "category": "self", "summary": "SUSE Bug 1175013", "url": "https://bugzilla.suse.com/1175013" }, { "category": "self", "summary": "SUSE Bug 1175014", "url": "https://bugzilla.suse.com/1175014" }, { "category": "self", "summary": "SUSE Bug 1175015", "url": "https://bugzilla.suse.com/1175015" }, { "category": "self", "summary": "SUSE Bug 1175016", "url": "https://bugzilla.suse.com/1175016" }, { "category": "self", "summary": "SUSE Bug 1175017", "url": "https://bugzilla.suse.com/1175017" }, { "category": "self", "summary": "SUSE Bug 1175018", "url": "https://bugzilla.suse.com/1175018" }, { "category": "self", "summary": "SUSE Bug 1175019", "url": "https://bugzilla.suse.com/1175019" }, { "category": "self", "summary": "SUSE Bug 1175020", "url": "https://bugzilla.suse.com/1175020" }, { "category": "self", "summary": "SUSE Bug 1175021", "url": "https://bugzilla.suse.com/1175021" }, { "category": "self", "summary": "SUSE Bug 1175052", "url": "https://bugzilla.suse.com/1175052" }, { "category": "self", "summary": "SUSE Bug 1175079", "url": "https://bugzilla.suse.com/1175079" }, { "category": "self", "summary": "SUSE Bug 1175112", "url": "https://bugzilla.suse.com/1175112" }, { "category": "self", "summary": "SUSE Bug 1175116", "url": "https://bugzilla.suse.com/1175116" }, { "category": "self", "summary": "SUSE Bug 1175128", "url": "https://bugzilla.suse.com/1175128" }, { "category": "self", "summary": "SUSE Bug 1175149", "url": "https://bugzilla.suse.com/1175149" }, { "category": "self", "summary": "SUSE Bug 1175175", "url": "https://bugzilla.suse.com/1175175" }, { "category": "self", "summary": "SUSE Bug 1175176", "url": "https://bugzilla.suse.com/1175176" }, { "category": "self", "summary": "SUSE Bug 1175180", "url": "https://bugzilla.suse.com/1175180" }, { "category": "self", "summary": "SUSE Bug 1175181", "url": "https://bugzilla.suse.com/1175181" }, { "category": "self", "summary": "SUSE Bug 1175182", "url": "https://bugzilla.suse.com/1175182" }, { "category": "self", "summary": "SUSE Bug 1175183", "url": "https://bugzilla.suse.com/1175183" }, { "category": "self", "summary": "SUSE Bug 1175184", "url": "https://bugzilla.suse.com/1175184" }, { "category": "self", "summary": "SUSE Bug 1175185", "url": "https://bugzilla.suse.com/1175185" }, { "category": "self", "summary": "SUSE Bug 1175186", "url": "https://bugzilla.suse.com/1175186" }, { "category": "self", "summary": "SUSE Bug 1175187", "url": "https://bugzilla.suse.com/1175187" }, { "category": "self", "summary": "SUSE Bug 1175188", "url": "https://bugzilla.suse.com/1175188" }, { "category": "self", "summary": "SUSE Bug 1175189", "url": "https://bugzilla.suse.com/1175189" }, { "category": "self", "summary": "SUSE Bug 1175190", "url": "https://bugzilla.suse.com/1175190" }, { "category": "self", "summary": "SUSE Bug 1175191", "url": "https://bugzilla.suse.com/1175191" }, { "category": "self", "summary": "SUSE Bug 1175192", "url": "https://bugzilla.suse.com/1175192" }, { "category": "self", "summary": "SUSE Bug 1175195", "url": "https://bugzilla.suse.com/1175195" }, { "category": "self", "summary": "SUSE Bug 1175199", "url": "https://bugzilla.suse.com/1175199" }, { "category": "self", "summary": "SUSE Bug 1175213", "url": "https://bugzilla.suse.com/1175213" }, { "category": "self", "summary": "SUSE Bug 1175232", "url": "https://bugzilla.suse.com/1175232" }, { "category": "self", "summary": "SUSE Bug 1175263", "url": "https://bugzilla.suse.com/1175263" }, { "category": "self", "summary": "SUSE Bug 1175284", "url": "https://bugzilla.suse.com/1175284" }, { "category": "self", "summary": "SUSE Bug 1175296", "url": "https://bugzilla.suse.com/1175296" }, { "category": "self", "summary": "SUSE Bug 1175306", "url": "https://bugzilla.suse.com/1175306" }, { "category": "self", "summary": "SUSE Bug 1175344", "url": "https://bugzilla.suse.com/1175344" }, { "category": "self", "summary": "SUSE Bug 1175345", "url": "https://bugzilla.suse.com/1175345" }, { "category": "self", "summary": "SUSE Bug 1175346", "url": "https://bugzilla.suse.com/1175346" }, { "category": "self", "summary": "SUSE Bug 1175347", "url": "https://bugzilla.suse.com/1175347" }, { "category": "self", "summary": "SUSE Bug 1175367", "url": "https://bugzilla.suse.com/1175367" }, { "category": "self", "summary": "SUSE Bug 1175377", "url": "https://bugzilla.suse.com/1175377" }, { "category": "self", "summary": "SUSE Bug 1175440", "url": "https://bugzilla.suse.com/1175440" }, { "category": "self", "summary": "SUSE Bug 1175480", "url": "https://bugzilla.suse.com/1175480" }, { "category": "self", "summary": "SUSE Bug 1175493", "url": "https://bugzilla.suse.com/1175493" }, { "category": "self", "summary": "SUSE Bug 1175546", "url": "https://bugzilla.suse.com/1175546" }, { "category": "self", "summary": "SUSE Bug 1175550", "url": "https://bugzilla.suse.com/1175550" }, { "category": "self", "summary": "SUSE Bug 1175599", "url": "https://bugzilla.suse.com/1175599" }, { "category": "self", "summary": "SUSE Bug 1175621", "url": "https://bugzilla.suse.com/1175621" }, { "category": "self", "summary": "SUSE Bug 1175654", "url": "https://bugzilla.suse.com/1175654" }, { "category": "self", "summary": "SUSE Bug 1175667", "url": "https://bugzilla.suse.com/1175667" }, { "category": "self", "summary": "SUSE Bug 1175691", "url": "https://bugzilla.suse.com/1175691" }, { "category": "self", "summary": "SUSE Bug 1175718", "url": "https://bugzilla.suse.com/1175718" }, { "category": "self", "summary": "SUSE Bug 1175721", "url": "https://bugzilla.suse.com/1175721" }, { "category": "self", "summary": "SUSE Bug 1175749", "url": "https://bugzilla.suse.com/1175749" }, { "category": "self", "summary": "SUSE Bug 1175768", "url": "https://bugzilla.suse.com/1175768" }, { "category": "self", "summary": "SUSE Bug 1175769", "url": "https://bugzilla.suse.com/1175769" }, { "category": "self", "summary": "SUSE Bug 1175770", "url": "https://bugzilla.suse.com/1175770" }, { "category": "self", "summary": "SUSE Bug 1175771", "url": "https://bugzilla.suse.com/1175771" }, { "category": "self", "summary": "SUSE Bug 1175772", "url": "https://bugzilla.suse.com/1175772" }, { "category": "self", "summary": "SUSE Bug 1175774", "url": "https://bugzilla.suse.com/1175774" }, { "category": "self", "summary": "SUSE Bug 1175775", "url": "https://bugzilla.suse.com/1175775" }, { "category": "self", "summary": "SUSE Bug 1175787", "url": "https://bugzilla.suse.com/1175787" }, { "category": "self", "summary": "SUSE Bug 1175807", "url": "https://bugzilla.suse.com/1175807" }, { "category": "self", "summary": "SUSE Bug 1175834", "url": "https://bugzilla.suse.com/1175834" }, { "category": "self", "summary": "SUSE Bug 1175873", "url": "https://bugzilla.suse.com/1175873" }, { "category": "self", "summary": "SUSE Bug 1175882", "url": "https://bugzilla.suse.com/1175882" }, { "category": "self", "summary": "SUSE Bug 1175898", "url": "https://bugzilla.suse.com/1175898" }, { "category": "self", "summary": "SUSE Bug 1175918", "url": "https://bugzilla.suse.com/1175918" }, { "category": "self", "summary": "SUSE Bug 1175952", "url": "https://bugzilla.suse.com/1175952" }, { "category": "self", "summary": "SUSE Bug 1175995", "url": "https://bugzilla.suse.com/1175995" }, { "category": "self", "summary": "SUSE Bug 1175996", "url": "https://bugzilla.suse.com/1175996" }, { "category": "self", "summary": "SUSE Bug 1175997", "url": "https://bugzilla.suse.com/1175997" }, { "category": "self", "summary": "SUSE Bug 1175998", "url": "https://bugzilla.suse.com/1175998" }, { "category": "self", "summary": "SUSE Bug 1175999", "url": "https://bugzilla.suse.com/1175999" }, { "category": "self", "summary": "SUSE Bug 1176000", "url": "https://bugzilla.suse.com/1176000" }, { "category": "self", "summary": "SUSE Bug 1176001", "url": "https://bugzilla.suse.com/1176001" }, { "category": "self", "summary": "SUSE Bug 1176019", "url": "https://bugzilla.suse.com/1176019" }, { "category": "self", "summary": "SUSE Bug 1176022", "url": "https://bugzilla.suse.com/1176022" }, { "category": "self", "summary": "SUSE Bug 1176038", "url": "https://bugzilla.suse.com/1176038" }, { "category": "self", "summary": "SUSE Bug 1176063", "url": "https://bugzilla.suse.com/1176063" }, { "category": "self", "summary": "SUSE Bug 1176069", "url": "https://bugzilla.suse.com/1176069" }, { "category": "self", "summary": "SUSE Bug 1176109", "url": "https://bugzilla.suse.com/1176109" }, { "category": "self", "summary": "SUSE Bug 1176137", "url": "https://bugzilla.suse.com/1176137" }, { "category": "self", "summary": "SUSE Bug 1176180", "url": "https://bugzilla.suse.com/1176180" }, { "category": "self", "summary": "SUSE Bug 1176200", "url": "https://bugzilla.suse.com/1176200" }, { "category": "self", "summary": "SUSE Bug 1176235", "url": "https://bugzilla.suse.com/1176235" }, { "category": "self", "summary": "SUSE Bug 1176236", "url": "https://bugzilla.suse.com/1176236" }, { "category": "self", "summary": "SUSE Bug 1176237", "url": "https://bugzilla.suse.com/1176237" }, { "category": "self", "summary": "SUSE Bug 1176242", "url": "https://bugzilla.suse.com/1176242" }, { "category": "self", "summary": "SUSE Bug 1176354", "url": "https://bugzilla.suse.com/1176354" }, { "category": "self", "summary": "SUSE Bug 1176357", "url": "https://bugzilla.suse.com/1176357" }, { "category": "self", "summary": "SUSE Bug 1176358", "url": "https://bugzilla.suse.com/1176358" }, { "category": "self", "summary": "SUSE Bug 1176359", "url": "https://bugzilla.suse.com/1176359" }, { "category": "self", "summary": "SUSE Bug 1176360", "url": "https://bugzilla.suse.com/1176360" }, { "category": "self", "summary": "SUSE Bug 1176361", "url": "https://bugzilla.suse.com/1176361" }, { "category": "self", "summary": "SUSE Bug 1176362", "url": "https://bugzilla.suse.com/1176362" }, { "category": "self", "summary": "SUSE Bug 1176363", "url": "https://bugzilla.suse.com/1176363" }, { "category": "self", "summary": "SUSE Bug 1176364", "url": "https://bugzilla.suse.com/1176364" }, { "category": "self", "summary": "SUSE Bug 1176365", "url": "https://bugzilla.suse.com/1176365" }, { "category": "self", "summary": "SUSE Bug 1176366", "url": "https://bugzilla.suse.com/1176366" }, { "category": "self", "summary": "SUSE Bug 1176367", "url": "https://bugzilla.suse.com/1176367" }, { "category": "self", "summary": "SUSE Bug 1176381", "url": "https://bugzilla.suse.com/1176381" }, { "category": "self", "summary": "SUSE Bug 1176396", "url": "https://bugzilla.suse.com/1176396" }, { "category": "self", "summary": "SUSE Bug 1176400", "url": "https://bugzilla.suse.com/1176400" }, { "category": "self", "summary": "SUSE Bug 1176423", "url": "https://bugzilla.suse.com/1176423" }, { "category": "self", "summary": "SUSE Bug 1176449", "url": "https://bugzilla.suse.com/1176449" }, { "category": "self", "summary": "SUSE Bug 1176481", "url": "https://bugzilla.suse.com/1176481" }, { "category": "self", "summary": "SUSE Bug 1176485", "url": "https://bugzilla.suse.com/1176485" }, { "category": "self", "summary": "SUSE Bug 1176486", "url": "https://bugzilla.suse.com/1176486" }, { "category": "self", "summary": "SUSE Bug 1176507", "url": "https://bugzilla.suse.com/1176507" }, { "category": "self", "summary": "SUSE Bug 1176536", "url": "https://bugzilla.suse.com/1176536" }, { "category": "self", "summary": "SUSE Bug 1176537", "url": "https://bugzilla.suse.com/1176537" }, { "category": "self", "summary": "SUSE Bug 1176538", "url": "https://bugzilla.suse.com/1176538" }, { "category": "self", "summary": "SUSE Bug 1176539", "url": "https://bugzilla.suse.com/1176539" }, { "category": "self", "summary": "SUSE Bug 1176540", "url": "https://bugzilla.suse.com/1176540" }, { "category": "self", "summary": "SUSE Bug 1176541", "url": "https://bugzilla.suse.com/1176541" }, { "category": "self", "summary": "SUSE Bug 1176542", "url": "https://bugzilla.suse.com/1176542" }, { "category": "self", "summary": "SUSE Bug 1176543", "url": "https://bugzilla.suse.com/1176543" }, { "category": "self", "summary": "SUSE Bug 1176544", "url": "https://bugzilla.suse.com/1176544" }, { "category": "self", "summary": "SUSE Bug 1176545", "url": "https://bugzilla.suse.com/1176545" }, { "category": "self", "summary": "SUSE Bug 1176546", "url": "https://bugzilla.suse.com/1176546" }, { "category": "self", "summary": "SUSE Bug 1176548", "url": "https://bugzilla.suse.com/1176548" }, { "category": "self", "summary": "SUSE Bug 1176558", "url": "https://bugzilla.suse.com/1176558" }, { "category": "self", "summary": "SUSE Bug 1176559", "url": "https://bugzilla.suse.com/1176559" }, { "category": "self", "summary": "SUSE Bug 1176564", "url": "https://bugzilla.suse.com/1176564" }, { "category": "self", "summary": "SUSE Bug 1176586", "url": "https://bugzilla.suse.com/1176586" }, { "category": "self", "summary": "SUSE Bug 1176587", "url": "https://bugzilla.suse.com/1176587" }, { "category": "self", "summary": "SUSE Bug 1176588", "url": "https://bugzilla.suse.com/1176588" }, { "category": "self", "summary": "SUSE Bug 1176659", "url": "https://bugzilla.suse.com/1176659" }, { "category": "self", "summary": "SUSE Bug 1176698", "url": "https://bugzilla.suse.com/1176698" }, { "category": "self", "summary": "SUSE Bug 1176699", "url": "https://bugzilla.suse.com/1176699" }, { "category": "self", "summary": "SUSE Bug 1176700", "url": "https://bugzilla.suse.com/1176700" }, { "category": "self", "summary": "SUSE Bug 1176713", "url": "https://bugzilla.suse.com/1176713" }, { "category": "self", "summary": "SUSE Bug 1176721", "url": "https://bugzilla.suse.com/1176721" }, { "category": "self", "summary": "SUSE Bug 1176722", "url": "https://bugzilla.suse.com/1176722" }, { "category": "self", "summary": "SUSE Bug 1176725", "url": "https://bugzilla.suse.com/1176725" }, { "category": "self", "summary": "SUSE Bug 1176732", "url": "https://bugzilla.suse.com/1176732" }, { "category": "self", "summary": "SUSE Bug 1176763", "url": "https://bugzilla.suse.com/1176763" }, { "category": "self", "summary": "SUSE Bug 1176775", "url": "https://bugzilla.suse.com/1176775" }, { "category": "self", "summary": "SUSE Bug 1176788", "url": "https://bugzilla.suse.com/1176788" }, { "category": "self", "summary": "SUSE Bug 1176789", "url": "https://bugzilla.suse.com/1176789" }, { "category": "self", "summary": "SUSE Bug 1176833", "url": "https://bugzilla.suse.com/1176833" }, { "category": "self", "summary": "SUSE Bug 1176855", "url": "https://bugzilla.suse.com/1176855" }, { "category": "self", "summary": "SUSE Bug 1176869", "url": "https://bugzilla.suse.com/1176869" }, { "category": "self", "summary": "SUSE Bug 1176877", "url": "https://bugzilla.suse.com/1176877" }, { "category": "self", "summary": "SUSE Bug 1176907", "url": "https://bugzilla.suse.com/1176907" }, { "category": "self", "summary": "SUSE Bug 1176925", "url": "https://bugzilla.suse.com/1176925" }, { "category": "self", "summary": "SUSE Bug 1176942", "url": "https://bugzilla.suse.com/1176942" }, { "category": "self", "summary": "SUSE Bug 1176956", "url": "https://bugzilla.suse.com/1176956" }, { "category": "self", "summary": "SUSE Bug 1176962", "url": "https://bugzilla.suse.com/1176962" }, { "category": "self", "summary": "SUSE Bug 1176979", "url": "https://bugzilla.suse.com/1176979" }, { "category": "self", "summary": "SUSE Bug 1176980", "url": "https://bugzilla.suse.com/1176980" }, { "category": "self", "summary": "SUSE Bug 1176983", "url": "https://bugzilla.suse.com/1176983" }, { "category": "self", "summary": "SUSE Bug 1176990", "url": "https://bugzilla.suse.com/1176990" }, { "category": "self", "summary": "SUSE Bug 1177021", "url": "https://bugzilla.suse.com/1177021" }, { "category": "self", "summary": "SUSE Bug 1177030", "url": "https://bugzilla.suse.com/1177030" }, { "category": "self", "summary": "SUSE Bug 1177066", "url": "https://bugzilla.suse.com/1177066" }, { "category": "self", "summary": "SUSE Bug 1177070", "url": "https://bugzilla.suse.com/1177070" }, { "category": "self", "summary": "SUSE Bug 1177086", "url": "https://bugzilla.suse.com/1177086" }, { "category": "self", "summary": "SUSE Bug 1177090", "url": "https://bugzilla.suse.com/1177090" }, { "category": "self", "summary": "SUSE Bug 1177109", "url": "https://bugzilla.suse.com/1177109" }, { "category": "self", "summary": "SUSE Bug 1177121", "url": "https://bugzilla.suse.com/1177121" }, { "category": "self", "summary": "SUSE Bug 1177193", "url": "https://bugzilla.suse.com/1177193" }, { "category": "self", "summary": "SUSE Bug 1177194", "url": "https://bugzilla.suse.com/1177194" }, { "category": "self", "summary": "SUSE Bug 1177206", "url": "https://bugzilla.suse.com/1177206" }, { "category": "self", "summary": "SUSE Bug 1177258", "url": "https://bugzilla.suse.com/1177258" }, { "category": "self", "summary": "SUSE Bug 1177271", "url": "https://bugzilla.suse.com/1177271" }, { "category": "self", "summary": "SUSE Bug 1177281", "url": "https://bugzilla.suse.com/1177281" }, { "category": "self", "summary": "SUSE Bug 1177283", "url": "https://bugzilla.suse.com/1177283" }, { "category": "self", "summary": "SUSE Bug 1177284", "url": "https://bugzilla.suse.com/1177284" }, { "category": "self", "summary": "SUSE Bug 1177285", "url": "https://bugzilla.suse.com/1177285" }, { "category": "self", "summary": "SUSE Bug 1177286", "url": "https://bugzilla.suse.com/1177286" }, { "category": "self", "summary": "SUSE Bug 1177297", "url": "https://bugzilla.suse.com/1177297" }, { "category": "self", "summary": "SUSE Bug 1177326", "url": "https://bugzilla.suse.com/1177326" }, { "category": "self", "summary": "SUSE Bug 1177353", "url": "https://bugzilla.suse.com/1177353" }, { "category": "self", "summary": "SUSE Bug 1177384", "url": "https://bugzilla.suse.com/1177384" }, { "category": "self", "summary": "SUSE Bug 1177397", "url": "https://bugzilla.suse.com/1177397" }, { "category": "self", "summary": "SUSE Bug 1177410", "url": "https://bugzilla.suse.com/1177410" }, { "category": "self", "summary": "SUSE Bug 1177411", "url": "https://bugzilla.suse.com/1177411" }, { "category": "self", "summary": "SUSE Bug 1177470", "url": "https://bugzilla.suse.com/1177470" }, { "category": "self", "summary": "SUSE Bug 1177500", "url": "https://bugzilla.suse.com/1177500" }, { "category": "self", "summary": "SUSE Bug 1177511", "url": "https://bugzilla.suse.com/1177511" }, { "category": "self", "summary": "SUSE Bug 1177617", "url": "https://bugzilla.suse.com/1177617" }, { "category": "self", "summary": "SUSE Bug 1177666", "url": "https://bugzilla.suse.com/1177666" }, { "category": "self", "summary": "SUSE Bug 1177679", "url": "https://bugzilla.suse.com/1177679" }, { "category": "self", "summary": "SUSE Bug 1177681", "url": "https://bugzilla.suse.com/1177681" }, { "category": "self", "summary": "SUSE Bug 1177683", "url": "https://bugzilla.suse.com/1177683" }, { "category": "self", "summary": "SUSE Bug 1177687", "url": "https://bugzilla.suse.com/1177687" }, { "category": "self", "summary": "SUSE Bug 1177694", "url": "https://bugzilla.suse.com/1177694" }, { "category": "self", "summary": "SUSE Bug 1177697", "url": "https://bugzilla.suse.com/1177697" }, { "category": "self", "summary": "SUSE Bug 1177698", "url": "https://bugzilla.suse.com/1177698" }, { "category": "self", "summary": "SUSE Bug 1177703", "url": "https://bugzilla.suse.com/1177703" }, { "category": "self", "summary": "SUSE Bug 1177719", "url": "https://bugzilla.suse.com/1177719" }, { "category": "self", "summary": "SUSE Bug 1177724", "url": "https://bugzilla.suse.com/1177724" }, { "category": "self", "summary": "SUSE Bug 1177725", "url": "https://bugzilla.suse.com/1177725" }, { "category": "self", "summary": "SUSE Bug 1177726", "url": "https://bugzilla.suse.com/1177726" }, { "category": "self", "summary": "SUSE Bug 1177733", "url": "https://bugzilla.suse.com/1177733" }, { "category": "self", "summary": "SUSE Bug 1177739", "url": "https://bugzilla.suse.com/1177739" }, { "category": "self", "summary": "SUSE Bug 1177749", "url": "https://bugzilla.suse.com/1177749" }, { "category": "self", "summary": "SUSE Bug 1177750", "url": "https://bugzilla.suse.com/1177750" }, { "category": "self", "summary": "SUSE Bug 1177754", "url": "https://bugzilla.suse.com/1177754" }, { "category": "self", "summary": "SUSE Bug 1177755", "url": "https://bugzilla.suse.com/1177755" }, { "category": "self", "summary": "SUSE Bug 1177765", "url": "https://bugzilla.suse.com/1177765" }, { "category": "self", "summary": "SUSE Bug 1177766", "url": "https://bugzilla.suse.com/1177766" }, { "category": "self", "summary": "SUSE Bug 1177799", "url": "https://bugzilla.suse.com/1177799" }, { "category": "self", "summary": "SUSE Bug 1177801", "url": "https://bugzilla.suse.com/1177801" }, { "category": "self", "summary": "SUSE Bug 1177814", "url": "https://bugzilla.suse.com/1177814" }, { "category": "self", "summary": "SUSE Bug 1177817", "url": "https://bugzilla.suse.com/1177817" }, { "category": "self", "summary": "SUSE Bug 1177820", "url": "https://bugzilla.suse.com/1177820" }, { "category": "self", "summary": "SUSE Bug 1177854", "url": "https://bugzilla.suse.com/1177854" }, { "category": "self", "summary": "SUSE Bug 1177855", "url": "https://bugzilla.suse.com/1177855" }, { "category": "self", "summary": "SUSE Bug 1177856", "url": "https://bugzilla.suse.com/1177856" }, { "category": "self", "summary": "SUSE Bug 1177861", "url": "https://bugzilla.suse.com/1177861" }, { "category": "self", "summary": "SUSE Bug 1178002", "url": "https://bugzilla.suse.com/1178002" }, { "category": "self", "summary": "SUSE Bug 1178049", "url": "https://bugzilla.suse.com/1178049" }, { "category": "self", "summary": "SUSE Bug 1178079", "url": "https://bugzilla.suse.com/1178079" }, { "category": "self", "summary": "SUSE Bug 1178123", "url": "https://bugzilla.suse.com/1178123" }, { "category": "self", "summary": "SUSE Bug 1178166", "url": "https://bugzilla.suse.com/1178166" }, { "category": "self", "summary": "SUSE Bug 1178173", "url": "https://bugzilla.suse.com/1178173" }, { "category": "self", "summary": "SUSE Bug 1178175", "url": "https://bugzilla.suse.com/1178175" }, { "category": "self", "summary": "SUSE Bug 1178176", "url": "https://bugzilla.suse.com/1178176" }, { "category": "self", "summary": "SUSE Bug 1178177", "url": "https://bugzilla.suse.com/1178177" }, { "category": "self", "summary": "SUSE Bug 1178182", "url": "https://bugzilla.suse.com/1178182" }, { "category": "self", "summary": "SUSE Bug 1178183", "url": "https://bugzilla.suse.com/1178183" }, { "category": "self", "summary": "SUSE Bug 1178184", "url": "https://bugzilla.suse.com/1178184" }, { "category": "self", "summary": "SUSE Bug 1178185", "url": "https://bugzilla.suse.com/1178185" }, { "category": "self", "summary": "SUSE Bug 1178186", "url": "https://bugzilla.suse.com/1178186" }, { "category": "self", "summary": "SUSE Bug 1178190", "url": "https://bugzilla.suse.com/1178190" }, { "category": "self", "summary": "SUSE Bug 1178191", "url": "https://bugzilla.suse.com/1178191" }, { "category": "self", "summary": "SUSE Bug 1178203", "url": "https://bugzilla.suse.com/1178203" }, { "category": "self", "summary": "SUSE Bug 1178227", "url": "https://bugzilla.suse.com/1178227" }, { "category": "self", "summary": "SUSE Bug 1178246", "url": "https://bugzilla.suse.com/1178246" }, { "category": "self", "summary": "SUSE Bug 1178255", "url": "https://bugzilla.suse.com/1178255" }, { "category": "self", "summary": "SUSE Bug 1178270", "url": "https://bugzilla.suse.com/1178270" }, { "category": "self", "summary": "SUSE Bug 1178286", "url": "https://bugzilla.suse.com/1178286" }, { "category": "self", "summary": "SUSE Bug 1178307", "url": "https://bugzilla.suse.com/1178307" }, { "category": "self", "summary": "SUSE Bug 1178330", "url": "https://bugzilla.suse.com/1178330" }, { "category": "self", "summary": "SUSE Bug 1178393", "url": "https://bugzilla.suse.com/1178393" }, { "category": "self", "summary": "SUSE Bug 1178395", "url": "https://bugzilla.suse.com/1178395" }, { "category": "self", "summary": "SUSE Bug 1178401", "url": "https://bugzilla.suse.com/1178401" }, { "category": "self", "summary": "SUSE Bug 1178426", "url": "https://bugzilla.suse.com/1178426" }, { "category": "self", "summary": "SUSE Bug 1178461", "url": "https://bugzilla.suse.com/1178461" }, { "category": "self", "summary": "SUSE Bug 1178579", "url": "https://bugzilla.suse.com/1178579" }, { "category": "self", "summary": "SUSE Bug 1178581", "url": "https://bugzilla.suse.com/1178581" }, { "category": "self", "summary": "SUSE Bug 1178584", "url": "https://bugzilla.suse.com/1178584" }, { "category": "self", "summary": "SUSE Bug 1178585", "url": "https://bugzilla.suse.com/1178585" }, { "category": "self", "summary": "SUSE Bug 1178589", "url": "https://bugzilla.suse.com/1178589" }, { "category": "self", "summary": "SUSE Bug 1178590", "url": "https://bugzilla.suse.com/1178590" }, { "category": "self", "summary": "SUSE Bug 1178612", "url": "https://bugzilla.suse.com/1178612" }, { "category": "self", "summary": "SUSE Bug 1178634", "url": "https://bugzilla.suse.com/1178634" }, { "category": "self", "summary": "SUSE Bug 1178635", "url": "https://bugzilla.suse.com/1178635" }, { "category": "self", "summary": "SUSE Bug 1178653", "url": "https://bugzilla.suse.com/1178653" }, { "category": "self", "summary": "SUSE Bug 1178659", "url": "https://bugzilla.suse.com/1178659" }, { "category": "self", "summary": "SUSE Bug 1178660", "url": "https://bugzilla.suse.com/1178660" }, { "category": "self", "summary": "SUSE Bug 1178661", "url": "https://bugzilla.suse.com/1178661" }, { "category": "self", "summary": "SUSE Bug 1178669", "url": "https://bugzilla.suse.com/1178669" }, { "category": "self", "summary": "SUSE Bug 1178686", "url": "https://bugzilla.suse.com/1178686" }, { "category": "self", "summary": "SUSE Bug 1178740", "url": "https://bugzilla.suse.com/1178740" }, { "category": "self", "summary": "SUSE Bug 1178755", "url": "https://bugzilla.suse.com/1178755" }, { "category": "self", "summary": "SUSE Bug 1178756", "url": "https://bugzilla.suse.com/1178756" }, { "category": "self", "summary": "SUSE Bug 1178762", "url": "https://bugzilla.suse.com/1178762" }, { "category": "self", "summary": "SUSE Bug 1178780", "url": "https://bugzilla.suse.com/1178780" }, { "category": "self", "summary": "SUSE Bug 1178838", "url": "https://bugzilla.suse.com/1178838" }, { "category": "self", "summary": "SUSE Bug 1178853", "url": "https://bugzilla.suse.com/1178853" }, { "category": "self", "summary": "SUSE Bug 1178886", "url": "https://bugzilla.suse.com/1178886" }, { "category": "self", "summary": "SUSE Bug 1179001", "url": "https://bugzilla.suse.com/1179001" }, { "category": "self", "summary": "SUSE Bug 1179012", "url": "https://bugzilla.suse.com/1179012" }, { "category": "self", "summary": "SUSE Bug 1179014", "url": "https://bugzilla.suse.com/1179014" }, { "category": "self", "summary": "SUSE Bug 1179015", "url": "https://bugzilla.suse.com/1179015" }, { "category": "self", "summary": "SUSE Bug 1179045", "url": "https://bugzilla.suse.com/1179045" }, { "category": "self", "summary": "SUSE Bug 1179076", "url": "https://bugzilla.suse.com/1179076" }, { "category": "self", "summary": "SUSE Bug 1179082", "url": "https://bugzilla.suse.com/1179082" }, { "category": "self", "summary": "SUSE Bug 1179107", "url": "https://bugzilla.suse.com/1179107" }, { "category": "self", "summary": "SUSE Bug 1179140", "url": "https://bugzilla.suse.com/1179140" }, { "category": "self", "summary": "SUSE Bug 1179141", "url": "https://bugzilla.suse.com/1179141" }, { "category": "self", "summary": "SUSE Bug 1179160", "url": "https://bugzilla.suse.com/1179160" }, { "category": "self", "summary": "SUSE Bug 1179201", "url": "https://bugzilla.suse.com/1179201" }, { "category": "self", "summary": "SUSE Bug 1179204", "url": "https://bugzilla.suse.com/1179204" }, { "category": "self", "summary": "SUSE Bug 1179211", "url": "https://bugzilla.suse.com/1179211" }, { "category": "self", "summary": "SUSE Bug 1179217", "url": "https://bugzilla.suse.com/1179217" }, { "category": "self", "summary": "SUSE Bug 1179419", "url": "https://bugzilla.suse.com/1179419" }, { "category": "self", "summary": "SUSE Bug 1179424", "url": "https://bugzilla.suse.com/1179424" }, { "category": "self", "summary": "SUSE Bug 1179425", "url": "https://bugzilla.suse.com/1179425" }, { "category": "self", "summary": "SUSE Bug 1179426", "url": "https://bugzilla.suse.com/1179426" }, { "category": "self", "summary": "SUSE Bug 1179427", "url": "https://bugzilla.suse.com/1179427" }, { "category": "self", "summary": "SUSE Bug 1179429", "url": "https://bugzilla.suse.com/1179429" }, { "category": "self", "summary": "SUSE Bug 1179432", "url": "https://bugzilla.suse.com/1179432" }, { "category": "self", "summary": "SUSE Bug 1179434", "url": "https://bugzilla.suse.com/1179434" }, { "category": "self", "summary": "SUSE Bug 1179435", "url": "https://bugzilla.suse.com/1179435" }, { "category": "self", "summary": "SUSE Bug 1179442", "url": "https://bugzilla.suse.com/1179442" }, { "category": "self", "summary": "SUSE Bug 1179519", "url": "https://bugzilla.suse.com/1179519" }, { "category": "self", "summary": "SUSE Bug 1179550", "url": "https://bugzilla.suse.com/1179550" }, { "category": "self", "summary": "SUSE Bug 1179575", "url": "https://bugzilla.suse.com/1179575" }, { "category": "self", "summary": "SUSE Bug 1179578", "url": "https://bugzilla.suse.com/1179578" }, { "category": "self", "summary": "SUSE Bug 1179601", "url": "https://bugzilla.suse.com/1179601" }, { "category": "self", "summary": "SUSE Bug 1179604", "url": "https://bugzilla.suse.com/1179604" }, { "category": "self", "summary": "SUSE Bug 1179639", "url": "https://bugzilla.suse.com/1179639" }, { "category": "self", "summary": "SUSE Bug 1179652", "url": "https://bugzilla.suse.com/1179652" }, { "category": "self", "summary": "SUSE Bug 1179656", "url": "https://bugzilla.suse.com/1179656" }, { "category": "self", "summary": "SUSE Bug 1179670", "url": "https://bugzilla.suse.com/1179670" }, { "category": "self", "summary": "SUSE Bug 1179671", "url": "https://bugzilla.suse.com/1179671" }, { "category": "self", "summary": "SUSE Bug 1179672", "url": "https://bugzilla.suse.com/1179672" }, { "category": "self", "summary": "SUSE Bug 1179673", "url": "https://bugzilla.suse.com/1179673" }, { "category": "self", "summary": "SUSE Bug 1179675", "url": "https://bugzilla.suse.com/1179675" }, { "category": "self", "summary": "SUSE Bug 1179676", "url": "https://bugzilla.suse.com/1179676" }, { "category": "self", "summary": "SUSE Bug 1179677", "url": "https://bugzilla.suse.com/1179677" }, { "category": "self", "summary": "SUSE Bug 1179678", "url": "https://bugzilla.suse.com/1179678" }, { "category": "self", "summary": "SUSE Bug 1179679", "url": "https://bugzilla.suse.com/1179679" }, { "category": "self", "summary": "SUSE Bug 1179680", "url": "https://bugzilla.suse.com/1179680" }, { "category": "self", "summary": "SUSE Bug 1179681", "url": "https://bugzilla.suse.com/1179681" }, { "category": "self", "summary": "SUSE Bug 1179682", "url": "https://bugzilla.suse.com/1179682" }, { "category": "self", "summary": "SUSE Bug 1179683", "url": "https://bugzilla.suse.com/1179683" }, { "category": "self", "summary": "SUSE Bug 1179684", "url": "https://bugzilla.suse.com/1179684" }, { "category": "self", "summary": "SUSE Bug 1179685", "url": "https://bugzilla.suse.com/1179685" }, { "category": "self", "summary": "SUSE Bug 1179687", "url": "https://bugzilla.suse.com/1179687" }, { "category": "self", "summary": "SUSE Bug 1179688", "url": "https://bugzilla.suse.com/1179688" }, { "category": "self", "summary": "SUSE Bug 1179689", "url": "https://bugzilla.suse.com/1179689" }, { "category": "self", "summary": "SUSE Bug 1179690", "url": "https://bugzilla.suse.com/1179690" }, { "category": "self", "summary": "SUSE Bug 1179703", "url": "https://bugzilla.suse.com/1179703" }, { "category": "self", "summary": "SUSE Bug 1179704", "url": "https://bugzilla.suse.com/1179704" }, { "category": "self", "summary": "SUSE Bug 1179707", "url": "https://bugzilla.suse.com/1179707" }, { "category": "self", "summary": "SUSE Bug 1179709", "url": "https://bugzilla.suse.com/1179709" }, { "category": "self", "summary": "SUSE Bug 1179710", "url": "https://bugzilla.suse.com/1179710" }, { "category": "self", "summary": "SUSE Bug 1179711", "url": "https://bugzilla.suse.com/1179711" }, { "category": "self", "summary": "SUSE Bug 1179712", "url": "https://bugzilla.suse.com/1179712" }, { "category": "self", "summary": "SUSE Bug 1179713", "url": "https://bugzilla.suse.com/1179713" }, { "category": "self", "summary": "SUSE Bug 1179714", "url": "https://bugzilla.suse.com/1179714" }, { "category": "self", "summary": "SUSE Bug 1179715", "url": "https://bugzilla.suse.com/1179715" }, { "category": "self", "summary": "SUSE Bug 1179716", "url": "https://bugzilla.suse.com/1179716" }, { "category": "self", "summary": "SUSE Bug 1179745", "url": "https://bugzilla.suse.com/1179745" }, { "category": "self", "summary": "SUSE Bug 1179763", "url": "https://bugzilla.suse.com/1179763" }, { "category": "self", "summary": "SUSE Bug 1179887", "url": "https://bugzilla.suse.com/1179887" }, { "category": "self", "summary": "SUSE Bug 1179888", "url": "https://bugzilla.suse.com/1179888" }, { "category": "self", "summary": "SUSE Bug 1179892", "url": "https://bugzilla.suse.com/1179892" }, { "category": "self", "summary": "SUSE Bug 1179896", "url": "https://bugzilla.suse.com/1179896" }, { "category": "self", "summary": "SUSE Bug 1179960", "url": "https://bugzilla.suse.com/1179960" }, { "category": "self", "summary": "SUSE Bug 1179963", "url": "https://bugzilla.suse.com/1179963" }, { "category": "self", "summary": "SUSE Bug 1180027", "url": "https://bugzilla.suse.com/1180027" }, { "category": "self", "summary": "SUSE Bug 1180029", "url": "https://bugzilla.suse.com/1180029" }, { "category": "self", "summary": "SUSE Bug 1180031", "url": "https://bugzilla.suse.com/1180031" }, { "category": "self", "summary": "SUSE Bug 1180052", "url": "https://bugzilla.suse.com/1180052" }, { "category": "self", "summary": "SUSE Bug 1180056", "url": "https://bugzilla.suse.com/1180056" }, { "category": "self", "summary": "SUSE Bug 1180086", "url": "https://bugzilla.suse.com/1180086" }, { "category": "self", "summary": "SUSE Bug 1180117", "url": "https://bugzilla.suse.com/1180117" }, { "category": "self", "summary": "SUSE Bug 1180258", "url": "https://bugzilla.suse.com/1180258" }, { "category": "self", "summary": "SUSE Bug 1180261", "url": "https://bugzilla.suse.com/1180261" }, { "category": "self", "summary": "SUSE Bug 1180349", "url": "https://bugzilla.suse.com/1180349" }, { "category": "self", "summary": "SUSE Bug 1180506", "url": "https://bugzilla.suse.com/1180506" }, { "category": "self", "summary": "SUSE Bug 1180541", "url": "https://bugzilla.suse.com/1180541" }, { "category": "self", "summary": "SUSE Bug 1180559", "url": "https://bugzilla.suse.com/1180559" }, { "category": "self", "summary": "SUSE Bug 1180566", "url": "https://bugzilla.suse.com/1180566" }, { "category": "self", "summary": "SUSE Bug 173030", "url": "https://bugzilla.suse.com/173030" }, { "category": "self", "summary": "SUSE Bug 744692", "url": "https://bugzilla.suse.com/744692" }, { "category": "self", "summary": "SUSE Bug 789311", "url": "https://bugzilla.suse.com/789311" }, { "category": "self", "summary": "SUSE Bug 954532", "url": "https://bugzilla.suse.com/954532" }, { "category": "self", "summary": "SUSE Bug 995541", "url": "https://bugzilla.suse.com/995541" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19462 page", "url": "https://www.suse.com/security/cve/CVE-2019-19462/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20810 page", "url": "https://www.suse.com/security/cve/CVE-2019-20810/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20812 page", "url": "https://www.suse.com/security/cve/CVE-2019-20812/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0110 page", "url": "https://www.suse.com/security/cve/CVE-2020-0110/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0305 page", "url": "https://www.suse.com/security/cve/CVE-2020-0305/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0404 page", "url": "https://www.suse.com/security/cve/CVE-2020-0404/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0427 page", "url": "https://www.suse.com/security/cve/CVE-2020-0427/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0431 page", "url": "https://www.suse.com/security/cve/CVE-2020-0431/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0432 page", "url": "https://www.suse.com/security/cve/CVE-2020-0432/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0444 page", "url": "https://www.suse.com/security/cve/CVE-2020-0444/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0465 page", "url": "https://www.suse.com/security/cve/CVE-2020-0465/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0466 page", "url": "https://www.suse.com/security/cve/CVE-2020-0466/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0543 page", "url": "https://www.suse.com/security/cve/CVE-2020-0543/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10135 page", "url": "https://www.suse.com/security/cve/CVE-2020-10135/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10711 page", "url": "https://www.suse.com/security/cve/CVE-2020-10711/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10732 page", "url": "https://www.suse.com/security/cve/CVE-2020-10732/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10751 page", "url": "https://www.suse.com/security/cve/CVE-2020-10751/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10757 page", "url": "https://www.suse.com/security/cve/CVE-2020-10757/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10766 page", "url": "https://www.suse.com/security/cve/CVE-2020-10766/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10767 page", "url": "https://www.suse.com/security/cve/CVE-2020-10767/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10768 page", "url": "https://www.suse.com/security/cve/CVE-2020-10768/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10773 page", "url": "https://www.suse.com/security/cve/CVE-2020-10773/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10781 page", "url": "https://www.suse.com/security/cve/CVE-2020-10781/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11668 page", "url": "https://www.suse.com/security/cve/CVE-2020-11668/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12351 page", "url": "https://www.suse.com/security/cve/CVE-2020-12351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12352 page", "url": "https://www.suse.com/security/cve/CVE-2020-12352/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12652 page", "url": "https://www.suse.com/security/cve/CVE-2020-12652/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12656 page", "url": "https://www.suse.com/security/cve/CVE-2020-12656/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12769 page", "url": "https://www.suse.com/security/cve/CVE-2020-12769/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12771 page", "url": "https://www.suse.com/security/cve/CVE-2020-12771/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12888 page", "url": "https://www.suse.com/security/cve/CVE-2020-12888/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-13143 page", "url": "https://www.suse.com/security/cve/CVE-2020-13143/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-13974 page", "url": "https://www.suse.com/security/cve/CVE-2020-13974/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14314 page", "url": "https://www.suse.com/security/cve/CVE-2020-14314/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14331 page", "url": "https://www.suse.com/security/cve/CVE-2020-14331/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14351 page", "url": "https://www.suse.com/security/cve/CVE-2020-14351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14356 page", "url": "https://www.suse.com/security/cve/CVE-2020-14356/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14385 page", "url": "https://www.suse.com/security/cve/CVE-2020-14385/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14386 page", "url": "https://www.suse.com/security/cve/CVE-2020-14386/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14390 page", "url": "https://www.suse.com/security/cve/CVE-2020-14390/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14416 page", "url": "https://www.suse.com/security/cve/CVE-2020-14416/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15393 page", "url": "https://www.suse.com/security/cve/CVE-2020-15393/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15436 page", "url": "https://www.suse.com/security/cve/CVE-2020-15436/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15437 page", "url": "https://www.suse.com/security/cve/CVE-2020-15437/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15780 page", "url": "https://www.suse.com/security/cve/CVE-2020-15780/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16120 page", "url": "https://www.suse.com/security/cve/CVE-2020-16120/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-16166 page", "url": "https://www.suse.com/security/cve/CVE-2020-16166/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-1749 page", "url": "https://www.suse.com/security/cve/CVE-2020-1749/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24490 page", "url": "https://www.suse.com/security/cve/CVE-2020-24490/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25212 page", "url": "https://www.suse.com/security/cve/CVE-2020-25212/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25284 page", "url": "https://www.suse.com/security/cve/CVE-2020-25284/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25285 page", "url": "https://www.suse.com/security/cve/CVE-2020-25285/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25641 page", "url": "https://www.suse.com/security/cve/CVE-2020-25641/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25643 page", "url": "https://www.suse.com/security/cve/CVE-2020-25643/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25645 page", "url": "https://www.suse.com/security/cve/CVE-2020-25645/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25656 page", "url": "https://www.suse.com/security/cve/CVE-2020-25656/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25668 page", "url": "https://www.suse.com/security/cve/CVE-2020-25668/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25669 page", "url": "https://www.suse.com/security/cve/CVE-2020-25669/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25704 page", "url": "https://www.suse.com/security/cve/CVE-2020-25704/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25705 page", "url": "https://www.suse.com/security/cve/CVE-2020-25705/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-26088 page", "url": "https://www.suse.com/security/cve/CVE-2020-26088/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27068 page", "url": "https://www.suse.com/security/cve/CVE-2020-27068/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27777 page", "url": "https://www.suse.com/security/cve/CVE-2020-27777/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27786 page", "url": "https://www.suse.com/security/cve/CVE-2020-27786/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27825 page", "url": "https://www.suse.com/security/cve/CVE-2020-27825/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-27830 page", "url": "https://www.suse.com/security/cve/CVE-2020-27830/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-28915 page", "url": "https://www.suse.com/security/cve/CVE-2020-28915/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-28941 page", "url": "https://www.suse.com/security/cve/CVE-2020-28941/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-28974 page", "url": "https://www.suse.com/security/cve/CVE-2020-28974/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29369 page", "url": "https://www.suse.com/security/cve/CVE-2020-29369/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29370 page", "url": "https://www.suse.com/security/cve/CVE-2020-29370/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29371 page", "url": "https://www.suse.com/security/cve/CVE-2020-29371/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29373 page", "url": "https://www.suse.com/security/cve/CVE-2020-29373/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29660 page", "url": "https://www.suse.com/security/cve/CVE-2020-29660/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29661 page", "url": "https://www.suse.com/security/cve/CVE-2020-29661/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-36158 page", "url": "https://www.suse.com/security/cve/CVE-2020-36158/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-4788 page", "url": "https://www.suse.com/security/cve/CVE-2020-4788/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8694 page", "url": "https://www.suse.com/security/cve/CVE-2020-8694/" } ], "title": "Security update for RT kernel", "tracking": { "current_release_date": "2021-02-05T15:16:03Z", "generator": { "date": "2021-02-05T15:16:03Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2021:0242-1", "initial_release_date": "2021-02-05T15:16:03Z", "revision_history": [ { "date": "2021-02-05T15:16:03Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "product": { "name": "kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "product_id": "kernel-devel-rt-5.3.18-lp152.3.5.1.noarch" } }, { "category": "product_version", "name": "kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "product": { "name": "kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "product_id": "kernel-source-rt-5.3.18-lp152.3.5.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "product_id": "cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product_id": "cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "product_id": "dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product_id": "dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "product_id": "gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product_id": "gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "kernel-rt-5.3.18-lp152.3.5.1.x86_64", "product_id": "kernel-rt-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "product_id": "kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "product_id": "kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product_id": "kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "product_id": "kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "product_id": "kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "product_id": "kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "product_id": "kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product_id": "kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "product_id": "ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product_id": "ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "product_id": "reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product": { "name": "reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "product_id": "reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.2", "product": { "name": "openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-rt-5.3.18-lp152.3.5.1.noarch as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch" }, "product_reference": "kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "kernel-rt-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-5.3.18-lp152.3.5.1.noarch as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch" }, "product_reference": "kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", "product_id": "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" }, "product_reference": "reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-19462", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19462" } ], "notes": [ { "category": "general", "text": "relay_open in kernel/relay.c in the Linux kernel through 5.4.1 allows local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19462", "url": "https://www.suse.com/security/cve/CVE-2019-19462" }, { "category": "external", "summary": "SUSE Bug 1158265 for CVE-2019-19462", "url": "https://bugzilla.suse.com/1158265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "low" } ], "title": "CVE-2019-19462" }, { "cve": "CVE-2019-20810", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20810" } ], "notes": [ { "category": "general", "text": "go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel before 5.6 does not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20810", "url": "https://www.suse.com/security/cve/CVE-2019-20810" }, { "category": "external", "summary": "SUSE Bug 1172458 for CVE-2019-20810", "url": "https://bugzilla.suse.com/1172458" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "low" } ], "title": "CVE-2019-20810" }, { "cve": "CVE-2019-20812", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20812" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.4.7. The prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20812", "url": "https://www.suse.com/security/cve/CVE-2019-20812" }, { "category": "external", "summary": "SUSE Bug 1172453 for CVE-2019-20812", "url": "https://bugzilla.suse.com/1172453" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2019-20812" }, { "cve": "CVE-2020-0110", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0110" } ], "notes": [ { "category": "general", "text": "In psi_write of psi.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-148159562References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0110", "url": "https://www.suse.com/security/cve/CVE-2020-0110" }, { "category": "external", "summary": "SUSE Bug 1171374 for CVE-2020-0110", "url": "https://bugzilla.suse.com/1171374" }, { "category": "external", "summary": "SUSE Bug 1174874 for CVE-2020-0110", "url": "https://bugzilla.suse.com/1174874" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-0110" }, { "cve": "CVE-2020-0305", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0305" } ], "notes": [ { "category": "general", "text": "In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-153467744", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0305", "url": "https://www.suse.com/security/cve/CVE-2020-0305" }, { "category": "external", "summary": "SUSE Bug 1174462 for CVE-2020-0305", "url": "https://bugzilla.suse.com/1174462" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-0305" }, { "cve": "CVE-2020-0404", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0404" } ], "notes": [ { "category": "general", "text": "In uvc_scan_chain_forward of uvc_driver.c, there is a possible linked list corruption due to an unusual root cause. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111893654References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0404", "url": "https://www.suse.com/security/cve/CVE-2020-0404" }, { "category": "external", "summary": "SUSE Bug 1176423 for CVE-2020-0404", "url": "https://bugzilla.suse.com/1176423" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-0404" }, { "cve": "CVE-2020-0427", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0427" } ], "notes": [ { "category": "general", "text": "In create_pinctrl of core.c, there is a possible out of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-140550171", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0427", "url": "https://www.suse.com/security/cve/CVE-2020-0427" }, { "category": "external", "summary": "SUSE Bug 1176725 for CVE-2020-0427", "url": "https://bugzilla.suse.com/1176725" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-0427" }, { "cve": "CVE-2020-0431", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0431" } ], "notes": [ { "category": "general", "text": "In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-144161459", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0431", "url": "https://www.suse.com/security/cve/CVE-2020-0431" }, { "category": "external", "summary": "SUSE Bug 1176722 for CVE-2020-0431", "url": "https://bugzilla.suse.com/1176722" }, { "category": "external", "summary": "SUSE Bug 1176896 for CVE-2020-0431", "url": "https://bugzilla.suse.com/1176896" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-0431" }, { "cve": "CVE-2020-0432", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0432" } ], "notes": [ { "category": "general", "text": "In skb_to_mamac of networking.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-143560807", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0432", "url": "https://www.suse.com/security/cve/CVE-2020-0432" }, { "category": "external", "summary": "SUSE Bug 1176721 for CVE-2020-0432", "url": "https://bugzilla.suse.com/1176721" }, { "category": "external", "summary": "SUSE Bug 1177165 for CVE-2020-0432", "url": "https://bugzilla.suse.com/1177165" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-0432" }, { "cve": "CVE-2020-0444", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0444" } ], "notes": [ { "category": "general", "text": "In audit_free_lsm_field of auditfilter.c, there is a possible bad kfree due to a logic error in audit_data_to_entry. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-150693166References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0444", "url": "https://www.suse.com/security/cve/CVE-2020-0444" }, { "category": "external", "summary": "SUSE Bug 1180027 for CVE-2020-0444", "url": "https://bugzilla.suse.com/1180027" }, { "category": "external", "summary": "SUSE Bug 1180028 for CVE-2020-0444", "url": "https://bugzilla.suse.com/1180028" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-0444" }, { "cve": "CVE-2020-0465", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0465" } ], "notes": [ { "category": "general", "text": "In various methods of hid-multitouch.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-162844689References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0465", "url": "https://www.suse.com/security/cve/CVE-2020-0465" }, { "category": "external", "summary": "SUSE Bug 1180029 for CVE-2020-0465", "url": "https://bugzilla.suse.com/1180029" }, { "category": "external", "summary": "SUSE Bug 1180030 for CVE-2020-0465", "url": "https://bugzilla.suse.com/1180030" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-0465" }, { "cve": "CVE-2020-0466", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0466" } ], "notes": [ { "category": "general", "text": "In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147802478References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0466", "url": "https://www.suse.com/security/cve/CVE-2020-0466" }, { "category": "external", "summary": "SUSE Bug 1180031 for CVE-2020-0466", "url": "https://bugzilla.suse.com/1180031" }, { "category": "external", "summary": "SUSE Bug 1180032 for CVE-2020-0466", "url": "https://bugzilla.suse.com/1180032" }, { "category": "external", "summary": "SUSE Bug 1199255 for CVE-2020-0466", "url": "https://bugzilla.suse.com/1199255" }, { "category": "external", "summary": "SUSE Bug 1200084 for CVE-2020-0466", "url": "https://bugzilla.suse.com/1200084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-0466" }, { "cve": "CVE-2020-0543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0543" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0543", "url": "https://www.suse.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "SUSE Bug 1154824 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1154824" }, { "category": "external", "summary": "SUSE Bug 1172205 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172205" }, { "category": "external", "summary": "SUSE Bug 1172206 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172206" }, { "category": "external", "summary": "SUSE Bug 1172207 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172207" }, { "category": "external", "summary": "SUSE Bug 1172770 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172770" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-0543" }, { "cve": "CVE-2020-10135", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10135" } ], "notes": [ { "category": "general", "text": "Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10135", "url": "https://www.suse.com/security/cve/CVE-2020-10135" }, { "category": "external", "summary": "SUSE Bug 1171988 for CVE-2020-10135", "url": "https://bugzilla.suse.com/1171988" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-10135" }, { "cve": "CVE-2020-10711", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10711" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s SELinux subsystem in versions before 5.7. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol\u0027s category bitmap into the SELinux extensible bitmap via the\u0027 ebitmap_netlbl_import\u0027 routine. While processing the CIPSO restricted bitmap tag in the \u0027cipso_v4_parsetag_rbm\u0027 routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allows a remote network user to crash the system kernel, resulting in a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10711", "url": "https://www.suse.com/security/cve/CVE-2020-10711" }, { "category": "external", "summary": "SUSE Bug 1171191 for CVE-2020-10711", "url": "https://bugzilla.suse.com/1171191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-10711" }, { "cve": "CVE-2020-10732", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10732" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10732", "url": "https://www.suse.com/security/cve/CVE-2020-10732" }, { "category": "external", "summary": "SUSE Bug 1171220 for CVE-2020-10732", "url": "https://bugzilla.suse.com/1171220" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "low" } ], "title": "CVE-2020-10732" }, { "cve": "CVE-2020-10751", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10751" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10751", "url": "https://www.suse.com/security/cve/CVE-2020-10751" }, { "category": "external", "summary": "SUSE Bug 1171189 for CVE-2020-10751", "url": "https://bugzilla.suse.com/1171189" }, { "category": "external", "summary": "SUSE Bug 1174963 for CVE-2020-10751", "url": "https://bugzilla.suse.com/1174963" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-10751" }, { "cve": "CVE-2020-10757", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10757" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10757", "url": "https://www.suse.com/security/cve/CVE-2020-10757" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172317 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1172317" }, { "category": "external", "summary": "SUSE Bug 1172437 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1172437" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-10757" }, { "cve": "CVE-2020-10766", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10766" } ], "notes": [ { "category": "general", "text": "A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10766", "url": "https://www.suse.com/security/cve/CVE-2020-10766" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172781 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1172781" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-10766" }, { "cve": "CVE-2020-10767", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10767" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10767", "url": "https://www.suse.com/security/cve/CVE-2020-10767" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172782 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1172782" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-10767" }, { "cve": "CVE-2020-10768", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10768" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10768", "url": "https://www.suse.com/security/cve/CVE-2020-10768" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172783 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1172783" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-10768" }, { "cve": "CVE-2020-10773", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10773" } ], "notes": [ { "category": "general", "text": "A stack information leak flaw was found in s390/s390x in the Linux kernel\u0027s memory manager functionality, where it incorrectly writes to the /proc/sys/vm/cmm_timeout file. This flaw allows a local user to see the kernel data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10773", "url": "https://www.suse.com/security/cve/CVE-2020-10773" }, { "category": "external", "summary": "SUSE Bug 1172999 for CVE-2020-10773", "url": "https://bugzilla.suse.com/1172999" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "low" } ], "title": "CVE-2020-10773" }, { "cve": "CVE-2020-10781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10781" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel before 5.8-rc6 in the ZRAM kernel module, where a user with a local account and the ability to read the /sys/class/zram-control/hot_add file can create ZRAM device nodes in the /dev/ directory. This read allocates kernel memory and is not accounted for a user that triggers the creation of that ZRAM device. With this vulnerability, continually reading the device may consume a large amount of system memory and cause the Out-of-Memory (OOM) killer to activate and terminate random userspace processes, possibly making the system inoperable.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10781", "url": "https://www.suse.com/security/cve/CVE-2020-10781" }, { "category": "external", "summary": "SUSE Bug 1173074 for CVE-2020-10781", "url": "https://bugzilla.suse.com/1173074" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-10781" }, { "cve": "CVE-2020-11668", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11668" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.6.1, drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) mishandles invalid descriptors, aka CID-a246b4d54770.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11668", "url": "https://www.suse.com/security/cve/CVE-2020-11668" }, { "category": "external", "summary": "SUSE Bug 1168952 for CVE-2020-11668", "url": "https://bugzilla.suse.com/1168952" }, { "category": "external", "summary": "SUSE Bug 1173942 for CVE-2020-11668", "url": "https://bugzilla.suse.com/1173942" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-11668" }, { "cve": "CVE-2020-12351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12351" } ], "notes": [ { "category": "general", "text": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12351", "url": "https://www.suse.com/security/cve/CVE-2020-12351" }, { "category": "external", "summary": "SUSE Bug 1177724 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177724" }, { "category": "external", "summary": "SUSE Bug 1177729 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177729" }, { "category": "external", "summary": "SUSE Bug 1178397 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1178397" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-12351" }, { "cve": "CVE-2020-12352", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12352" } ], "notes": [ { "category": "general", "text": "Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12352", "url": "https://www.suse.com/security/cve/CVE-2020-12352" }, { "category": "external", "summary": "SUSE Bug 1177725 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1177725" }, { "category": "external", "summary": "SUSE Bug 1178398 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1178398" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-12352" }, { "cve": "CVE-2020-12652", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12652" } ], "notes": [ { "category": "general", "text": "The __mptctl_ioctl function in drivers/message/fusion/mptctl.c in the Linux kernel before 5.4.14 allows local users to hold an incorrect lock during the ioctl operation and trigger a race condition, i.e., a \"double fetch\" vulnerability, aka CID-28d76df18f0a. NOTE: the vendor states \"The security impact of this bug is not as bad as it could have been because these operations are all privileged and root already has enormous destructive power.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12652", "url": "https://www.suse.com/security/cve/CVE-2020-12652" }, { "category": "external", "summary": "SUSE Bug 1171218 for CVE-2020-12652", "url": "https://bugzilla.suse.com/1171218" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-12652" }, { "cve": "CVE-2020-12656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12656" } ], "notes": [ { "category": "general", "text": "gss_mech_free in net/sunrpc/auth_gss/gss_mech_switch.c in the rpcsec_gss_krb5 implementation in the Linux kernel through 5.6.10 lacks certain domain_release calls, leading to a memory leak. Note: This was disputed with the assertion that the issue does not grant any access not already available. It is a problem that on unloading a specific kernel module some memory is leaked, but loading kernel modules is a privileged operation. A user could also write a kernel module to consume any amount of memory they like and load that replicating the effect of this bug", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12656", "url": "https://www.suse.com/security/cve/CVE-2020-12656" }, { "category": "external", "summary": "SUSE Bug 1171219 for CVE-2020-12656", "url": "https://bugzilla.suse.com/1171219" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "low" } ], "title": "CVE-2020-12656" }, { "cve": "CVE-2020-12769", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12769" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.4.17. drivers/spi/spi-dw.c allows attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one, aka CID-19b61392c5a8.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12769", "url": "https://www.suse.com/security/cve/CVE-2020-12769" }, { "category": "external", "summary": "SUSE Bug 1171983 for CVE-2020-12769", "url": "https://bugzilla.suse.com/1171983" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-12769" }, { "cve": "CVE-2020-12771", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12771" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.6.11. btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12771", "url": "https://www.suse.com/security/cve/CVE-2020-12771" }, { "category": "external", "summary": "SUSE Bug 1171732 for CVE-2020-12771", "url": "https://bugzilla.suse.com/1171732" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-12771" }, { "cve": "CVE-2020-12888", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12888" } ], "notes": [ { "category": "general", "text": "The VFIO PCI driver in the Linux kernel through 5.6.13 mishandles attempts to access disabled memory space.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12888", "url": "https://www.suse.com/security/cve/CVE-2020-12888" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1171868 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1171868" }, { "category": "external", "summary": "SUSE Bug 1176979 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1176979" }, { "category": "external", "summary": "SUSE Bug 1179612 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1179612" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-12888" }, { "cve": "CVE-2020-13143", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-13143" } ], "notes": [ { "category": "general", "text": "gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c in the Linux kernel 3.16 through 5.6.13 relies on kstrdup without considering the possibility of an internal \u0027\\0\u0027 value, which allows attackers to trigger an out-of-bounds read, aka CID-15753588bcd4.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-13143", "url": "https://www.suse.com/security/cve/CVE-2020-13143" }, { "category": "external", "summary": "SUSE Bug 1171982 for CVE-2020-13143", "url": "https://bugzilla.suse.com/1171982" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-13143" }, { "cve": "CVE-2020-13974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-13974" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel 4.4 through 5.7.1. drivers/tty/vt/keyboard.c has an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. NOTE: Members in the community argue that the integer overflow does not lead to a security issue in this case.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-13974", "url": "https://www.suse.com/security/cve/CVE-2020-13974" }, { "category": "external", "summary": "SUSE Bug 1172775 for CVE-2020-13974", "url": "https://bugzilla.suse.com/1172775" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-13974" }, { "cve": "CVE-2020-14314", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14314" } ], "notes": [ { "category": "general", "text": "A memory out-of-bounds read flaw was found in the Linux kernel before 5.9-rc2 with the ext3/ext4 file system, in the way it accesses a directory with broken indexing. This flaw allows a local user to crash the system if the directory exists. The highest threat from this vulnerability is to system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14314", "url": "https://www.suse.com/security/cve/CVE-2020-14314" }, { "category": "external", "summary": "SUSE Bug 1173798 for CVE-2020-14314", "url": "https://bugzilla.suse.com/1173798" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-14314" }, { "cve": "CVE-2020-14331", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14331" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14331", "url": "https://www.suse.com/security/cve/CVE-2020-14331" }, { "category": "external", "summary": "SUSE Bug 1174205 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174205" }, { "category": "external", "summary": "SUSE Bug 1174247 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-14331" }, { "cve": "CVE-2020-14351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14351" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel. A use-after-free memory flaw was found in the perf subsystem allowing a local attacker with permission to monitor perf events to corrupt memory and possibly escalate privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14351", "url": "https://www.suse.com/security/cve/CVE-2020-14351" }, { "category": "external", "summary": "SUSE Bug 1177086 for CVE-2020-14351", "url": "https://bugzilla.suse.com/1177086" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-14351" }, { "cve": "CVE-2020-14356", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14356" } ], "notes": [ { "category": "general", "text": "A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found in the way when reboot the system. A local user could use this flaw to crash the system or escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14356", "url": "https://www.suse.com/security/cve/CVE-2020-14356" }, { "category": "external", "summary": "SUSE Bug 1175213 for CVE-2020-14356", "url": "https://bugzilla.suse.com/1175213" }, { "category": "external", "summary": "SUSE Bug 1176392 for CVE-2020-14356", "url": "https://bugzilla.suse.com/1176392" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-14356" }, { "cve": "CVE-2020-14385", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14385" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.9-rc4. A failure of the file system metadata validator in XFS can cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt. This can lead to the filesystem being shutdown, or otherwise rendered inaccessible until it is remounted, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14385", "url": "https://www.suse.com/security/cve/CVE-2020-14385" }, { "category": "external", "summary": "SUSE Bug 1176137 for CVE-2020-14385", "url": "https://bugzilla.suse.com/1176137" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-14385" }, { "cve": "CVE-2020-14386", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14386" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14386", "url": "https://www.suse.com/security/cve/CVE-2020-14386" }, { "category": "external", "summary": "SUSE Bug 1176069 for CVE-2020-14386", "url": "https://bugzilla.suse.com/1176069" }, { "category": "external", "summary": "SUSE Bug 1176072 for CVE-2020-14386", "url": "https://bugzilla.suse.com/1176072" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-14386" }, { "cve": "CVE-2020-14390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14390" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in versions before 5.9-rc6. When changing screen size, an out-of-bounds memory write can occur leading to memory corruption or a denial of service. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14390", "url": "https://www.suse.com/security/cve/CVE-2020-14390" }, { "category": "external", "summary": "SUSE Bug 1176235 for CVE-2020-14390", "url": "https://bugzilla.suse.com/1176235" }, { "category": "external", "summary": "SUSE Bug 1176253 for CVE-2020-14390", "url": "https://bugzilla.suse.com/1176253" }, { "category": "external", "summary": "SUSE Bug 1176278 for CVE-2020-14390", "url": "https://bugzilla.suse.com/1176278" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-14390" }, { "cve": "CVE-2020-14416", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14416" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.4.16, a race condition in tty-\u003edisc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14416", "url": "https://www.suse.com/security/cve/CVE-2020-14416" }, { "category": "external", "summary": "SUSE Bug 1162002 for CVE-2020-14416", "url": "https://bugzilla.suse.com/1162002" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-14416" }, { "cve": "CVE-2020-15393", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15393" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.4 through 5.7.6, usbtest_disconnect in drivers/usb/misc/usbtest.c has a memory leak, aka CID-28ebeb8db770.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15393", "url": "https://www.suse.com/security/cve/CVE-2020-15393" }, { "category": "external", "summary": "SUSE Bug 1173514 for CVE-2020-15393", "url": "https://bugzilla.suse.com/1173514" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-15393" }, { "cve": "CVE-2020-15436", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15436" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in fs/block_dev.c in the Linux kernel before 5.8 allows local users to gain privileges or cause a denial of service by leveraging improper access to a certain error field.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15436", "url": "https://www.suse.com/security/cve/CVE-2020-15436" }, { "category": "external", "summary": "SUSE Bug 1179141 for CVE-2020-15436", "url": "https://bugzilla.suse.com/1179141" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-15436" }, { "cve": "CVE-2020-15437", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15437" } ], "notes": [ { "category": "general", "text": "The Linux kernel before version 5.8 is vulnerable to a NULL pointer dereference in drivers/tty/serial/8250/8250_core.c:serial8250_isa_init_ports() that allows local users to cause a denial of service by using the p-\u003eserial_in pointer which uninitialized.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15437", "url": "https://www.suse.com/security/cve/CVE-2020-15437" }, { "category": "external", "summary": "SUSE Bug 1179140 for CVE-2020-15437", "url": "https://bugzilla.suse.com/1179140" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-15437" }, { "cve": "CVE-2020-15780", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15780" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15780", "url": "https://www.suse.com/security/cve/CVE-2020-15780" }, { "category": "external", "summary": "SUSE Bug 1173573 for CVE-2020-15780", "url": "https://bugzilla.suse.com/1173573" }, { "category": "external", "summary": "SUSE Bug 1174186 for CVE-2020-15780", "url": "https://bugzilla.suse.com/1174186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-15780" }, { "cve": "CVE-2020-16120", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-16120" } ], "notes": [ { "category": "general", "text": "Overlayfs did not properly perform permission checking when copying up files in an overlayfs and could be exploited from within a user namespace, if, for example, unprivileged user namespaces were allowed. It was possible to have a file not readable by an unprivileged user to be copied to a mountpoint controlled by the user, like a removable device. This was introduced in kernel version 4.19 by commit d1d04ef (\"ovl: stack file ops\"). This was fixed in kernel version 5.8 by commits 56230d9 (\"ovl: verify permissions in ovl_path_open()\"), 48bd024 (\"ovl: switch to mounter creds in readdir\") and 05acefb (\"ovl: check permission to open real file\"). Additionally, commits 130fdbc (\"ovl: pass correct flags for opening real directory\") and 292f902 (\"ovl: call secutiry hook in ovl_real_ioctl()\") in kernel 5.8 might also be desired or necessary. These additional commits introduced a regression in overlay mounts within user namespaces which prevented access to files with ownership outside of the user namespace. This regression was mitigated by subsequent commit b6650da (\"ovl: do not fail because of O_NOATIMEi\") in kernel 5.11.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-16120", "url": "https://www.suse.com/security/cve/CVE-2020-16120" }, { "category": "external", "summary": "SUSE Bug 1177470 for CVE-2020-16120", "url": "https://bugzilla.suse.com/1177470" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-16120" }, { "cve": "CVE-2020-16166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-16166" } ], "notes": [ { "category": "general", "text": "The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-16166", "url": "https://www.suse.com/security/cve/CVE-2020-16166" }, { "category": "external", "summary": "SUSE Bug 1174757 for CVE-2020-16166", "url": "https://bugzilla.suse.com/1174757" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-16166" }, { "cve": "CVE-2020-1749", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-1749" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn\u0027t correctly routing tunneled data over the encrypted link; rather sending the data unencrypted. This would allow anyone in between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-1749", "url": "https://www.suse.com/security/cve/CVE-2020-1749" }, { "category": "external", "summary": "SUSE Bug 1165629 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1165629" }, { "category": "external", "summary": "SUSE Bug 1165631 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1165631" }, { "category": "external", "summary": "SUSE Bug 1177511 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1177511" }, { "category": "external", "summary": "SUSE Bug 1177513 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1177513" }, { "category": "external", "summary": "SUSE Bug 1189302 for CVE-2020-1749", "url": "https://bugzilla.suse.com/1189302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-1749" }, { "cve": "CVE-2020-24490", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24490" } ], "notes": [ { "category": "general", "text": "Improper buffer restrictions in BlueZ may allow an unauthenticated user to potentially enable denial of service via adjacent access. This affects all Linux kernel versions that support BlueZ.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24490", "url": "https://www.suse.com/security/cve/CVE-2020-24490" }, { "category": "external", "summary": "SUSE Bug 1177726 for CVE-2020-24490", "url": "https://bugzilla.suse.com/1177726" }, { "category": "external", "summary": "SUSE Bug 1177727 for CVE-2020-24490", "url": "https://bugzilla.suse.com/1177727" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-24490" }, { "cve": "CVE-2020-25212", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25212" } ], "notes": [ { "category": "general", "text": "A TOCTOU mismatch in the NFS client code in the Linux kernel before 5.8.3 could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25212", "url": "https://www.suse.com/security/cve/CVE-2020-25212" }, { "category": "external", "summary": "SUSE Bug 1176381 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1176381" }, { "category": "external", "summary": "SUSE Bug 1176382 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1176382" }, { "category": "external", "summary": "SUSE Bug 1177027 for CVE-2020-25212", "url": "https://bugzilla.suse.com/1177027" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-25212" }, { "cve": "CVE-2020-25284", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25284" } ], "notes": [ { "category": "general", "text": "The rbd block device driver in drivers/block/rbd.c in the Linux kernel through 5.8.9 used incomplete permission checking for access to rbd devices, which could be leveraged by local attackers to map or unmap rbd block devices, aka CID-f44d04e696fe.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25284", "url": "https://www.suse.com/security/cve/CVE-2020-25284" }, { "category": "external", "summary": "SUSE Bug 1176482 for CVE-2020-25284", "url": "https://bugzilla.suse.com/1176482" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-25284" }, { "cve": "CVE-2020-25285", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25285" } ], "notes": [ { "category": "general", "text": "A race condition between hugetlb sysctl handlers in mm/hugetlb.c in the Linux kernel before 5.8.8 could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact, aka CID-17743798d812.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25285", "url": "https://www.suse.com/security/cve/CVE-2020-25285" }, { "category": "external", "summary": "SUSE Bug 1176485 for CVE-2020-25285", "url": "https://bugzilla.suse.com/1176485" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-25285" }, { "cve": "CVE-2020-25641", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25641" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25641", "url": "https://www.suse.com/security/cve/CVE-2020-25641" }, { "category": "external", "summary": "SUSE Bug 1177121 for CVE-2020-25641", "url": "https://bugzilla.suse.com/1177121" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-25641" }, { "cve": "CVE-2020-25643", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25643" } ], "notes": [ { "category": "general", "text": "A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25643", "url": "https://www.suse.com/security/cve/CVE-2020-25643" }, { "category": "external", "summary": "SUSE Bug 1177206 for CVE-2020-25643", "url": "https://bugzilla.suse.com/1177206" }, { "category": "external", "summary": "SUSE Bug 1177226 for CVE-2020-25643", "url": "https://bugzilla.suse.com/1177226" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-25643" }, { "cve": "CVE-2020-25645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25645" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in versions before 5.9-rc7. Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25645", "url": "https://www.suse.com/security/cve/CVE-2020-25645" }, { "category": "external", "summary": "SUSE Bug 1177511 for CVE-2020-25645", "url": "https://bugzilla.suse.com/1177511" }, { "category": "external", "summary": "SUSE Bug 1177513 for CVE-2020-25645", "url": "https://bugzilla.suse.com/1177513" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-25645" }, { "cve": "CVE-2020-25656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25656" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25656", "url": "https://www.suse.com/security/cve/CVE-2020-25656" }, { "category": "external", "summary": "SUSE Bug 1177766 for CVE-2020-25656", "url": "https://bugzilla.suse.com/1177766" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-25656" }, { "cve": "CVE-2020-25668", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25668" } ], "notes": [ { "category": "general", "text": "A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25668", "url": "https://www.suse.com/security/cve/CVE-2020-25668" }, { "category": "external", "summary": "SUSE Bug 1178123 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1178123" }, { "category": "external", "summary": "SUSE Bug 1178622 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1178622" }, { "category": "external", "summary": "SUSE Bug 1196914 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1196914" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-25668" }, { "cve": "CVE-2020-25669", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25669" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in the Linux Kernel where the function sunkbd_reinit having been scheduled by sunkbd_interrupt before sunkbd being freed. Though the dangling pointer is set to NULL in sunkbd_disconnect, there is still an alias in sunkbd_reinit causing Use After Free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25669", "url": "https://www.suse.com/security/cve/CVE-2020-25669" }, { "category": "external", "summary": "SUSE Bug 1178182 for CVE-2020-25669", "url": "https://bugzilla.suse.com/1178182" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-25669" }, { "cve": "CVE-2020-25704", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25704" } ], "notes": [ { "category": "general", "text": "A flaw memory leak in the Linux kernel performance monitoring subsystem was found in the way if using PERF_EVENT_IOC_SET_FILTER. A local user could use this flaw to starve the resources causing denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25704", "url": "https://www.suse.com/security/cve/CVE-2020-25704" }, { "category": "external", "summary": "SUSE Bug 1178393 for CVE-2020-25704", "url": "https://bugzilla.suse.com/1178393" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-25704" }, { "cve": "CVE-2020-25705", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25705" } ], "notes": [ { "category": "general", "text": "A flaw in ICMP packets in the Linux kernel may allow an attacker to quickly scan open UDP ports. This flaw allows an off-path remote attacker to effectively bypass source port UDP randomization. Software that relies on UDP source port randomization are indirectly affected as well on the Linux Based Products (RUGGEDCOM RM1224: All versions between v5.0 and v6.4, SCALANCE M-800: All versions between v5.0 and v6.4, SCALANCE S615: All versions between v5.0 and v6.4, SCALANCE SC-600: All versions prior to v2.1.3, SCALANCE W1750D: v8.3.0.1, v8.6.0, and v8.7.0, SIMATIC Cloud Connect 7: All versions, SIMATIC MV500 Family: All versions, SIMATIC NET CP 1243-1 (incl. SIPLUS variants): Versions 3.1.39 and later, SIMATIC NET CP 1243-7 LTE EU: Version", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25705", "url": "https://www.suse.com/security/cve/CVE-2020-25705" }, { "category": "external", "summary": "SUSE Bug 1175721 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1175721" }, { "category": "external", "summary": "SUSE Bug 1178782 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1178782" }, { "category": "external", "summary": "SUSE Bug 1178783 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1178783" }, { "category": "external", "summary": "SUSE Bug 1191790 for CVE-2020-25705", "url": "https://bugzilla.suse.com/1191790" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-25705" }, { "cve": "CVE-2020-26088", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-26088" } ], "notes": [ { "category": "general", "text": "A missing CAP_NET_RAW check in NFC socket creation in net/nfc/rawsock.c in the Linux kernel before 5.8.2 could be used by local attackers to create raw sockets, bypassing security mechanisms, aka CID-26896f01467a.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-26088", "url": "https://www.suse.com/security/cve/CVE-2020-26088" }, { "category": "external", "summary": "SUSE Bug 1176990 for CVE-2020-26088", "url": "https://bugzilla.suse.com/1176990" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-26088" }, { "cve": "CVE-2020-27068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27068" } ], "notes": [ { "category": "general", "text": "Product: AndroidVersions: Android kernelAndroid ID: A-127973231References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27068", "url": "https://www.suse.com/security/cve/CVE-2020-27068" }, { "category": "external", "summary": "SUSE Bug 1180086 for CVE-2020-27068", "url": "https://bugzilla.suse.com/1180086" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-27068" }, { "cve": "CVE-2020-27777", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27777" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27777", "url": "https://www.suse.com/security/cve/CVE-2020-27777" }, { "category": "external", "summary": "SUSE Bug 1179107 for CVE-2020-27777", "url": "https://bugzilla.suse.com/1179107" }, { "category": "external", "summary": "SUSE Bug 1179419 for CVE-2020-27777", "url": "https://bugzilla.suse.com/1179419" }, { "category": "external", "summary": "SUSE Bug 1200343 for CVE-2020-27777", "url": "https://bugzilla.suse.com/1200343" }, { "category": "external", "summary": "SUSE Bug 1220060 for CVE-2020-27777", "url": "https://bugzilla.suse.com/1220060" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-27777" }, { "cve": "CVE-2020-27786", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27786" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of MIDI, where an attacker with a local account and the permissions to issue ioctl commands to midi devices could trigger a use-after-free issue. A write to this specific memory while freed and before use causes the flow of execution to change and possibly allow for memory corruption or privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27786", "url": "https://www.suse.com/security/cve/CVE-2020-27786" }, { "category": "external", "summary": "SUSE Bug 1179601 for CVE-2020-27786", "url": "https://bugzilla.suse.com/1179601" }, { "category": "external", "summary": "SUSE Bug 1179616 for CVE-2020-27786", "url": "https://bugzilla.suse.com/1179616" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-27786" }, { "cve": "CVE-2020-27825", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27825" } ], "notes": [ { "category": "general", "text": "A use-after-free flaw was found in kernel/trace/ring_buffer.c in Linux kernel (before 5.10-rc1). There was a race problem in trace_open and resize of cpu buffer running parallely on different cpus, may cause a denial of service problem (DOS). This flaw could even allow a local attacker with special user privilege to a kernel information leak threat.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27825", "url": "https://www.suse.com/security/cve/CVE-2020-27825" }, { "category": "external", "summary": "SUSE Bug 1179960 for CVE-2020-27825", "url": "https://bugzilla.suse.com/1179960" }, { "category": "external", "summary": "SUSE Bug 1179961 for CVE-2020-27825", "url": "https://bugzilla.suse.com/1179961" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-27825" }, { "cve": "CVE-2020-27830", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-27830" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in Linux Kernel where in the spk_ttyio_receive_buf2() function, it would dereference spk_ttyio_synth without checking whether it is NULL or not, and may lead to a NULL-ptr deref crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-27830", "url": "https://www.suse.com/security/cve/CVE-2020-27830" }, { "category": "external", "summary": "SUSE Bug 1179656 for CVE-2020-27830", "url": "https://bugzilla.suse.com/1179656" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-27830" }, { "cve": "CVE-2020-28915", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-28915" } ], "notes": [ { "category": "general", "text": "A buffer over-read (at the framebuffer layer) in the fbcon code in the Linux kernel before 5.8.15 could be used by local attackers to read kernel memory, aka CID-6735b4632def.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-28915", "url": "https://www.suse.com/security/cve/CVE-2020-28915" }, { "category": "external", "summary": "SUSE Bug 1178886 for CVE-2020-28915", "url": "https://bugzilla.suse.com/1178886" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-28915" }, { "cve": "CVE-2020-28941", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-28941" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/accessibility/speakup/spk_ttyio.c in the Linux kernel through 5.9.9. Local attackers on systems with the speakup driver could cause a local denial of service attack, aka CID-d41227544427. This occurs because of an invalid free when the line discipline is used more than once.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-28941", "url": "https://www.suse.com/security/cve/CVE-2020-28941" }, { "category": "external", "summary": "SUSE Bug 1178740 for CVE-2020-28941", "url": "https://bugzilla.suse.com/1178740" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-28941" }, { "cve": "CVE-2020-28974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-28974" } ], "notes": [ { "category": "general", "text": "A slab-out-of-bounds read in fbcon in the Linux kernel before 5.9.7 could be used by local attackers to read privileged information or potentially crash the kernel, aka CID-3c4e0dff2095. This occurs because KD_FONT_OP_COPY in drivers/tty/vt/vt.c can be used for manipulations such as font height.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-28974", "url": "https://www.suse.com/security/cve/CVE-2020-28974" }, { "category": "external", "summary": "SUSE Bug 1178589 for CVE-2020-28974", "url": "https://bugzilla.suse.com/1178589" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-28974" }, { "cve": "CVE-2020-29369", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29369" } ], "notes": [ { "category": "general", "text": "An issue was discovered in mm/mmap.c in the Linux kernel before 5.7.11. There is a race condition between certain expand functions (expand_downwards and expand_upwards) and page-table free operations from an munmap call, aka CID-246c320a8cfe.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29369", "url": "https://www.suse.com/security/cve/CVE-2020-29369" }, { "category": "external", "summary": "SUSE Bug 1173504 for CVE-2020-29369", "url": "https://bugzilla.suse.com/1173504" }, { "category": "external", "summary": "SUSE Bug 1179432 for CVE-2020-29369", "url": "https://bugzilla.suse.com/1179432" }, { "category": "external", "summary": "SUSE Bug 1179646 for CVE-2020-29369", "url": "https://bugzilla.suse.com/1179646" }, { "category": "external", "summary": "SUSE Bug 1182109 for CVE-2020-29369", "url": "https://bugzilla.suse.com/1182109" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-29369" }, { "cve": "CVE-2020-29370", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29370" } ], "notes": [ { "category": "general", "text": "An issue was discovered in kmem_cache_alloc_bulk in mm/slub.c in the Linux kernel before 5.5.11. The slowpath lacks the required TID increment, aka CID-fd4d9c7d0c71.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29370", "url": "https://www.suse.com/security/cve/CVE-2020-29370" }, { "category": "external", "summary": "SUSE Bug 1179435 for CVE-2020-29370", "url": "https://bugzilla.suse.com/1179435" }, { "category": "external", "summary": "SUSE Bug 1179648 for CVE-2020-29370", "url": "https://bugzilla.suse.com/1179648" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-29370" }, { "cve": "CVE-2020-29371", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29371" } ], "notes": [ { "category": "general", "text": "An issue was discovered in romfs_dev_read in fs/romfs/storage.c in the Linux kernel before 5.8.4. Uninitialized memory leaks to userspace, aka CID-bcf85fcedfdd.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29371", "url": "https://www.suse.com/security/cve/CVE-2020-29371" }, { "category": "external", "summary": "SUSE Bug 1179429 for CVE-2020-29371", "url": "https://bugzilla.suse.com/1179429" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-29371" }, { "cve": "CVE-2020-29373", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29373" } ], "notes": [ { "category": "general", "text": "An issue was discovered in fs/io_uring.c in the Linux kernel before 5.6. It unsafely handles the root directory during path lookups, and thus a process inside a mount namespace can escape to unintended filesystem locations, aka CID-ff002b30181d.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29373", "url": "https://www.suse.com/security/cve/CVE-2020-29373" }, { "category": "external", "summary": "SUSE Bug 1179434 for CVE-2020-29373", "url": "https://bugzilla.suse.com/1179434" }, { "category": "external", "summary": "SUSE Bug 1179779 for CVE-2020-29373", "url": "https://bugzilla.suse.com/1179779" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-29373" }, { "cve": "CVE-2020-29660", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29660" } ], "notes": [ { "category": "general", "text": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29660", "url": "https://www.suse.com/security/cve/CVE-2020-29660" }, { "category": "external", "summary": "SUSE Bug 1179745 for CVE-2020-29660", "url": "https://bugzilla.suse.com/1179745" }, { "category": "external", "summary": "SUSE Bug 1179877 for CVE-2020-29660", "url": "https://bugzilla.suse.com/1179877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-29660" }, { "cve": "CVE-2020-29661", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29661" } ], "notes": [ { "category": "general", "text": "A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29661", "url": "https://www.suse.com/security/cve/CVE-2020-29661" }, { "category": "external", "summary": "SUSE Bug 1179745 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1179745" }, { "category": "external", "summary": "SUSE Bug 1179877 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1179877" }, { "category": "external", "summary": "SUSE Bug 1214268 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1214268" }, { "category": "external", "summary": "SUSE Bug 1218966 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1218966" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-29661" }, { "cve": "CVE-2020-36158", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-36158" } ], "notes": [ { "category": "general", "text": "mwifiex_cmd_802_11_ad_hoc_start in drivers/net/wireless/marvell/mwifiex/join.c in the Linux kernel through 5.10.4 might allow remote attackers to execute arbitrary code via a long SSID value, aka CID-5c455c5ab332.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-36158", "url": "https://www.suse.com/security/cve/CVE-2020-36158" }, { "category": "external", "summary": "SUSE Bug 1180559 for CVE-2020-36158", "url": "https://bugzilla.suse.com/1180559" }, { "category": "external", "summary": "SUSE Bug 1180562 for CVE-2020-36158", "url": "https://bugzilla.suse.com/1180562" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "important" } ], "title": "CVE-2020-36158" }, { "cve": "CVE-2020-4788", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-4788" } ], "notes": [ { "category": "general", "text": "IBM Power9 (AIX 7.1, 7.2, and VIOS 3.1) processors could allow a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances. IBM X-Force ID: 189296.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-4788", "url": "https://www.suse.com/security/cve/CVE-2020-4788" }, { "category": "external", "summary": "SUSE Bug 1177666 for CVE-2020-4788", "url": "https://bugzilla.suse.com/1177666" }, { "category": "external", "summary": "SUSE Bug 1181158 for CVE-2020-4788", "url": "https://bugzilla.suse.com/1181158" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-4788" }, { "cve": "CVE-2020-8694", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8694" } ], "notes": [ { "category": "general", "text": "Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8694", "url": "https://www.suse.com/security/cve/CVE-2020-8694" }, { "category": "external", "summary": "SUSE Bug 1170415 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1170415" }, { "category": "external", "summary": "SUSE Bug 1170446 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1170446" }, { "category": "external", "summary": "SUSE Bug 1178591 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1178591" }, { "category": "external", "summary": "SUSE Bug 1178700 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1178700" }, { "category": "external", "summary": "SUSE Bug 1179661 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1179661" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2021-02-05T15:16:03Z", "details": "moderate" } ], "title": "CVE-2020-8694" } ] }
opensuse-su-2024:10728-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
kernel-devel-5.14.6-1.4 on GA media
Notes
Title of the patch
kernel-devel-5.14.6-1.4 on GA media
Description of the patch
These are all security issues fixed in the kernel-devel-5.14.6-1.4 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10728
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "kernel-devel-5.14.6-1.4 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the kernel-devel-5.14.6-1.4 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10728", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10728-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2017-1000251 page", "url": "https://www.suse.com/security/cve/CVE-2017-1000251/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-12153 page", "url": "https://www.suse.com/security/cve/CVE-2017-12153/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-13080 page", "url": "https://www.suse.com/security/cve/CVE-2017-13080/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-14051 page", "url": "https://www.suse.com/security/cve/CVE-2017-14051/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15129 page", "url": "https://www.suse.com/security/cve/CVE-2017-15129/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-15265 page", "url": "https://www.suse.com/security/cve/CVE-2017-15265/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16536 page", "url": "https://www.suse.com/security/cve/CVE-2017-16536/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16537 page", "url": "https://www.suse.com/security/cve/CVE-2017-16537/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16645 page", "url": "https://www.suse.com/security/cve/CVE-2017-16645/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16646 page", "url": "https://www.suse.com/security/cve/CVE-2017-16646/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16647 page", "url": "https://www.suse.com/security/cve/CVE-2017-16647/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16648 page", "url": "https://www.suse.com/security/cve/CVE-2017-16648/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16995 page", "url": "https://www.suse.com/security/cve/CVE-2017-16995/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16996 page", "url": "https://www.suse.com/security/cve/CVE-2017-16996/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17448 page", "url": "https://www.suse.com/security/cve/CVE-2017-17448/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17449 page", "url": "https://www.suse.com/security/cve/CVE-2017-17449/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17450 page", "url": "https://www.suse.com/security/cve/CVE-2017-17450/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17852 page", "url": "https://www.suse.com/security/cve/CVE-2017-17852/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17853 page", "url": "https://www.suse.com/security/cve/CVE-2017-17853/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17854 page", "url": "https://www.suse.com/security/cve/CVE-2017-17854/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17855 page", "url": "https://www.suse.com/security/cve/CVE-2017-17855/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17856 page", "url": "https://www.suse.com/security/cve/CVE-2017-17856/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17857 page", "url": "https://www.suse.com/security/cve/CVE-2017-17857/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-17862 page", "url": "https://www.suse.com/security/cve/CVE-2017-17862/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5123 page", "url": "https://www.suse.com/security/cve/CVE-2017-5123/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5715 page", "url": "https://www.suse.com/security/cve/CVE-2017-5715/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5753 page", "url": "https://www.suse.com/security/cve/CVE-2017-5753/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5754 page", "url": "https://www.suse.com/security/cve/CVE-2017-5754/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7541 page", "url": "https://www.suse.com/security/cve/CVE-2017-7541/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7542 page", "url": "https://www.suse.com/security/cve/CVE-2017-7542/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-8824 page", "url": "https://www.suse.com/security/cve/CVE-2017-8824/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-8831 page", "url": "https://www.suse.com/security/cve/CVE-2017-8831/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000004 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000004/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10322 page", "url": "https://www.suse.com/security/cve/CVE-2018-10322/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-10323 page", "url": "https://www.suse.com/security/cve/CVE-2018-10323/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1068 page", "url": "https://www.suse.com/security/cve/CVE-2018-1068/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1118 page", "url": "https://www.suse.com/security/cve/CVE-2018-1118/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12232 page", "url": "https://www.suse.com/security/cve/CVE-2018-12232/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12714 page", "url": "https://www.suse.com/security/cve/CVE-2018-12714/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-13053 page", "url": "https://www.suse.com/security/cve/CVE-2018-13053/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-18710 page", "url": "https://www.suse.com/security/cve/CVE-2018-18710/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-19824 page", "url": "https://www.suse.com/security/cve/CVE-2018-19824/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5332 page", "url": "https://www.suse.com/security/cve/CVE-2018-5332/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5333 page", "url": "https://www.suse.com/security/cve/CVE-2018-5333/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8043 page", "url": "https://www.suse.com/security/cve/CVE-2018-8043/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8087 page", "url": "https://www.suse.com/security/cve/CVE-2018-8087/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-8822 page", "url": "https://www.suse.com/security/cve/CVE-2018-8822/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10207 page", "url": "https://www.suse.com/security/cve/CVE-2019-10207/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11477 page", "url": "https://www.suse.com/security/cve/CVE-2019-11477/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11478 page", "url": "https://www.suse.com/security/cve/CVE-2019-11478/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11479 page", "url": "https://www.suse.com/security/cve/CVE-2019-11479/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14615 page", "url": "https://www.suse.com/security/cve/CVE-2019-14615/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14814 page", "url": "https://www.suse.com/security/cve/CVE-2019-14814/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-14896 page", "url": "https://www.suse.com/security/cve/CVE-2019-14896/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15030 page", "url": "https://www.suse.com/security/cve/CVE-2019-15030/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15031 page", "url": "https://www.suse.com/security/cve/CVE-2019-15031/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15098 page", "url": "https://www.suse.com/security/cve/CVE-2019-15098/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15099 page", "url": "https://www.suse.com/security/cve/CVE-2019-15099/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15290 page", "url": "https://www.suse.com/security/cve/CVE-2019-15290/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15504 page", "url": "https://www.suse.com/security/cve/CVE-2019-15504/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-15902 page", "url": "https://www.suse.com/security/cve/CVE-2019-15902/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16231 page", "url": "https://www.suse.com/security/cve/CVE-2019-16231/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16232 page", "url": "https://www.suse.com/security/cve/CVE-2019-16232/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16234 page", "url": "https://www.suse.com/security/cve/CVE-2019-16234/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-17133 page", "url": "https://www.suse.com/security/cve/CVE-2019-17133/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-17666 page", "url": "https://www.suse.com/security/cve/CVE-2019-17666/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-18808 page", "url": "https://www.suse.com/security/cve/CVE-2019-18808/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-18812 page", "url": "https://www.suse.com/security/cve/CVE-2019-18812/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-18813 page", "url": "https://www.suse.com/security/cve/CVE-2019-18813/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19252 page", "url": "https://www.suse.com/security/cve/CVE-2019-19252/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19332 page", "url": "https://www.suse.com/security/cve/CVE-2019-19332/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19338 page", "url": "https://www.suse.com/security/cve/CVE-2019-19338/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3016 page", "url": "https://www.suse.com/security/cve/CVE-2019-3016/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3846 page", "url": "https://www.suse.com/security/cve/CVE-2019-3846/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3882 page", "url": "https://www.suse.com/security/cve/CVE-2019-3882/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3887 page", "url": "https://www.suse.com/security/cve/CVE-2019-3887/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6974 page", "url": "https://www.suse.com/security/cve/CVE-2019-6974/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7221 page", "url": "https://www.suse.com/security/cve/CVE-2019-7221/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7222 page", "url": "https://www.suse.com/security/cve/CVE-2019-7222/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8564 page", "url": "https://www.suse.com/security/cve/CVE-2019-8564/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8912 page", "url": "https://www.suse.com/security/cve/CVE-2019-8912/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9500 page", "url": "https://www.suse.com/security/cve/CVE-2019-9500/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10135 page", "url": "https://www.suse.com/security/cve/CVE-2020-10135/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10766 page", "url": "https://www.suse.com/security/cve/CVE-2020-10766/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10767 page", "url": "https://www.suse.com/security/cve/CVE-2020-10767/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10768 page", "url": "https://www.suse.com/security/cve/CVE-2020-10768/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12351 page", "url": "https://www.suse.com/security/cve/CVE-2020-12351/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12352 page", "url": "https://www.suse.com/security/cve/CVE-2020-12352/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14331 page", "url": "https://www.suse.com/security/cve/CVE-2020-14331/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14386 page", "url": "https://www.suse.com/security/cve/CVE-2020-14386/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24586 page", "url": "https://www.suse.com/security/cve/CVE-2020-24586/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24587 page", "url": "https://www.suse.com/security/cve/CVE-2020-24587/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-24588 page", "url": "https://www.suse.com/security/cve/CVE-2020-24588/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25639 page", "url": "https://www.suse.com/security/cve/CVE-2020-25639/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25656 page", "url": "https://www.suse.com/security/cve/CVE-2020-25656/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-25668 page", "url": "https://www.suse.com/security/cve/CVE-2020-25668/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-26141 page", "url": "https://www.suse.com/security/cve/CVE-2020-26141/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-2732 page", "url": "https://www.suse.com/security/cve/CVE-2020-2732/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29660 page", "url": "https://www.suse.com/security/cve/CVE-2020-29660/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-29661 page", "url": "https://www.suse.com/security/cve/CVE-2020-29661/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8648 page", "url": "https://www.suse.com/security/cve/CVE-2020-8648/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-8694 page", "url": "https://www.suse.com/security/cve/CVE-2020-8694/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-23133 page", "url": "https://www.suse.com/security/cve/CVE-2021-23133/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-26708 page", "url": "https://www.suse.com/security/cve/CVE-2021-26708/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-28971 page", "url": "https://www.suse.com/security/cve/CVE-2021-28971/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-32606 page", "url": "https://www.suse.com/security/cve/CVE-2021-32606/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-33909 page", "url": "https://www.suse.com/security/cve/CVE-2021-33909/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3483 page", "url": "https://www.suse.com/security/cve/CVE-2021-3483/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3489 page", "url": "https://www.suse.com/security/cve/CVE-2021-3489/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3490 page", "url": "https://www.suse.com/security/cve/CVE-2021-3490/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3491 page", "url": "https://www.suse.com/security/cve/CVE-2021-3491/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3640 page", "url": "https://www.suse.com/security/cve/CVE-2021-3640/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3653 page", "url": "https://www.suse.com/security/cve/CVE-2021-3653/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3656 page", "url": "https://www.suse.com/security/cve/CVE-2021-3656/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3744 page", "url": "https://www.suse.com/security/cve/CVE-2021-3744/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3753 page", "url": "https://www.suse.com/security/cve/CVE-2021-3753/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-37576 page", "url": "https://www.suse.com/security/cve/CVE-2021-37576/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-3759 page", "url": "https://www.suse.com/security/cve/CVE-2021-3759/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-38166 page", "url": "https://www.suse.com/security/cve/CVE-2021-38166/" } ], "title": "kernel-devel-5.14.6-1.4 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10728-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-5.14.6-1.4.aarch64", "product": { "name": "kernel-devel-5.14.6-1.4.aarch64", "product_id": "kernel-devel-5.14.6-1.4.aarch64" } }, { "category": "product_version", "name": "kernel-macros-5.14.6-1.4.aarch64", "product": { "name": "kernel-macros-5.14.6-1.4.aarch64", "product_id": "kernel-macros-5.14.6-1.4.aarch64" } }, { "category": "product_version", "name": "kernel-source-5.14.6-1.4.aarch64", "product": { "name": "kernel-source-5.14.6-1.4.aarch64", "product_id": "kernel-source-5.14.6-1.4.aarch64" } }, { "category": "product_version", "name": "kernel-source-vanilla-5.14.6-1.4.aarch64", "product": { "name": "kernel-source-vanilla-5.14.6-1.4.aarch64", "product_id": "kernel-source-vanilla-5.14.6-1.4.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-5.14.6-1.4.ppc64le", "product": { "name": "kernel-devel-5.14.6-1.4.ppc64le", "product_id": "kernel-devel-5.14.6-1.4.ppc64le" } }, { "category": "product_version", "name": "kernel-macros-5.14.6-1.4.ppc64le", "product": { "name": "kernel-macros-5.14.6-1.4.ppc64le", "product_id": "kernel-macros-5.14.6-1.4.ppc64le" } }, { "category": "product_version", "name": "kernel-source-5.14.6-1.4.ppc64le", "product": { "name": "kernel-source-5.14.6-1.4.ppc64le", "product_id": "kernel-source-5.14.6-1.4.ppc64le" } }, { "category": "product_version", "name": "kernel-source-vanilla-5.14.6-1.4.ppc64le", "product": { "name": "kernel-source-vanilla-5.14.6-1.4.ppc64le", "product_id": "kernel-source-vanilla-5.14.6-1.4.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-5.14.6-1.4.s390x", "product": { "name": "kernel-devel-5.14.6-1.4.s390x", "product_id": "kernel-devel-5.14.6-1.4.s390x" } }, { "category": "product_version", "name": "kernel-macros-5.14.6-1.4.s390x", "product": { "name": "kernel-macros-5.14.6-1.4.s390x", "product_id": "kernel-macros-5.14.6-1.4.s390x" } }, { "category": "product_version", "name": "kernel-source-5.14.6-1.4.s390x", "product": { "name": "kernel-source-5.14.6-1.4.s390x", "product_id": "kernel-source-5.14.6-1.4.s390x" } }, { "category": "product_version", "name": "kernel-source-vanilla-5.14.6-1.4.s390x", "product": { "name": "kernel-source-vanilla-5.14.6-1.4.s390x", "product_id": "kernel-source-vanilla-5.14.6-1.4.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-5.14.6-1.4.x86_64", "product": { "name": "kernel-devel-5.14.6-1.4.x86_64", "product_id": "kernel-devel-5.14.6-1.4.x86_64" } }, { "category": "product_version", "name": "kernel-macros-5.14.6-1.4.x86_64", "product": { "name": "kernel-macros-5.14.6-1.4.x86_64", "product_id": "kernel-macros-5.14.6-1.4.x86_64" } }, { "category": "product_version", "name": "kernel-source-5.14.6-1.4.x86_64", "product": { "name": "kernel-source-5.14.6-1.4.x86_64", "product_id": "kernel-source-5.14.6-1.4.x86_64" } }, { "category": "product_version", "name": "kernel-source-vanilla-5.14.6-1.4.x86_64", "product": { "name": "kernel-source-vanilla-5.14.6-1.4.x86_64", "product_id": "kernel-source-vanilla-5.14.6-1.4.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.14.6-1.4.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64" }, "product_reference": "kernel-devel-5.14.6-1.4.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.14.6-1.4.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le" }, "product_reference": "kernel-devel-5.14.6-1.4.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.14.6-1.4.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x" }, "product_reference": "kernel-devel-5.14.6-1.4.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.14.6-1.4.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64" }, "product_reference": "kernel-devel-5.14.6-1.4.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.14.6-1.4.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64" }, "product_reference": "kernel-macros-5.14.6-1.4.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.14.6-1.4.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le" }, "product_reference": "kernel-macros-5.14.6-1.4.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.14.6-1.4.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x" }, "product_reference": "kernel-macros-5.14.6-1.4.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.14.6-1.4.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64" }, "product_reference": "kernel-macros-5.14.6-1.4.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.14.6-1.4.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64" }, "product_reference": "kernel-source-5.14.6-1.4.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.14.6-1.4.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le" }, "product_reference": "kernel-source-5.14.6-1.4.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.14.6-1.4.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x" }, "product_reference": "kernel-source-5.14.6-1.4.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.14.6-1.4.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64" }, "product_reference": "kernel-source-5.14.6-1.4.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-5.14.6-1.4.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64" }, "product_reference": "kernel-source-vanilla-5.14.6-1.4.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-5.14.6-1.4.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le" }, "product_reference": "kernel-source-vanilla-5.14.6-1.4.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-5.14.6-1.4.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x" }, "product_reference": "kernel-source-vanilla-5.14.6-1.4.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-5.14.6-1.4.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" }, "product_reference": "kernel-source-vanilla-5.14.6-1.4.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-1000251", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-1000251" } ], "notes": [ { "category": "general", "text": "The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux kernel version 2.6.32 and up to and including 4.13.1, are vulnerable to a stack overflow vulnerability in the processing of L2CAP configuration responses resulting in Remote code execution in kernel space.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-1000251", "url": "https://www.suse.com/security/cve/CVE-2017-1000251" }, { "category": "external", "summary": "SUSE Bug 1057389 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1057389" }, { "category": "external", "summary": "SUSE Bug 1057950 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1057950" }, { "category": "external", "summary": "SUSE Bug 1070535 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1070535" }, { "category": "external", "summary": "SUSE Bug 1072117 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1072117" }, { "category": "external", "summary": "SUSE Bug 1072162 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1072162" }, { "category": "external", "summary": "SUSE Bug 1120758 for CVE-2017-1000251", "url": "https://bugzilla.suse.com/1120758" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-1000251" }, { "cve": "CVE-2017-12153", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-12153" } ], "notes": [ { "category": "general", "text": "A security flaw was discovered in the nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux kernel through 4.13.3. This function does not check whether the required attributes are present in a Netlink request. This request can be issued by a user with the CAP_NET_ADMIN capability and may result in a NULL pointer dereference and system crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-12153", "url": "https://www.suse.com/security/cve/CVE-2017-12153" }, { "category": "external", "summary": "SUSE Bug 1058410 for CVE-2017-12153", "url": "https://bugzilla.suse.com/1058410" }, { "category": "external", "summary": "SUSE Bug 1058624 for CVE-2017-12153", "url": "https://bugzilla.suse.com/1058624" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-12153" }, { "cve": "CVE-2017-13080", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-13080" } ], "notes": [ { "category": "general", "text": "Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GTK) during the group key handshake, allowing an attacker within radio range to replay frames from access points to clients.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-13080", "url": "https://www.suse.com/security/cve/CVE-2017-13080" }, { "category": "external", "summary": "SUSE Bug 1056061 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1056061" }, { "category": "external", "summary": "SUSE Bug 1063479 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1063479" }, { "category": "external", "summary": "SUSE Bug 1063667 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1063667" }, { "category": "external", "summary": "SUSE Bug 1063671 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1063671" }, { "category": "external", "summary": "SUSE Bug 1066295 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1066295" }, { "category": "external", "summary": "SUSE Bug 1105108 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1105108" }, { "category": "external", "summary": "SUSE Bug 1178872 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1178872" }, { "category": "external", "summary": "SUSE Bug 1179588 for CVE-2017-13080", "url": "https://bugzilla.suse.com/1179588" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-13080" }, { "cve": "CVE-2017-14051", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-14051" } ], "notes": [ { "category": "general", "text": "An integer overflow in the qla2x00_sysfs_write_optrom_ctl function in drivers/scsi/qla2xxx/qla_attr.c in the Linux kernel through 4.12.10 allows local users to cause a denial of service (memory corruption and system crash) by leveraging root access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-14051", "url": "https://www.suse.com/security/cve/CVE-2017-14051" }, { "category": "external", "summary": "SUSE Bug 1056588 for CVE-2017-14051", "url": "https://bugzilla.suse.com/1056588" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-14051" }, { "cve": "CVE-2017-15129", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-15129" } ], "notes": [ { "category": "general", "text": "A use-after-free vulnerability was found in network namespaces code affecting the Linux kernel before 4.14.11. The function get_net_ns_by_id() in net/core/net_namespace.c does not check for the net::count value after it has found a peer network in netns_ids idr, which could lead to double free and memory corruption. This vulnerability could allow an unprivileged local user to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is thought to be unlikely.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-15129", "url": "https://www.suse.com/security/cve/CVE-2017-15129" }, { "category": "external", "summary": "SUSE Bug 1074839 for CVE-2017-15129", "url": "https://bugzilla.suse.com/1074839" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-15129" }, { "cve": "CVE-2017-15265", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-15265" } ], "notes": [ { "category": "general", "text": "Race condition in the ALSA subsystem in the Linux kernel before 4.13.8 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted /dev/snd/seq ioctl calls, related to sound/core/seq/seq_clientmgr.c and sound/core/seq/seq_ports.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-15265", "url": "https://www.suse.com/security/cve/CVE-2017-15265" }, { "category": "external", "summary": "SUSE Bug 1062520 for CVE-2017-15265", "url": "https://bugzilla.suse.com/1062520" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-15265", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2017-15265" }, { "cve": "CVE-2017-16536", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16536" } ], "notes": [ { "category": "general", "text": "The cx231xx_usb_probe function in drivers/media/usb/cx231xx/cx231xx-cards.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16536", "url": "https://www.suse.com/security/cve/CVE-2017-16536" }, { "category": "external", "summary": "SUSE Bug 1066606 for CVE-2017-16536", "url": "https://bugzilla.suse.com/1066606" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16536", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16536", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16536" }, { "cve": "CVE-2017-16537", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16537" } ], "notes": [ { "category": "general", "text": "The imon_probe function in drivers/media/rc/imon.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16537", "url": "https://www.suse.com/security/cve/CVE-2017-16537" }, { "category": "external", "summary": "SUSE Bug 1066573 for CVE-2017-16537", "url": "https://bugzilla.suse.com/1066573" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16537", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16537", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16537" }, { "cve": "CVE-2017-16645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16645" } ], "notes": [ { "category": "general", "text": "The ims_pcu_get_cdc_union_desc function in drivers/input/misc/ims-pcu.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (ims_pcu_parse_cdc_data out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16645", "url": "https://www.suse.com/security/cve/CVE-2017-16645" }, { "category": "external", "summary": "SUSE Bug 1067132 for CVE-2017-16645", "url": "https://bugzilla.suse.com/1067132" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16645", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16645", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16645" }, { "cve": "CVE-2017-16646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16646" } ], "notes": [ { "category": "general", "text": "drivers/media/usb/dvb-usb/dib0700_devices.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (BUG and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16646", "url": "https://www.suse.com/security/cve/CVE-2017-16646" }, { "category": "external", "summary": "SUSE Bug 1067105 for CVE-2017-16646", "url": "https://bugzilla.suse.com/1067105" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16646", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16646" }, { "cve": "CVE-2017-16647", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16647" } ], "notes": [ { "category": "general", "text": "drivers/net/usb/asix_devices.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16647", "url": "https://www.suse.com/security/cve/CVE-2017-16647" }, { "category": "external", "summary": "SUSE Bug 1067102 for CVE-2017-16647", "url": "https://bugzilla.suse.com/1067102" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16647", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16647" }, { "cve": "CVE-2017-16648", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16648" } ], "notes": [ { "category": "general", "text": "The dvb_frontend_free function in drivers/media/dvb-core/dvb_frontend.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device. NOTE: the function was later renamed __dvb_frontend_free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16648", "url": "https://www.suse.com/security/cve/CVE-2017-16648" }, { "category": "external", "summary": "SUSE Bug 1067087 for CVE-2017-16648", "url": "https://bugzilla.suse.com/1067087" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16648", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16648", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16648" }, { "cve": "CVE-2017-16995", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16995" } ], "notes": [ { "category": "general", "text": "The check_alu_op function in kernel/bpf/verifier.c in the Linux kernel through 4.4 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect sign extension.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16995", "url": "https://www.suse.com/security/cve/CVE-2017-16995" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-16995", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16995" }, { "cve": "CVE-2017-16996", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16996" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging register truncation mishandling.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16996", "url": "https://www.suse.com/security/cve/CVE-2017-16996" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-16996", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-16996" }, { "cve": "CVE-2017-17448", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17448" } ], "notes": [ { "category": "general", "text": "net/netfilter/nfnetlink_cthelper.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for new, get, and del operations, which allows local users to bypass intended access restrictions because the nfnl_cthelper_list data structure is shared across all net namespaces.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17448", "url": "https://www.suse.com/security/cve/CVE-2017-17448" }, { "category": "external", "summary": "SUSE Bug 1071693 for CVE-2017-17448", "url": "https://bugzilla.suse.com/1071693" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17448" }, { "cve": "CVE-2017-17449", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17449" } ], "notes": [ { "category": "general", "text": "The __netlink_deliver_tap_skb function in net/netlink/af_netlink.c in the Linux kernel through 4.14.4, when CONFIG_NLMON is enabled, does not restrict observations of Netlink messages to a single net namespace, which allows local users to obtain sensitive information by leveraging the CAP_NET_ADMIN capability to sniff an nlmon interface for all Netlink activity on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17449", "url": "https://www.suse.com/security/cve/CVE-2017-17449" }, { "category": "external", "summary": "SUSE Bug 1071694 for CVE-2017-17449", "url": "https://bugzilla.suse.com/1071694" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17449" }, { "cve": "CVE-2017-17450", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17450" } ], "notes": [ { "category": "general", "text": "net/netfilter/xt_osf.c in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for add_callback and remove_callback operations, which allows local users to bypass intended access restrictions because the xt_osf_fingers data structure is shared across all net namespaces.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17450", "url": "https://www.suse.com/security/cve/CVE-2017-17450" }, { "category": "external", "summary": "SUSE Bug 1071695 for CVE-2017-17450", "url": "https://bugzilla.suse.com/1071695" }, { "category": "external", "summary": "SUSE Bug 1074033 for CVE-2017-17450", "url": "https://bugzilla.suse.com/1074033" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-17450", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17450" }, { "cve": "CVE-2017-17852", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17852" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of 32-bit ALU ops.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17852", "url": "https://www.suse.com/security/cve/CVE-2017-17852" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17852", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17852" }, { "cve": "CVE-2017-17853", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17853" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect BPF_RSH signed bounds calculations.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17853", "url": "https://www.suse.com/security/cve/CVE-2017-17853" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17853", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17853" }, { "cve": "CVE-2017-17854", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17854" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (integer overflow and memory corruption) or possibly have unspecified other impact by leveraging unrestricted integer values for pointer arithmetic.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17854", "url": "https://www.suse.com/security/cve/CVE-2017-17854" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17854", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17854" }, { "cve": "CVE-2017-17855", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17855" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging improper use of pointers in place of scalars.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17855", "url": "https://www.suse.com/security/cve/CVE-2017-17855" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17855", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17855" }, { "cve": "CVE-2017-17856", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17856" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging the lack of stack-pointer alignment enforcement.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17856", "url": "https://www.suse.com/security/cve/CVE-2017-17856" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17856", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17856" }, { "cve": "CVE-2017-17857", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17857" } ], "notes": [ { "category": "general", "text": "The check_stack_boundary function in kernel/bpf/verifier.c in the Linux kernel through 4.14.8 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging mishandling of invalid variable stack read operations.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17857", "url": "https://www.suse.com/security/cve/CVE-2017-17857" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17857", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17857" }, { "cve": "CVE-2017-17862", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-17862" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 ignores unreachable code, even though it would still be processed by JIT compilers. This behavior, also considered an improper branch-pruning logic issue, could possibly be used by local users for denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-17862", "url": "https://www.suse.com/security/cve/CVE-2017-17862" }, { "category": "external", "summary": "SUSE Bug 1073928 for CVE-2017-17862", "url": "https://bugzilla.suse.com/1073928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-17862" }, { "cve": "CVE-2017-5123", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5123" } ], "notes": [ { "category": "general", "text": "Insufficient data validation in waitid allowed an user to escape sandboxes on Linux.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5123", "url": "https://www.suse.com/security/cve/CVE-2017-5123" }, { "category": "external", "summary": "SUSE Bug 1062473 for CVE-2017-5123", "url": "https://bugzilla.suse.com/1062473" }, { "category": "external", "summary": "SUSE Bug 1122971 for CVE-2017-5123", "url": "https://bugzilla.suse.com/1122971" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-5123" }, { "cve": "CVE-2017-5715", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5715" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5715", "url": "https://www.suse.com/security/cve/CVE-2017-5715" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1074741 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074741" }, { "category": "external", "summary": "SUSE Bug 1074919 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1074919" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075007 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075007" }, { "category": "external", "summary": "SUSE Bug 1075262 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075262" }, { "category": "external", "summary": "SUSE Bug 1075419 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1075419" }, { "category": "external", "summary": "SUSE Bug 1076115 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1076115" }, { "category": "external", "summary": "SUSE Bug 1076372 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1076372" }, { "category": "external", "summary": "SUSE Bug 1076606 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1076606" }, { "category": "external", "summary": "SUSE Bug 1078353 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1078353" }, { "category": "external", "summary": "SUSE Bug 1080039 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1080039" }, { "category": "external", "summary": "SUSE Bug 1087887 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1087887" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1088147 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1088147" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1095735 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1095735" }, { "category": "external", "summary": "SUSE Bug 1102517 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1102517" }, { "category": "external", "summary": "SUSE Bug 1105108 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1105108" }, { "category": "external", "summary": "SUSE Bug 1126516 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1126516" }, { "category": "external", "summary": "SUSE Bug 1173489 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1173489" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201457 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1201457" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1203236 for CVE-2017-5715", "url": "https://bugzilla.suse.com/1203236" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-5715" }, { "cve": "CVE-2017-5753", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5753" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5753", "url": "https://www.suse.com/security/cve/CVE-2017-5753" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075419 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075419" }, { "category": "external", "summary": "SUSE Bug 1075748 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075748" }, { "category": "external", "summary": "SUSE Bug 1080039 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1080039" }, { "category": "external", "summary": "SUSE Bug 1087084 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087084" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1209547 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1209547" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-5753" }, { "cve": "CVE-2017-5754", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5754" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5754", "url": "https://www.suse.com/security/cve/CVE-2017-5754" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075008 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1075008" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1115045 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1115045" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5754", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-5754" }, { "cve": "CVE-2017-7541", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7541" } ], "notes": [ { "category": "general", "text": "The brcmf_cfg80211_mgmt_tx function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel before 4.12.3 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted NL80211_CMD_FRAME Netlink packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7541", "url": "https://www.suse.com/security/cve/CVE-2017-7541" }, { "category": "external", "summary": "SUSE Bug 1049645 for CVE-2017-7541", "url": "https://bugzilla.suse.com/1049645" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-7541" }, { "cve": "CVE-2017-7542", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7542" } ], "notes": [ { "category": "general", "text": "The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel through 4.12.3 allows local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7542", "url": "https://www.suse.com/security/cve/CVE-2017-7542" }, { "category": "external", "summary": "SUSE Bug 1049882 for CVE-2017-7542", "url": "https://bugzilla.suse.com/1049882" }, { "category": "external", "summary": "SUSE Bug 1061936 for CVE-2017-7542", "url": "https://bugzilla.suse.com/1061936" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-7542" }, { "cve": "CVE-2017-8824", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-8824" } ], "notes": [ { "category": "general", "text": "The dccp_disconnect function in net/dccp/proto.c in the Linux kernel through 4.14.3 allows local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-8824", "url": "https://www.suse.com/security/cve/CVE-2017-8824" }, { "category": "external", "summary": "SUSE Bug 1070771 for CVE-2017-8824", "url": "https://bugzilla.suse.com/1070771" }, { "category": "external", "summary": "SUSE Bug 1076734 for CVE-2017-8824", "url": "https://bugzilla.suse.com/1076734" }, { "category": "external", "summary": "SUSE Bug 1092904 for CVE-2017-8824", "url": "https://bugzilla.suse.com/1092904" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-8824", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-8824" }, { "cve": "CVE-2017-8831", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-8831" } ], "notes": [ { "category": "general", "text": "The saa7164_bus_get function in drivers/media/pci/saa7164/saa7164-bus.c in the Linux kernel through 4.11.5 allows local users to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact by changing a certain sequence-number value, aka a \"double fetch\" vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-8831", "url": "https://www.suse.com/security/cve/CVE-2017-8831" }, { "category": "external", "summary": "SUSE Bug 1037994 for CVE-2017-8831", "url": "https://bugzilla.suse.com/1037994" }, { "category": "external", "summary": "SUSE Bug 1061936 for CVE-2017-8831", "url": "https://bugzilla.suse.com/1061936" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-8831", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-8831", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2017-8831" }, { "cve": "CVE-2018-1000004", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000004" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.12, 3.10, 2.6 and possibly earlier versions a race condition vulnerability exists in the sound system, this can lead to a deadlock and denial of service condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000004", "url": "https://www.suse.com/security/cve/CVE-2018-1000004" }, { "category": "external", "summary": "SUSE Bug 1076017 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1076017" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-1000004", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-1000004" }, { "cve": "CVE-2018-10322", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10322" } ], "notes": [ { "category": "general", "text": "The xfs_dinode_verify function in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_ilock_attr_map_shared invalid pointer dereference) via a crafted xfs image.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10322", "url": "https://www.suse.com/security/cve/CVE-2018-10322" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10322", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090749 for CVE-2018-10322", "url": "https://bugzilla.suse.com/1090749" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-10322" }, { "cve": "CVE-2018-10323", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-10323" } ], "notes": [ { "category": "general", "text": "The xfs_bmap_extents_to_btree function in fs/xfs/libxfs/xfs_bmap.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_bmapi_write NULL pointer dereference) via a crafted xfs image.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-10323", "url": "https://www.suse.com/security/cve/CVE-2018-10323" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-10323", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1090717 for CVE-2018-10323", "url": "https://bugzilla.suse.com/1090717" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-10323" }, { "cve": "CVE-2018-1068", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1068" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux 4.x kernel\u0027s implementation of 32-bit syscall interface for bridging. This allowed a privileged user to arbitrarily write to a limited range of kernel memory.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1068", "url": "https://www.suse.com/security/cve/CVE-2018-1068" }, { "category": "external", "summary": "SUSE Bug 1085107 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085107" }, { "category": "external", "summary": "SUSE Bug 1085114 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1085114" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1123903 for CVE-2018-1068", "url": "https://bugzilla.suse.com/1123903" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-1068" }, { "cve": "CVE-2018-1118", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1118" } ], "notes": [ { "category": "general", "text": "Linux kernel vhost since version 4.8 does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1118", "url": "https://www.suse.com/security/cve/CVE-2018-1118" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1118", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1092472 for CVE-2018-1118", "url": "https://bugzilla.suse.com/1092472" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-1118" }, { "cve": "CVE-2018-12232", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12232" } ], "notes": [ { "category": "general", "text": "In net/socket.c in the Linux kernel through 4.17.1, there is a race condition between fchownat and close in cases where they target the same socket file descriptor, related to the sock_close and sockfs_setattr functions. fchownat does not increment the file descriptor reference count, which allows close to set the socket to NULL during fchownat\u0027s execution, leading to a NULL pointer dereference and system crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12232", "url": "https://www.suse.com/security/cve/CVE-2018-12232" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-12232", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1097593 for CVE-2018-12232", "url": "https://bugzilla.suse.com/1097593" }, { "category": "external", "summary": "SUSE Bug 1125907 for CVE-2018-12232", "url": "https://bugzilla.suse.com/1125907" }, { "category": "external", "summary": "SUSE Bug 1127757 for CVE-2018-12232", "url": "https://bugzilla.suse.com/1127757" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-12232" }, { "cve": "CVE-2018-12714", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12714" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 4.17.2. The filter parsing in kernel/trace/trace_events_filter.c could be called with no filter, which is an N=0 case when it expected at least one line to have been read, thus making the N-1 index invalid. This allows attackers to cause a denial of service (slab out-of-bounds write) or possibly have unspecified other impact via crafted perf_event_open and mmap system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12714", "url": "https://www.suse.com/security/cve/CVE-2018-12714" }, { "category": "external", "summary": "SUSE Bug 1098933 for CVE-2018-12714", "url": "https://bugzilla.suse.com/1098933" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2018-12714" }, { "cve": "CVE-2018-13053", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-13053" } ], "notes": [ { "category": "general", "text": "The alarm_timer_nsleep function in kernel/time/alarmtimer.c in the Linux kernel through 4.17.3 has an integer overflow via a large relative timeout because ktime_add_safe is not used.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-13053", "url": "https://www.suse.com/security/cve/CVE-2018-13053" }, { "category": "external", "summary": "SUSE Bug 1099924 for CVE-2018-13053", "url": "https://bugzilla.suse.com/1099924" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-13053", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-13053" }, { "cve": "CVE-2018-18710", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-18710" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-18710", "url": "https://www.suse.com/security/cve/CVE-2018-18710" }, { "category": "external", "summary": "SUSE Bug 1113751 for CVE-2018-18710", "url": "https://bugzilla.suse.com/1113751" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-18710" }, { "cve": "CVE-2018-19824", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-19824" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 4.19.6, a local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-19824", "url": "https://www.suse.com/security/cve/CVE-2018-19824" }, { "category": "external", "summary": "SUSE Bug 1118152 for CVE-2018-19824", "url": "https://bugzilla.suse.com/1118152" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-19824" }, { "cve": "CVE-2018-5332", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5332" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 3.2, the rds_message_alloc_sgs() function does not validate a value that is used during DMA page allocation, leading to a heap-based out-of-bounds write (related to the rds_rdma_extra_size function in net/rds/rdma.c).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5332", "url": "https://www.suse.com/security/cve/CVE-2018-5332" }, { "category": "external", "summary": "SUSE Bug 1075621 for CVE-2018-5332", "url": "https://bugzilla.suse.com/1075621" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-5332", "url": "https://bugzilla.suse.com/1091815" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2018-5332", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-5332" }, { "cve": "CVE-2018-5333", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5333" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdma.c mishandles cases where page pinning fails or an invalid address is supplied, leading to an rds_atomic_free_op NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5333", "url": "https://www.suse.com/security/cve/CVE-2018-5333" }, { "category": "external", "summary": "SUSE Bug 1075617 for CVE-2018-5333", "url": "https://bugzilla.suse.com/1075617" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-5333", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-5333" }, { "cve": "CVE-2018-8043", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8043" } ], "notes": [ { "category": "general", "text": "The unimac_mdio_probe function in drivers/net/phy/mdio-bcm-unimac.c in the Linux kernel through 4.15.8 does not validate certain resource availability, which allows local users to cause a denial of service (NULL pointer dereference).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8043", "url": "https://www.suse.com/security/cve/CVE-2018-8043" }, { "category": "external", "summary": "SUSE Bug 1084829 for CVE-2018-8043", "url": "https://bugzilla.suse.com/1084829" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 0, "baseSeverity": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2018-8043" }, { "cve": "CVE-2018-8087", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8087" } ], "notes": [ { "category": "general", "text": "Memory leak in the hwsim_new_radio_nl function in drivers/net/wireless/mac80211_hwsim.c in the Linux kernel through 4.15.9 allows local users to cause a denial of service (memory consumption) by triggering an out-of-array error case.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8087", "url": "https://www.suse.com/security/cve/CVE-2018-8087" }, { "category": "external", "summary": "SUSE Bug 1085053 for CVE-2018-8087", "url": "https://bugzilla.suse.com/1085053" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-8087" }, { "cve": "CVE-2018-8822", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-8822" } ], "notes": [ { "category": "general", "text": "Incorrect buffer length handling in the ncp_read_kernel function in fs/ncpfs/ncplib_kernel.c in the Linux kernel through 4.15.11, and in drivers/staging/ncpfs/ncplib_kernel.c in the Linux kernel 4.16-rc through 4.16-rc6, could be exploited by malicious NCPFS servers to crash the kernel or execute code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-8822", "url": "https://www.suse.com/security/cve/CVE-2018-8822" }, { "category": "external", "summary": "SUSE Bug 1086162 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1086162" }, { "category": "external", "summary": "SUSE Bug 1090404 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1090404" }, { "category": "external", "summary": "SUSE Bug 1091815 for CVE-2018-8822", "url": "https://bugzilla.suse.com/1091815" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2018-8822" }, { "cve": "CVE-2019-10207", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10207" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s Bluetooth implementation of UART, all versions kernel 3.x.x before 4.18.0 and kernel 5.x.x. An attacker with local access and write permissions to the Bluetooth hardware could use this flaw to issue a specially crafted ioctl function call and cause the system to crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10207", "url": "https://www.suse.com/security/cve/CVE-2019-10207" }, { "category": "external", "summary": "SUSE Bug 1123959 for CVE-2019-10207", "url": "https://bugzilla.suse.com/1123959" }, { "category": "external", "summary": "SUSE Bug 1142857 for CVE-2019-10207", "url": "https://bugzilla.suse.com/1142857" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2019-10207" }, { "cve": "CVE-2019-11477", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11477" } ], "notes": [ { "category": "general", "text": "Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11477", "url": "https://www.suse.com/security/cve/CVE-2019-11477" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1137586 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1137586" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1142129" }, { "category": "external", "summary": "SUSE Bug 1153242 for CVE-2019-11477", "url": "https://bugzilla.suse.com/1153242" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-11477" }, { "cve": "CVE-2019-11478", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11478" } ], "notes": [ { "category": "general", "text": "Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit f070ef2ac66716357066b683fb0baf55f8191a2e.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11478", "url": "https://www.suse.com/security/cve/CVE-2019-11478" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1137586 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1137586" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1142129" }, { "category": "external", "summary": "SUSE Bug 1143542 for CVE-2019-11478", "url": "https://bugzilla.suse.com/1143542" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-11478" }, { "cve": "CVE-2019-11479", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11479" } ], "notes": [ { "category": "general", "text": "Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commits 967c05aee439e6e5d7d805e195b3a20ef5c433d6 and 5f3e2bf008c2221478101ee72f5cb4654b9fc363.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11479", "url": "https://www.suse.com/security/cve/CVE-2019-11479" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2019-11479", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1137586 for CVE-2019-11479", "url": "https://bugzilla.suse.com/1137586" }, { "category": "external", "summary": "SUSE Bug 1142129 for CVE-2019-11479", "url": "https://bugzilla.suse.com/1142129" }, { "category": "external", "summary": "SUSE Bug 1143542 for CVE-2019-11479", "url": "https://bugzilla.suse.com/1143542" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-11479" }, { "cve": "CVE-2019-14615", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14615" } ], "notes": [ { "category": "general", "text": "Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may allow an unauthenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14615", "url": "https://www.suse.com/security/cve/CVE-2019-14615" }, { "category": "external", "summary": "SUSE Bug 1160195 for CVE-2019-14615", "url": "https://bugzilla.suse.com/1160195" }, { "category": "external", "summary": "SUSE Bug 1165881 for CVE-2019-14615", "url": "https://bugzilla.suse.com/1165881" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-14615" }, { "cve": "CVE-2019-14814", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14814" } ], "notes": [ { "category": "general", "text": "There is heap-based buffer overflow in Linux kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14814", "url": "https://www.suse.com/security/cve/CVE-2019-14814" }, { "category": "external", "summary": "SUSE Bug 1146512 for CVE-2019-14814", "url": "https://bugzilla.suse.com/1146512" }, { "category": "external", "summary": "SUSE Bug 1173664 for CVE-2019-14814", "url": "https://bugzilla.suse.com/1173664" }, { "category": "external", "summary": "SUSE Bug 1173665 for CVE-2019-14814", "url": "https://bugzilla.suse.com/1173665" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-14814" }, { "cve": "CVE-2019-14896", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-14896" } ], "notes": [ { "category": "general", "text": "A heap-based buffer overflow vulnerability was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-14896", "url": "https://www.suse.com/security/cve/CVE-2019-14896" }, { "category": "external", "summary": "SUSE Bug 1157157 for CVE-2019-14896", "url": "https://bugzilla.suse.com/1157157" }, { "category": "external", "summary": "SUSE Bug 1160468 for CVE-2019-14896", "url": "https://bugzilla.suse.com/1160468" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-14896" }, { "cve": "CVE-2019-15030", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15030" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users\u0027 processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15030", "url": "https://www.suse.com/security/cve/CVE-2019-15030" }, { "category": "external", "summary": "SUSE Bug 1149713 for CVE-2019-15030", "url": "https://bugzilla.suse.com/1149713" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15030" }, { "cve": "CVE-2019-15031", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15031" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users\u0027 processes via an interrupt. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process, because MSR_TM_ACTIVE is misused in arch/powerpc/kernel/process.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15031", "url": "https://www.suse.com/security/cve/CVE-2019-15031" }, { "category": "external", "summary": "SUSE Bug 1149713 for CVE-2019-15031", "url": "https://bugzilla.suse.com/1149713" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15031" }, { "cve": "CVE-2019-15098", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15098" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/ath/ath6kl/usb.c in the Linux kernel through 5.2.9 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15098", "url": "https://www.suse.com/security/cve/CVE-2019-15098" }, { "category": "external", "summary": "SUSE Bug 1146378 for CVE-2019-15098", "url": "https://bugzilla.suse.com/1146378" }, { "category": "external", "summary": "SUSE Bug 1146543 for CVE-2019-15098", "url": "https://bugzilla.suse.com/1146543" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15098" }, { "cve": "CVE-2019-15099", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15099" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/ath/ath10k/usb.c in the Linux kernel through 5.2.8 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15099", "url": "https://www.suse.com/security/cve/CVE-2019-15099" }, { "category": "external", "summary": "SUSE Bug 1146368 for CVE-2019-15099", "url": "https://bugzilla.suse.com/1146368" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15099" }, { "cve": "CVE-2019-15290", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15290" } ], "notes": [ { "category": "general", "text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-15098. Reason: This candidate is a duplicate of CVE-2019-15098. Notes: All CVE users should reference CVE-2019-15098 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15290", "url": "https://www.suse.com/security/cve/CVE-2019-15290" }, { "category": "external", "summary": "SUSE Bug 1146378 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1146378" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1146519" }, { "category": "external", "summary": "SUSE Bug 1146543 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1146543" }, { "category": "external", "summary": "SUSE Bug 1158381 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1158381" }, { "category": "external", "summary": "SUSE Bug 1158834 for CVE-2019-15290", "url": "https://bugzilla.suse.com/1158834" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15290" }, { "cve": "CVE-2019-15504", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15504" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/rsi/rsi_91x_usb.c in the Linux kernel through 5.2.9 has a Double Free via crafted USB device traffic (which may be remote via usbip or usbredir).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15504", "url": "https://www.suse.com/security/cve/CVE-2019-15504" }, { "category": "external", "summary": "SUSE Bug 1147116 for CVE-2019-15504", "url": "https://bugzilla.suse.com/1147116" }, { "category": "external", "summary": "SUSE Bug 1185852 for CVE-2019-15504", "url": "https://bugzilla.suse.com/1185852" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-15504" }, { "cve": "CVE-2019-15902", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-15902" } ], "notes": [ { "category": "general", "text": "A backporting error was discovered in the Linux stable/longterm kernel 4.4.x through 4.4.190, 4.9.x through 4.9.190, 4.14.x through 4.14.141, 4.19.x through 4.19.69, and 5.2.x through 5.2.11. Misuse of the upstream \"x86/ptrace: Fix possible spectre-v1 in ptrace_get_debugreg()\" commit reintroduced the Spectre vulnerability that it aimed to eliminate. This occurred because the backport process depends on cherry picking specific commits, and because two (correctly ordered) code lines were swapped.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-15902", "url": "https://www.suse.com/security/cve/CVE-2019-15902" }, { "category": "external", "summary": "SUSE Bug 1149376 for CVE-2019-15902", "url": "https://bugzilla.suse.com/1149376" }, { "category": "external", "summary": "SUSE Bug 1155131 for CVE-2019-15902", "url": "https://bugzilla.suse.com/1155131" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-15902" }, { "cve": "CVE-2019-16231", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16231" } ], "notes": [ { "category": "general", "text": "drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16231", "url": "https://www.suse.com/security/cve/CVE-2019-16231" }, { "category": "external", "summary": "SUSE Bug 1150466 for CVE-2019-16231", "url": "https://bugzilla.suse.com/1150466" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-16231" }, { "cve": "CVE-2019-16232", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16232" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16232", "url": "https://www.suse.com/security/cve/CVE-2019-16232" }, { "category": "external", "summary": "SUSE Bug 1150465 for CVE-2019-16232", "url": "https://bugzilla.suse.com/1150465" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-16232" }, { "cve": "CVE-2019-16234", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16234" } ], "notes": [ { "category": "general", "text": "drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16234", "url": "https://www.suse.com/security/cve/CVE-2019-16234" }, { "category": "external", "summary": "SUSE Bug 1150452 for CVE-2019-16234", "url": "https://bugzilla.suse.com/1150452" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2019-16234" }, { "cve": "CVE-2019-17133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-17133" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-17133", "url": "https://www.suse.com/security/cve/CVE-2019-17133" }, { "category": "external", "summary": "SUSE Bug 1153158 for CVE-2019-17133", "url": "https://bugzilla.suse.com/1153158" }, { "category": "external", "summary": "SUSE Bug 1153161 for CVE-2019-17133", "url": "https://bugzilla.suse.com/1153161" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-17133" }, { "cve": "CVE-2019-17666", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-17666" } ], "notes": [ { "category": "general", "text": "rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-17666", "url": "https://www.suse.com/security/cve/CVE-2019-17666" }, { "category": "external", "summary": "SUSE Bug 1154372 for CVE-2019-17666", "url": "https://bugzilla.suse.com/1154372" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-17666" }, { "cve": "CVE-2019-18808", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-18808" } ], "notes": [ { "category": "general", "text": "A memory leak in the ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-128c66429247.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-18808", "url": "https://www.suse.com/security/cve/CVE-2019-18808" }, { "category": "external", "summary": "SUSE Bug 1156259 for CVE-2019-18808", "url": "https://bugzilla.suse.com/1156259" }, { "category": "external", "summary": "SUSE Bug 1189884 for CVE-2019-18808", "url": "https://bugzilla.suse.com/1189884" }, { "category": "external", "summary": "SUSE Bug 1190534 for CVE-2019-18808", "url": "https://bugzilla.suse.com/1190534" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-18808" }, { "cve": "CVE-2019-18812", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-18812" } ], "notes": [ { "category": "general", "text": "A memory leak in the sof_dfsentry_write() function in sound/soc/sof/debug.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-c0a333d842ef.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-18812", "url": "https://www.suse.com/security/cve/CVE-2019-18812" }, { "category": "external", "summary": "SUSE Bug 1156277 for CVE-2019-18812", "url": "https://bugzilla.suse.com/1156277" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-18812" }, { "cve": "CVE-2019-18813", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-18813" } ], "notes": [ { "category": "general", "text": "A memory leak in the dwc3_pci_probe() function in drivers/usb/dwc3/dwc3-pci.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering platform_device_add_properties() failures, aka CID-9bbfceea12a8.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-18813", "url": "https://www.suse.com/security/cve/CVE-2019-18813" }, { "category": "external", "summary": "SUSE Bug 1156278 for CVE-2019-18813", "url": "https://bugzilla.suse.com/1156278" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-18813" }, { "cve": "CVE-2019-19252", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19252" } ], "notes": [ { "category": "general", "text": "vcs_write in drivers/tty/vt/vc_screen.c in the Linux kernel through 5.3.13 does not prevent write access to vcsu devices, aka CID-0c9acb1af77a.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19252", "url": "https://www.suse.com/security/cve/CVE-2019-19252" }, { "category": "external", "summary": "SUSE Bug 1157813 for CVE-2019-19252", "url": "https://bugzilla.suse.com/1157813" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-19252" }, { "cve": "CVE-2019-19332", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19332" } ], "notes": [ { "category": "general", "text": "An out-of-bounds memory write issue was found in the Linux Kernel, version 3.13 through 5.4, in the way the Linux kernel\u0027s KVM hypervisor handled the \u0027KVM_GET_EMULATED_CPUID\u0027 ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the \u0027/dev/kvm\u0027 device could use this flaw to crash the system, resulting in a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19332", "url": "https://www.suse.com/security/cve/CVE-2019-19332" }, { "category": "external", "summary": "SUSE Bug 1158827 for CVE-2019-19332", "url": "https://bugzilla.suse.com/1158827" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-19332" }, { "cve": "CVE-2019-19338", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19338" } ], "notes": [ { "category": "general", "text": "A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions before 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA flaw (TAA_NO=0), but is not affected by the MDS issue (MDS_NO=1), the guest was to clear the affected buffers by using a VERW instruction mechanism. But when the MDS_NO=1 bit was exported to the guests, the guests did not use the VERW mechanism to clear the affected buffers. This issue affects guests running on Cascade Lake CPUs and requires that host has \u0027TSX\u0027 enabled. Confidentiality of data is the highest threat associated with this vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19338", "url": "https://www.suse.com/security/cve/CVE-2019-19338" }, { "category": "external", "summary": "SUSE Bug 1158954 for CVE-2019-19338", "url": "https://bugzilla.suse.com/1158954" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-19338" }, { "cve": "CVE-2019-3016", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3016" } ], "notes": [ { "category": "general", "text": "In a Linux KVM guest that has PV TLB enabled, a process in the guest kernel may be able to read memory locations from another process in the same guest. This problem is limit to the host running linux kernel 4.10 with a guest running linux kernel 4.16 or later. The problem mainly affects AMD processors but Intel CPUs cannot be ruled out.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3016", "url": "https://www.suse.com/security/cve/CVE-2019-3016" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2019-3016", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1161154 for CVE-2019-3016", "url": "https://bugzilla.suse.com/1161154" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-3016" }, { "cve": "CVE-2019-3846", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3846" } ], "notes": [ { "category": "general", "text": "A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3846", "url": "https://www.suse.com/security/cve/CVE-2019-3846" }, { "category": "external", "summary": "SUSE Bug 1136424 for CVE-2019-3846", "url": "https://bugzilla.suse.com/1136424" }, { "category": "external", "summary": "SUSE Bug 1136446 for CVE-2019-3846", "url": "https://bugzilla.suse.com/1136446" }, { "category": "external", "summary": "SUSE Bug 1156330 for CVE-2019-3846", "url": "https://bugzilla.suse.com/1156330" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-3846" }, { "cve": "CVE-2019-3882", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3882" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s vfio interface implementation that permits violation of the user\u0027s locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS). Versions 3.10, 4.14 and 4.18 are vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3882", "url": "https://www.suse.com/security/cve/CVE-2019-3882" }, { "category": "external", "summary": "SUSE Bug 1131416 for CVE-2019-3882", "url": "https://bugzilla.suse.com/1131416" }, { "category": "external", "summary": "SUSE Bug 1131427 for CVE-2019-3882", "url": "https://bugzilla.suse.com/1131427" }, { "category": "external", "summary": "SUSE Bug 1133319 for CVE-2019-3882", "url": "https://bugzilla.suse.com/1133319" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-3882" }, { "cve": "CVE-2019-3887", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3887" } ], "notes": [ { "category": "general", "text": "A flaw was found in the way KVM hypervisor handled x2APIC Machine Specific Rregister (MSR) access with nested(=1) virtualization enabled. In that, L1 guest could access L0\u0027s APIC register values via L2 guest, when \u0027virtualize x2APIC mode\u0027 is enabled. A guest could use this flaw to potentially crash the host kernel resulting in DoS issue. Kernel versions from 4.16 and newer are vulnerable to this issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3887", "url": "https://www.suse.com/security/cve/CVE-2019-3887" }, { "category": "external", "summary": "SUSE Bug 1131800 for CVE-2019-3887", "url": "https://bugzilla.suse.com/1131800" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-3887" }, { "cve": "CVE-2019-6974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6974" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6974", "url": "https://www.suse.com/security/cve/CVE-2019-6974" }, { "category": "external", "summary": "SUSE Bug 1124728 for CVE-2019-6974", "url": "https://bugzilla.suse.com/1124728" }, { "category": "external", "summary": "SUSE Bug 1124729 for CVE-2019-6974", "url": "https://bugzilla.suse.com/1124729" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-6974" }, { "cve": "CVE-2019-7221", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7221" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7221", "url": "https://www.suse.com/security/cve/CVE-2019-7221" }, { "category": "external", "summary": "SUSE Bug 1124732 for CVE-2019-7221", "url": "https://bugzilla.suse.com/1124732" }, { "category": "external", "summary": "SUSE Bug 1124734 for CVE-2019-7221", "url": "https://bugzilla.suse.com/1124734" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-7221" }, { "cve": "CVE-2019-7222", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7222" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7222", "url": "https://www.suse.com/security/cve/CVE-2019-7222" }, { "category": "external", "summary": "SUSE Bug 1124735 for CVE-2019-7222", "url": "https://bugzilla.suse.com/1124735" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2019-7222" }, { "cve": "CVE-2019-8564", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8564" } ], "notes": [ { "category": "general", "text": "A logic issue was addressed with improved validation. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra. An attacker in a privileged network position can modify driver state.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8564", "url": "https://www.suse.com/security/cve/CVE-2019-8564" }, { "category": "external", "summary": "SUSE Bug 1132673 for CVE-2019-8564", "url": "https://bugzilla.suse.com/1132673" }, { "category": "external", "summary": "SUSE Bug 1132828 for CVE-2019-8564", "url": "https://bugzilla.suse.com/1132828" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-8564" }, { "cve": "CVE-2019-8912", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8912" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 4.20.11, af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8912", "url": "https://www.suse.com/security/cve/CVE-2019-8912" }, { "category": "external", "summary": "SUSE Bug 1125907 for CVE-2019-8912", "url": "https://bugzilla.suse.com/1125907" }, { "category": "external", "summary": "SUSE Bug 1126284 for CVE-2019-8912", "url": "https://bugzilla.suse.com/1126284" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-8912" }, { "cve": "CVE-2019-9500", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9500" } ], "notes": [ { "category": "general", "text": "The Broadcom brcmfmac WiFi driver prior to commit 1b5e2423164b3670e8bc9174e4762d297990deff is vulnerable to a heap buffer overflow. If the Wake-up on Wireless LAN functionality is configured, a malicious event frame can be constructed to trigger an heap buffer overflow in the brcmf_wowl_nd_results function. This vulnerability can be exploited with compromised chipsets to compromise the host, or when used in combination with CVE-2019-9503, can be used remotely. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9500", "url": "https://www.suse.com/security/cve/CVE-2019-9500" }, { "category": "external", "summary": "SUSE Bug 1132681 for CVE-2019-9500", "url": "https://bugzilla.suse.com/1132681" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-9500" }, { "cve": "CVE-2020-10135", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10135" } ], "notes": [ { "category": "general", "text": "Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10135", "url": "https://www.suse.com/security/cve/CVE-2020-10135" }, { "category": "external", "summary": "SUSE Bug 1171988 for CVE-2020-10135", "url": "https://bugzilla.suse.com/1171988" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-10135" }, { "cve": "CVE-2020-10766", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10766" } ], "notes": [ { "category": "general", "text": "A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10766", "url": "https://www.suse.com/security/cve/CVE-2020-10766" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172781 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1172781" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-10766" }, { "cve": "CVE-2020-10767", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10767" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10767", "url": "https://www.suse.com/security/cve/CVE-2020-10767" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172782 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1172782" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-10767" }, { "cve": "CVE-2020-10768", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10768" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10768", "url": "https://www.suse.com/security/cve/CVE-2020-10768" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172783 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1172783" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-10768" }, { "cve": "CVE-2020-12351", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12351" } ], "notes": [ { "category": "general", "text": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12351", "url": "https://www.suse.com/security/cve/CVE-2020-12351" }, { "category": "external", "summary": "SUSE Bug 1177724 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177724" }, { "category": "external", "summary": "SUSE Bug 1177729 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1177729" }, { "category": "external", "summary": "SUSE Bug 1178397 for CVE-2020-12351", "url": "https://bugzilla.suse.com/1178397" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-12351" }, { "cve": "CVE-2020-12352", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12352" } ], "notes": [ { "category": "general", "text": "Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12352", "url": "https://www.suse.com/security/cve/CVE-2020-12352" }, { "category": "external", "summary": "SUSE Bug 1177725 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1177725" }, { "category": "external", "summary": "SUSE Bug 1178398 for CVE-2020-12352", "url": "https://bugzilla.suse.com/1178398" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.1, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-12352" }, { "cve": "CVE-2020-14331", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14331" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14331", "url": "https://www.suse.com/security/cve/CVE-2020-14331" }, { "category": "external", "summary": "SUSE Bug 1174205 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174205" }, { "category": "external", "summary": "SUSE Bug 1174247 for CVE-2020-14331", "url": "https://bugzilla.suse.com/1174247" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14331" }, { "cve": "CVE-2020-14386", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14386" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14386", "url": "https://www.suse.com/security/cve/CVE-2020-14386" }, { "category": "external", "summary": "SUSE Bug 1176069 for CVE-2020-14386", "url": "https://bugzilla.suse.com/1176069" }, { "category": "external", "summary": "SUSE Bug 1176072 for CVE-2020-14386", "url": "https://bugzilla.suse.com/1176072" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-14386" }, { "cve": "CVE-2020-24586", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24586" } ], "notes": [ { "category": "general", "text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24586", "url": "https://www.suse.com/security/cve/CVE-2020-24586" }, { "category": "external", "summary": "SUSE Bug 1185859 for CVE-2020-24586", "url": "https://bugzilla.suse.com/1185859" }, { "category": "external", "summary": "SUSE Bug 1192868 for CVE-2020-24586", "url": "https://bugzilla.suse.com/1192868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-24586" }, { "cve": "CVE-2020-24587", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24587" } ], "notes": [ { "category": "general", "text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24587", "url": "https://www.suse.com/security/cve/CVE-2020-24587" }, { "category": "external", "summary": "SUSE Bug 1185859 for CVE-2020-24587", "url": "https://bugzilla.suse.com/1185859" }, { "category": "external", "summary": "SUSE Bug 1185862 for CVE-2020-24587", "url": "https://bugzilla.suse.com/1185862" }, { "category": "external", "summary": "SUSE Bug 1192868 for CVE-2020-24587", "url": "https://bugzilla.suse.com/1192868" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-24587" }, { "cve": "CVE-2020-24588", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-24588" } ], "notes": [ { "category": "general", "text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-24588", "url": "https://www.suse.com/security/cve/CVE-2020-24588" }, { "category": "external", "summary": "SUSE Bug 1185861 for CVE-2020-24588", "url": "https://bugzilla.suse.com/1185861" }, { "category": "external", "summary": "SUSE Bug 1192868 for CVE-2020-24588", "url": "https://bugzilla.suse.com/1192868" }, { "category": "external", "summary": "SUSE Bug 1199701 for CVE-2020-24588", "url": "https://bugzilla.suse.com/1199701" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-24588" }, { "cve": "CVE-2020-25639", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25639" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s GPU Nouveau driver functionality in versions prior to 5.12-rc1 in the way the user calls ioctl DRM_IOCTL_NOUVEAU_CHANNEL_ALLOC. This flaw allows a local user to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25639", "url": "https://www.suse.com/security/cve/CVE-2020-25639" }, { "category": "external", "summary": "SUSE Bug 1176846 for CVE-2020-25639", "url": "https://bugzilla.suse.com/1176846" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-25639" }, { "cve": "CVE-2020-25656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25656" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25656", "url": "https://www.suse.com/security/cve/CVE-2020-25656" }, { "category": "external", "summary": "SUSE Bug 1177766 for CVE-2020-25656", "url": "https://bugzilla.suse.com/1177766" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-25656" }, { "cve": "CVE-2020-25668", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-25668" } ], "notes": [ { "category": "general", "text": "A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-25668", "url": "https://www.suse.com/security/cve/CVE-2020-25668" }, { "category": "external", "summary": "SUSE Bug 1178123 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1178123" }, { "category": "external", "summary": "SUSE Bug 1178622 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1178622" }, { "category": "external", "summary": "SUSE Bug 1196914 for CVE-2020-25668", "url": "https://bugzilla.suse.com/1196914" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-25668" }, { "cve": "CVE-2020-26141", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-26141" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-26141", "url": "https://www.suse.com/security/cve/CVE-2020-26141" }, { "category": "external", "summary": "SUSE Bug 1185987 for CVE-2020-26141", "url": "https://bugzilla.suse.com/1185987" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-26141" }, { "cve": "CVE-2020-2732", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-2732" } ], "notes": [ { "category": "general", "text": "A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-2732", "url": "https://www.suse.com/security/cve/CVE-2020-2732" }, { "category": "external", "summary": "SUSE Bug 1163971 for CVE-2020-2732", "url": "https://bugzilla.suse.com/1163971" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.2, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-2732" }, { "cve": "CVE-2020-29660", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29660" } ], "notes": [ { "category": "general", "text": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29660", "url": "https://www.suse.com/security/cve/CVE-2020-29660" }, { "category": "external", "summary": "SUSE Bug 1179745 for CVE-2020-29660", "url": "https://bugzilla.suse.com/1179745" }, { "category": "external", "summary": "SUSE Bug 1179877 for CVE-2020-29660", "url": "https://bugzilla.suse.com/1179877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-29660" }, { "cve": "CVE-2020-29661", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-29661" } ], "notes": [ { "category": "general", "text": "A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-29661", "url": "https://www.suse.com/security/cve/CVE-2020-29661" }, { "category": "external", "summary": "SUSE Bug 1179745 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1179745" }, { "category": "external", "summary": "SUSE Bug 1179877 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1179877" }, { "category": "external", "summary": "SUSE Bug 1214268 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1214268" }, { "category": "external", "summary": "SUSE Bug 1218966 for CVE-2020-29661", "url": "https://bugzilla.suse.com/1218966" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-29661" }, { "cve": "CVE-2020-8648", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8648" } ], "notes": [ { "category": "general", "text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8648", "url": "https://www.suse.com/security/cve/CVE-2020-8648" }, { "category": "external", "summary": "SUSE Bug 1162928 for CVE-2020-8648", "url": "https://bugzilla.suse.com/1162928" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-8648" }, { "cve": "CVE-2020-8694", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-8694" } ], "notes": [ { "category": "general", "text": "Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-8694", "url": "https://www.suse.com/security/cve/CVE-2020-8694" }, { "category": "external", "summary": "SUSE Bug 1170415 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1170415" }, { "category": "external", "summary": "SUSE Bug 1170446 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1170446" }, { "category": "external", "summary": "SUSE Bug 1178591 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1178591" }, { "category": "external", "summary": "SUSE Bug 1178700 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1178700" }, { "category": "external", "summary": "SUSE Bug 1179661 for CVE-2020-8694", "url": "https://bugzilla.suse.com/1179661" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-8694" }, { "cve": "CVE-2021-23133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-23133" } ], "notes": [ { "category": "general", "text": "A race condition in Linux kernel SCTP sockets (net/sctp/socket.c) before 5.12-rc8 can lead to kernel privilege escalation from the context of a network service or an unprivileged process. If sctp_destroy_sock is called without sock_net(sk)-\u003esctp.addr_wq_lock then an element is removed from the auto_asconf_splist list without any proper locking. This can be exploited by an attacker with network service privileges to escalate to root or from the context of an unprivileged user directly if a BPF_CGROUP_INET_SOCK_CREATE is attached which denies creation of some SCTP socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-23133", "url": "https://www.suse.com/security/cve/CVE-2021-23133" }, { "category": "external", "summary": "SUSE Bug 1184675 for CVE-2021-23133", "url": "https://bugzilla.suse.com/1184675" }, { "category": "external", "summary": "SUSE Bug 1185901 for CVE-2021-23133", "url": "https://bugzilla.suse.com/1185901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-23133" }, { "cve": "CVE-2021-26708", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-26708" } ], "notes": [ { "category": "general", "text": "A local privilege escalation was discovered in the Linux kernel before 5.10.13. Multiple race conditions in the AF_VSOCK implementation are caused by wrong locking in net/vmw_vsock/af_vsock.c. The race conditions were implicitly introduced in the commits that added VSOCK multi-transport support.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-26708", "url": "https://www.suse.com/security/cve/CVE-2021-26708" }, { "category": "external", "summary": "SUSE Bug 1181806 for CVE-2021-26708", "url": "https://bugzilla.suse.com/1181806" }, { "category": "external", "summary": "SUSE Bug 1183298 for CVE-2021-26708", "url": "https://bugzilla.suse.com/1183298" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-26708" }, { "cve": "CVE-2021-28971", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-28971" } ], "notes": [ { "category": "general", "text": "In intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c in the Linux kernel through 5.11.8 on some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled, aka CID-d88d05a9e0b6.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-28971", "url": "https://www.suse.com/security/cve/CVE-2021-28971" }, { "category": "external", "summary": "SUSE Bug 1184196 for CVE-2021-28971", "url": "https://bugzilla.suse.com/1184196" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-28971" }, { "cve": "CVE-2021-32606", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-32606" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 5.11 through 5.12.2, isotp_setsockopt in net/can/isotp.c allows privilege escalation to root by leveraging a use-after-free. (This does not affect earlier versions that lack CAN ISOTP SF_BROADCAST support.)", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-32606", "url": "https://www.suse.com/security/cve/CVE-2021-32606" }, { "category": "external", "summary": "SUSE Bug 1185953 for CVE-2021-32606", "url": "https://bugzilla.suse.com/1185953" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-32606" }, { "cve": "CVE-2021-33909", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-33909" } ], "notes": [ { "category": "general", "text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-33909", "url": "https://www.suse.com/security/cve/CVE-2021-33909" }, { "category": "external", "summary": "SUSE Bug 1188062 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1188062" }, { "category": "external", "summary": "SUSE Bug 1188063 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1188063" }, { "category": "external", "summary": "SUSE Bug 1188257 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1188257" }, { "category": "external", "summary": "SUSE Bug 1189302 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1189302" }, { "category": "external", "summary": "SUSE Bug 1190859 for CVE-2021-33909", "url": "https://bugzilla.suse.com/1190859" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-33909" }, { "cve": "CVE-2021-3483", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3483" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Nosy driver in the Linux kernel. This issue allows a device to be inserted twice into a doubly-linked list, leading to a use-after-free when one of these devices is removed. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. Versions before kernel 5.12-rc6 are affected", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3483", "url": "https://www.suse.com/security/cve/CVE-2021-3483" }, { "category": "external", "summary": "SUSE Bug 1184393 for CVE-2021-3483", "url": "https://bugzilla.suse.com/1184393" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-3483" }, { "cve": "CVE-2021-3489", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3489" } ], "notes": [ { "category": "general", "text": "The eBPF RINGBUF bpf_ringbuf_reserve() function in the Linux kernel did not check that the allocated size was smaller than the ringbuf size, allowing an attacker to perform out-of-bounds writes within the kernel and therefore, arbitrary code execution. This issue was fixed via commit 4b81ccebaeee (\"bpf, ringbuf: Deny reserve of buffers larger than ringbuf\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced via 457f44363a88 (\"bpf: Implement BPF ring buffer and verifier support for it\") (v5.8-rc1).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3489", "url": "https://www.suse.com/security/cve/CVE-2021-3489" }, { "category": "external", "summary": "SUSE Bug 1185640 for CVE-2021-3489", "url": "https://bugzilla.suse.com/1185640" }, { "category": "external", "summary": "SUSE Bug 1185856 for CVE-2021-3489", "url": "https://bugzilla.suse.com/1185856" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3489" }, { "cve": "CVE-2021-3490", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3490" } ], "notes": [ { "category": "general", "text": "The eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) in the Linux kernel did not properly update 32-bit bounds, which could be turned into out of bounds reads and writes in the Linux kernel and therefore, arbitrary code execution. This issue was fixed via commit 049c4e13714e (\"bpf: Fix alu32 const subreg bound tracking on bitwise operations\") (v5.13-rc4) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. The AND/OR issues were introduced by commit 3f50f132d840 (\"bpf: Verifier, do explicit ALU32 bounds tracking\") (5.7-rc1) and the XOR variant was introduced by 2921c90d4718 (\"bpf:Fix a verifier failure with xor\") ( 5.10-rc1).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3490", "url": "https://www.suse.com/security/cve/CVE-2021-3490" }, { "category": "external", "summary": "SUSE Bug 1185641 for CVE-2021-3490", "url": "https://bugzilla.suse.com/1185641" }, { "category": "external", "summary": "SUSE Bug 1185796 for CVE-2021-3490", "url": "https://bugzilla.suse.com/1185796" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3490" }, { "cve": "CVE-2021-3491", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3491" } ], "notes": [ { "category": "general", "text": "The io_uring subsystem in the Linux kernel allowed the MAX_RW_COUNT limit to be bypassed in the PROVIDE_BUFFERS operation, which led to negative values being usedin mem_rw when reading /proc/\u003cPID\u003e/mem. This could be used to create a heap overflow leading to arbitrary code execution in the kernel. It was addressed via commit d1f82808877b (\"io_uring: truncate lengths larger than MAX_RW_COUNT on provide buffers\") (v5.13-rc1) and backported to the stable kernels in v5.12.4, v5.11.21, and v5.10.37. It was introduced in ddf0322db79c (\"io_uring: add IORING_OP_PROVIDE_BUFFERS\") (v5.7-rc1).", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3491", "url": "https://www.suse.com/security/cve/CVE-2021-3491" }, { "category": "external", "summary": "SUSE Bug 1185642 for CVE-2021-3491", "url": "https://bugzilla.suse.com/1185642" }, { "category": "external", "summary": "SUSE Bug 1187090 for CVE-2021-3491", "url": "https://bugzilla.suse.com/1187090" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3491" }, { "cve": "CVE-2021-3640", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3640" } ], "notes": [ { "category": "general", "text": "A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3640", "url": "https://www.suse.com/security/cve/CVE-2021-3640" }, { "category": "external", "summary": "SUSE Bug 1188172 for CVE-2021-3640", "url": "https://bugzilla.suse.com/1188172" }, { "category": "external", "summary": "SUSE Bug 1188613 for CVE-2021-3640", "url": "https://bugzilla.suse.com/1188613" }, { "category": "external", "summary": "SUSE Bug 1191530 for CVE-2021-3640", "url": "https://bugzilla.suse.com/1191530" }, { "category": "external", "summary": "SUSE Bug 1196810 for CVE-2021-3640", "url": "https://bugzilla.suse.com/1196810" }, { "category": "external", "summary": "SUSE Bug 1196914 for CVE-2021-3640", "url": "https://bugzilla.suse.com/1196914" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3640" }, { "cve": "CVE-2021-3653", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3653" } ], "notes": [ { "category": "general", "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"int_ctl\" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3653", "url": "https://www.suse.com/security/cve/CVE-2021-3653" }, { "category": "external", "summary": "SUSE Bug 1189399 for CVE-2021-3653", "url": "https://bugzilla.suse.com/1189399" }, { "category": "external", "summary": "SUSE Bug 1189420 for CVE-2021-3653", "url": "https://bugzilla.suse.com/1189420" }, { "category": "external", "summary": "SUSE Bug 1196914 for CVE-2021-3653", "url": "https://bugzilla.suse.com/1196914" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3653" }, { "cve": "CVE-2021-3656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3656" } ], "notes": [ { "category": "general", "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"virt_ext\" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3656", "url": "https://www.suse.com/security/cve/CVE-2021-3656" }, { "category": "external", "summary": "SUSE Bug 1189400 for CVE-2021-3656", "url": "https://bugzilla.suse.com/1189400" }, { "category": "external", "summary": "SUSE Bug 1189418 for CVE-2021-3656", "url": "https://bugzilla.suse.com/1189418" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-3656" }, { "cve": "CVE-2021-3744", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3744" } ], "notes": [ { "category": "general", "text": "A memory leak flaw was found in the Linux kernel in the ccp_run_aes_gcm_cmd() function in drivers/crypto/ccp/ccp-ops.c, which allows attackers to cause a denial of service (memory consumption). This vulnerability is similar with the older CVE-2019-18808.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3744", "url": "https://www.suse.com/security/cve/CVE-2021-3744" }, { "category": "external", "summary": "SUSE Bug 1189884 for CVE-2021-3744", "url": "https://bugzilla.suse.com/1189884" }, { "category": "external", "summary": "SUSE Bug 1190534 for CVE-2021-3744", "url": "https://bugzilla.suse.com/1190534" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-3744" }, { "cve": "CVE-2021-3753", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3753" } ], "notes": [ { "category": "general", "text": "A race problem was seen in the vt_k_ioctl in drivers/tty/vt/vt_ioctl.c in the Linux kernel, which may cause an out of bounds read in vt as the write access to vc_mode is not protected by lock-in vt_ioctl (KDSETMDE). The highest threat from this vulnerability is to data confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3753", "url": "https://www.suse.com/security/cve/CVE-2021-3753" }, { "category": "external", "summary": "SUSE Bug 1190025 for CVE-2021-3753", "url": "https://bugzilla.suse.com/1190025" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-3753" }, { "cve": "CVE-2021-37576", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-37576" } ], "notes": [ { "category": "general", "text": "arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-37576", "url": "https://www.suse.com/security/cve/CVE-2021-37576" }, { "category": "external", "summary": "SUSE Bug 1188838 for CVE-2021-37576", "url": "https://bugzilla.suse.com/1188838" }, { "category": "external", "summary": "SUSE Bug 1188842 for CVE-2021-37576", "url": "https://bugzilla.suse.com/1188842" }, { "category": "external", "summary": "SUSE Bug 1190276 for CVE-2021-37576", "url": "https://bugzilla.suse.com/1190276" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2021-37576" }, { "cve": "CVE-2021-3759", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-3759" } ], "notes": [ { "category": "general", "text": "A memory overflow vulnerability was found in the Linux kernel\u0027s ipc functionality of the memcg subsystem, in the way a user calls the semget function multiple times, creating semaphores. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-3759", "url": "https://www.suse.com/security/cve/CVE-2021-3759" }, { "category": "external", "summary": "SUSE Bug 1190115 for CVE-2021-3759", "url": "https://bugzilla.suse.com/1190115" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-3759" }, { "cve": "CVE-2021-38166", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-38166" } ], "notes": [ { "category": "general", "text": "In kernel/bpf/hashtab.c in the Linux kernel through 5.13.8, there is an integer overflow and out-of-bounds write when many elements are placed in a single bucket. NOTE: exploitation might be impractical without the CAP_SYS_ADMIN capability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-38166", "url": "https://www.suse.com/security/cve/CVE-2021-38166" }, { "category": "external", "summary": "SUSE Bug 1189233 for CVE-2021-38166", "url": "https://bugzilla.suse.com/1189233" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-devel-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-macros-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-5.14.6-1.4.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-5.14.6-1.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-38166" } ] }
fkie_cve-2020-10768
Vulnerability from fkie_nvd
Published
2020-09-16 00:15
Modified
2024-11-21 04:56
Severity ?
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being 'force disabled' when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10768 | Issue Tracking, Third Party Advisory | |
secalert@redhat.com | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4d8df8cbb9156b0a0ab3f802b80cb5db57acc0bf | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10768 | Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4d8df8cbb9156b0a0ab3f802b80cb5db57acc0bf | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "4B3B9FFD-856C-4B58-ADD4-EE58BA12ECB4", "versionEndExcluding": "5.8.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality." }, { "lang": "es", "value": "Se encontr\u00f3 un fallo en el kernel de Linux versiones anteriores a 5.8-rc1 en la funci\u00f3n prctl(), donde puede ser usado para habilitar la especulaci\u00f3n de rama indirecta despu\u00e9s de haber sido deshabilitada.\u0026#xa0;Esta llamada reporta incorrectamente que est\u00e1 \"force disabled\" cuando no lo est\u00e1 y abre el sistema a ataques de Spectre v2.\u0026#xa0;La mayor amenaza de esta vulnerabilidad es la confidencialidad" } ], "id": "CVE-2020-10768", "lastModified": "2024-11-21T04:56:01.830", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "secalert@redhat.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-09-16T00:15:11.943", "references": [ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10768" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4d8df8cbb9156b0a0ab3f802b80cb5db57acc0bf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10768" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4d8df8cbb9156b0a0ab3f802b80cb5db57acc0bf" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-440" } ], "source": "secalert@redhat.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
suse-su-2020:2106-1
Vulnerability from csaf_suse
Published
2020-08-03 14:44
Modified
2020-08-03 14:44
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 GA LTSS kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).
- CVE-2019-20908: An issue was discovered in drivers/firmware/efi/efi.c where incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032 (bnc#1173567).
- CVE-2020-15780: An issue was discovered in drivers/acpi/acpi_configfs.c where injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30 (bnc#1173573).
- CVE-2020-15393: usbtest_disconnect in drivers/usb/misc/usbtest.c had a memory leak, aka CID-28ebeb8db770 (bnc#1173514).
- CVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails (bnc#1171732).
- CVE-2019-16746: An issue was discovered in net/wireless/nl80211.c which did not check the length of variable elements in a beacon head, leading to a buffer overflow (bnc#1152107 1173659).
- CVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).
- CVE-2020-10769: A buffer over-read flaw was found in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm's module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash. This flaw allowed a local attacker with user privileges to cause a denial of service (bnc#1173265).
- CVE-2020-10773: A kernel stack information leak on s390/s390x was fixed (bnc#1172999).
- CVE-2020-14416: A race condition in tty->disc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).
- CVE-2020-10768: Indirect branch speculation could have been enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command. (bnc#1172783).
- CVE-2020-10766: Fixed Rogue cross-process SSBD shutdown, where a Linux scheduler logical bug allows an attacker to turn off the SSBD protection. (bnc#1172781).
- CVE-2020-10767: Indirect Branch Prediction Barrier was force-disabled when STIBP is unavailable or enhanced IBRS is available. (bnc#1172782).
- CVE-2020-13974: drivers/tty/vt/keyboard.c had an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059 (bnc#1172775).
The following non-security bugs were fixed:
- Merge ibmvnic reset fixes (bsc#1158755 ltc#182094).
- block, bfq: add requeue-request hook (bsc#1104967 bsc#1171673).
- block, bfq: postpone rq preparation to insert or merge (bsc#1104967 bsc#1171673).
- ibmvnic: Do not process device remove during device reset (bsc#1065729).
- ibmvnic: Flush existing work items before device removal (bsc#1065729).
- ibmvnic: Harden device login requests (bsc#1170011 ltc#183538).
- ibmvnic: Skip fatal error reset after passive init (bsc#1171078 ltc#184239).
- ibmvnic: continue to init in CRQ reset returns H_CLOSED (bsc#1173280 ltc#185369).
- intel_idle: Graceful probe failure when MWAIT is disabled (bsc#1174115).
- livepatch: Apply vmlinux-specific KLP relocations early (bsc#1071995).
- livepatch: Disallow vmlinux.ko (bsc#1071995).
- livepatch: Make klp_apply_object_relocs static (bsc#1071995).
- livepatch: Prevent module-specific KLP rela sections from referencing vmlinux symbols (bsc#1071995).
- livepatch: Remove .klp.arch (bsc#1071995).
- vfio/pci: Fix SR-IOV VF handling with MMIO blocking (bsc#1051510).
- vfio/pci: Fix SR-IOV VF handling with MMIO blocking (bsc#1174000).
- vfio/pci: Mask buggy SR-IOV VF INTx support (bsc#1051510).
- vfio/pci: Mask buggy SR-IOV VF INTx support (bsc#1173999).
- x86/{mce,mm}: Unmap the entire page if the whole page is affected and poisoned (bsc#1172257).
Patchnames
SUSE-2020-2106,SUSE-SLE-Module-Live-Patching-15-2020-2106,SUSE-SLE-Product-HA-15-2020-2106,SUSE-SLE-Product-HPC-15-2020-2106,SUSE-SLE-Product-SLES-15-2020-2106,SUSE-SLE-Product-SLES_SAP-15-2020-2106
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 15 GA LTSS kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).\n- CVE-2019-20908: An issue was discovered in drivers/firmware/efi/efi.c where incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032 (bnc#1173567).\n- CVE-2020-15780: An issue was discovered in drivers/acpi/acpi_configfs.c where injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30 (bnc#1173573).\n- CVE-2020-15393: usbtest_disconnect in drivers/usb/misc/usbtest.c had a memory leak, aka CID-28ebeb8db770 (bnc#1173514).\n- CVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails (bnc#1171732).\n- CVE-2019-16746: An issue was discovered in net/wireless/nl80211.c which did not check the length of variable elements in a beacon head, leading to a buffer overflow (bnc#1152107 1173659).\n- CVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).\n- CVE-2020-10769: A buffer over-read flaw was found in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm\u0027s module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash. This flaw allowed a local attacker with user privileges to cause a denial of service (bnc#1173265).\n- CVE-2020-10773: A kernel stack information leak on s390/s390x was fixed (bnc#1172999).\n- CVE-2020-14416: A race condition in tty-\u003edisc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).\n- CVE-2020-10768: Indirect branch speculation could have been enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command. (bnc#1172783).\n- CVE-2020-10766: Fixed Rogue cross-process SSBD shutdown, where a Linux scheduler logical bug allows an attacker to turn off the SSBD protection. (bnc#1172781).\n- CVE-2020-10767: Indirect Branch Prediction Barrier was force-disabled when STIBP is unavailable or enhanced IBRS is available. (bnc#1172782).\n- CVE-2020-13974: drivers/tty/vt/keyboard.c had an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059 (bnc#1172775).\n\nThe following non-security bugs were fixed:\n\n- Merge ibmvnic reset fixes (bsc#1158755 ltc#182094).\n- block, bfq: add requeue-request hook (bsc#1104967 bsc#1171673).\n- block, bfq: postpone rq preparation to insert or merge (bsc#1104967 bsc#1171673). \n- ibmvnic: Do not process device remove during device reset (bsc#1065729).\n- ibmvnic: Flush existing work items before device removal (bsc#1065729).\n- ibmvnic: Harden device login requests (bsc#1170011 ltc#183538).\n- ibmvnic: Skip fatal error reset after passive init (bsc#1171078 ltc#184239).\n- ibmvnic: continue to init in CRQ reset returns H_CLOSED (bsc#1173280 ltc#185369).\n- intel_idle: Graceful probe failure when MWAIT is disabled (bsc#1174115).\n- livepatch: Apply vmlinux-specific KLP relocations early (bsc#1071995).\n- livepatch: Disallow vmlinux.ko (bsc#1071995).\n- livepatch: Make klp_apply_object_relocs static (bsc#1071995).\n- livepatch: Prevent module-specific KLP rela sections from referencing vmlinux symbols (bsc#1071995).\n- livepatch: Remove .klp.arch (bsc#1071995).\n- vfio/pci: Fix SR-IOV VF handling with MMIO blocking (bsc#1051510).\n- vfio/pci: Fix SR-IOV VF handling with MMIO blocking (bsc#1174000).\n- vfio/pci: Mask buggy SR-IOV VF INTx support (bsc#1051510).\n- vfio/pci: Mask buggy SR-IOV VF INTx support (bsc#1173999).\n- x86/{mce,mm}: Unmap the entire page if the whole page is affected and poisoned (bsc#1172257).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-2106,SUSE-SLE-Module-Live-Patching-15-2020-2106,SUSE-SLE-Product-HA-15-2020-2106,SUSE-SLE-Product-HPC-15-2020-2106,SUSE-SLE-Product-SLES-15-2020-2106,SUSE-SLE-Product-SLES_SAP-15-2020-2106", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2106-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:2106-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20202106-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:2106-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-August/007209.html" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1104967", "url": "https://bugzilla.suse.com/1104967" }, { "category": "self", "summary": "SUSE Bug 1152107", "url": "https://bugzilla.suse.com/1152107" }, { "category": "self", "summary": "SUSE Bug 1158755", "url": "https://bugzilla.suse.com/1158755" }, { "category": "self", "summary": "SUSE Bug 1162002", "url": "https://bugzilla.suse.com/1162002" }, { "category": "self", "summary": "SUSE Bug 1170011", "url": "https://bugzilla.suse.com/1170011" }, { "category": "self", "summary": "SUSE Bug 1171078", "url": "https://bugzilla.suse.com/1171078" }, { "category": "self", "summary": "SUSE Bug 1171673", "url": "https://bugzilla.suse.com/1171673" }, { "category": "self", "summary": "SUSE Bug 1171732", "url": "https://bugzilla.suse.com/1171732" }, { "category": "self", "summary": "SUSE Bug 1171868", "url": "https://bugzilla.suse.com/1171868" }, { "category": "self", "summary": "SUSE Bug 1172257", "url": "https://bugzilla.suse.com/1172257" }, { "category": "self", "summary": "SUSE Bug 1172775", "url": "https://bugzilla.suse.com/1172775" }, { "category": "self", "summary": "SUSE Bug 1172781", "url": "https://bugzilla.suse.com/1172781" }, { "category": "self", "summary": "SUSE Bug 1172782", "url": "https://bugzilla.suse.com/1172782" }, { "category": "self", "summary": "SUSE Bug 1172783", "url": "https://bugzilla.suse.com/1172783" }, { "category": "self", "summary": "SUSE Bug 1172999", "url": "https://bugzilla.suse.com/1172999" }, { "category": "self", "summary": "SUSE Bug 1173265", "url": "https://bugzilla.suse.com/1173265" }, { "category": "self", "summary": "SUSE Bug 1173280", "url": "https://bugzilla.suse.com/1173280" }, { "category": "self", "summary": "SUSE Bug 1173514", "url": "https://bugzilla.suse.com/1173514" }, { "category": "self", "summary": "SUSE Bug 1173567", "url": "https://bugzilla.suse.com/1173567" }, { "category": "self", "summary": "SUSE Bug 1173573", "url": "https://bugzilla.suse.com/1173573" }, { "category": "self", "summary": "SUSE Bug 1173659", "url": "https://bugzilla.suse.com/1173659" }, { "category": "self", "summary": "SUSE Bug 1173999", "url": "https://bugzilla.suse.com/1173999" }, { "category": "self", "summary": "SUSE Bug 1174000", "url": "https://bugzilla.suse.com/1174000" }, { "category": "self", "summary": "SUSE Bug 1174115", "url": "https://bugzilla.suse.com/1174115" }, { "category": "self", "summary": "SUSE Bug 1174462", "url": "https://bugzilla.suse.com/1174462" }, { "category": "self", "summary": "SUSE Bug 1174543", "url": "https://bugzilla.suse.com/1174543" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16746 page", "url": "https://www.suse.com/security/cve/CVE-2019-16746/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20908 page", "url": "https://www.suse.com/security/cve/CVE-2019-20908/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0305 page", "url": "https://www.suse.com/security/cve/CVE-2020-0305/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10766 page", "url": "https://www.suse.com/security/cve/CVE-2020-10766/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10767 page", "url": "https://www.suse.com/security/cve/CVE-2020-10767/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10768 page", "url": "https://www.suse.com/security/cve/CVE-2020-10768/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10769 page", "url": "https://www.suse.com/security/cve/CVE-2020-10769/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10773 page", "url": "https://www.suse.com/security/cve/CVE-2020-10773/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12771 page", "url": "https://www.suse.com/security/cve/CVE-2020-12771/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12888 page", "url": "https://www.suse.com/security/cve/CVE-2020-12888/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-13974 page", "url": "https://www.suse.com/security/cve/CVE-2020-13974/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14416 page", "url": "https://www.suse.com/security/cve/CVE-2020-14416/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15393 page", "url": "https://www.suse.com/security/cve/CVE-2020-15393/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15780 page", "url": "https://www.suse.com/security/cve/CVE-2020-15780/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-08-03T14:44:03Z", "generator": { "date": "2020-08-03T14:44:03Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:2106-1", "initial_release_date": "2020-08-03T14:44:03Z", "revision_history": [ { "date": "2020-08-03T14:44:03Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.55.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.12.14-150.55.1.aarch64", "product_id": "cluster-md-kmp-default-4.12.14-150.55.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.55.1.aarch64", "product": { "name": "dlm-kmp-default-4.12.14-150.55.1.aarch64", "product_id": "dlm-kmp-default-4.12.14-150.55.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.55.1.aarch64", "product": { "name": "gfs2-kmp-default-4.12.14-150.55.1.aarch64", "product_id": "gfs2-kmp-default-4.12.14-150.55.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.55.1.aarch64", "product": { "name": "kernel-default-4.12.14-150.55.1.aarch64", "product_id": "kernel-default-4.12.14-150.55.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.55.1.aarch64", "product": { "name": "kernel-default-base-4.12.14-150.55.1.aarch64", "product_id": "kernel-default-base-4.12.14-150.55.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.55.1.aarch64", "product": { "name": "kernel-default-devel-4.12.14-150.55.1.aarch64", "product_id": "kernel-default-devel-4.12.14-150.55.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.55.1.aarch64", "product": { "name": "kernel-default-extra-4.12.14-150.55.1.aarch64", "product_id": "kernel-default-extra-4.12.14-150.55.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.55.1.aarch64", "product": { "name": "kernel-default-livepatch-4.12.14-150.55.1.aarch64", "product_id": "kernel-default-livepatch-4.12.14-150.55.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-150.55.1.aarch64", "product": { "name": "kernel-default-livepatch-devel-4.12.14-150.55.1.aarch64", "product_id": "kernel-default-livepatch-devel-4.12.14-150.55.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.55.1.aarch64", "product": { "name": "kernel-obs-build-4.12.14-150.55.1.aarch64", "product_id": "kernel-obs-build-4.12.14-150.55.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.55.1.aarch64", "product": { "name": "kernel-obs-qa-4.12.14-150.55.1.aarch64", "product_id": "kernel-obs-qa-4.12.14-150.55.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.55.1.aarch64", "product": { "name": "kernel-syms-4.12.14-150.55.1.aarch64", "product_id": "kernel-syms-4.12.14-150.55.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.55.1.aarch64", "product": { "name": "kernel-vanilla-4.12.14-150.55.1.aarch64", "product_id": "kernel-vanilla-4.12.14-150.55.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.55.1.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-150.55.1.aarch64", "product_id": "kernel-vanilla-base-4.12.14-150.55.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.55.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.12.14-150.55.1.aarch64", "product_id": "kernel-vanilla-devel-4.12.14-150.55.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-150.55.1.aarch64", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-150.55.1.aarch64", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.55.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.55.1.aarch64", "product": { "name": "kselftests-kmp-default-4.12.14-150.55.1.aarch64", "product_id": "kselftests-kmp-default-4.12.14-150.55.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.55.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.12.14-150.55.1.aarch64", "product_id": "ocfs2-kmp-default-4.12.14-150.55.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.55.1.aarch64", "product": { "name": "reiserfs-kmp-default-4.12.14-150.55.1.aarch64", "product_id": "reiserfs-kmp-default-4.12.14-150.55.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-150.55.1.noarch", "product": { "name": "kernel-devel-4.12.14-150.55.1.noarch", "product_id": "kernel-devel-4.12.14-150.55.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-150.55.1.noarch", "product": { "name": "kernel-docs-4.12.14-150.55.1.noarch", "product_id": "kernel-docs-4.12.14-150.55.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-150.55.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-150.55.1.noarch", "product_id": "kernel-docs-html-4.12.14-150.55.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-150.55.1.noarch", "product": { "name": "kernel-macros-4.12.14-150.55.1.noarch", "product_id": "kernel-macros-4.12.14-150.55.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-150.55.1.noarch", "product": { "name": "kernel-source-4.12.14-150.55.1.noarch", "product_id": "kernel-source-4.12.14-150.55.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-150.55.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-150.55.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-150.55.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.55.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.12.14-150.55.1.ppc64le", "product_id": "cluster-md-kmp-default-4.12.14-150.55.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.55.1.ppc64le", "product": { "name": "dlm-kmp-default-4.12.14-150.55.1.ppc64le", "product_id": "dlm-kmp-default-4.12.14-150.55.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.55.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.12.14-150.55.1.ppc64le", "product_id": "gfs2-kmp-default-4.12.14-150.55.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-150.55.1.ppc64le", "product": { "name": "kernel-debug-4.12.14-150.55.1.ppc64le", "product_id": "kernel-debug-4.12.14-150.55.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-150.55.1.ppc64le", "product": { "name": "kernel-debug-base-4.12.14-150.55.1.ppc64le", "product_id": "kernel-debug-base-4.12.14-150.55.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-150.55.1.ppc64le", "product": { "name": "kernel-debug-devel-4.12.14-150.55.1.ppc64le", "product_id": "kernel-debug-devel-4.12.14-150.55.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-4.12.14-150.55.1.ppc64le", "product": { "name": "kernel-debug-livepatch-devel-4.12.14-150.55.1.ppc64le", "product_id": "kernel-debug-livepatch-devel-4.12.14-150.55.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.55.1.ppc64le", "product": { "name": "kernel-default-4.12.14-150.55.1.ppc64le", "product_id": "kernel-default-4.12.14-150.55.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.55.1.ppc64le", "product": { "name": "kernel-default-base-4.12.14-150.55.1.ppc64le", "product_id": "kernel-default-base-4.12.14-150.55.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.55.1.ppc64le", "product": { "name": "kernel-default-devel-4.12.14-150.55.1.ppc64le", "product_id": "kernel-default-devel-4.12.14-150.55.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.55.1.ppc64le", "product": { "name": "kernel-default-extra-4.12.14-150.55.1.ppc64le", "product_id": "kernel-default-extra-4.12.14-150.55.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.55.1.ppc64le", "product": { "name": "kernel-default-livepatch-4.12.14-150.55.1.ppc64le", "product_id": "kernel-default-livepatch-4.12.14-150.55.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-150.55.1.ppc64le", "product": { "name": "kernel-default-livepatch-devel-4.12.14-150.55.1.ppc64le", "product_id": "kernel-default-livepatch-devel-4.12.14-150.55.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_55-default-1-1.3.1.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-150_55-default-1-1.3.1.ppc64le", "product_id": "kernel-livepatch-4_12_14-150_55-default-1-1.3.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.55.1.ppc64le", "product": { "name": "kernel-obs-build-4.12.14-150.55.1.ppc64le", "product_id": "kernel-obs-build-4.12.14-150.55.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.55.1.ppc64le", "product": { "name": "kernel-obs-qa-4.12.14-150.55.1.ppc64le", "product_id": "kernel-obs-qa-4.12.14-150.55.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.55.1.ppc64le", "product": { "name": "kernel-syms-4.12.14-150.55.1.ppc64le", "product_id": "kernel-syms-4.12.14-150.55.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.55.1.ppc64le", "product": { "name": "kernel-vanilla-4.12.14-150.55.1.ppc64le", "product_id": "kernel-vanilla-4.12.14-150.55.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-150.55.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.55.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.12.14-150.55.1.ppc64le", "product_id": "kernel-vanilla-devel-4.12.14-150.55.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-150.55.1.ppc64le", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-150.55.1.ppc64le", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.55.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.55.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.12.14-150.55.1.ppc64le", "product_id": "kselftests-kmp-default-4.12.14-150.55.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.55.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.12.14-150.55.1.ppc64le", "product_id": "ocfs2-kmp-default-4.12.14-150.55.1.ppc64le" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "product": { "name": "reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "product_id": "reiserfs-kmp-default-4.12.14-150.55.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.55.1.s390x", "product": { "name": "cluster-md-kmp-default-4.12.14-150.55.1.s390x", "product_id": "cluster-md-kmp-default-4.12.14-150.55.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.55.1.s390x", "product": { "name": "dlm-kmp-default-4.12.14-150.55.1.s390x", "product_id": "dlm-kmp-default-4.12.14-150.55.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.55.1.s390x", "product": { "name": "gfs2-kmp-default-4.12.14-150.55.1.s390x", "product_id": "gfs2-kmp-default-4.12.14-150.55.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.55.1.s390x", "product": { "name": "kernel-default-4.12.14-150.55.1.s390x", "product_id": "kernel-default-4.12.14-150.55.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.55.1.s390x", "product": { "name": "kernel-default-base-4.12.14-150.55.1.s390x", "product_id": "kernel-default-base-4.12.14-150.55.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.55.1.s390x", "product": { "name": "kernel-default-devel-4.12.14-150.55.1.s390x", "product_id": "kernel-default-devel-4.12.14-150.55.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.55.1.s390x", "product": { "name": "kernel-default-extra-4.12.14-150.55.1.s390x", "product_id": "kernel-default-extra-4.12.14-150.55.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.55.1.s390x", "product": { "name": "kernel-default-livepatch-4.12.14-150.55.1.s390x", "product_id": "kernel-default-livepatch-4.12.14-150.55.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-150.55.1.s390x", "product": { "name": "kernel-default-livepatch-devel-4.12.14-150.55.1.s390x", "product_id": "kernel-default-livepatch-devel-4.12.14-150.55.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.12.14-150.55.1.s390x", "product": { "name": "kernel-default-man-4.12.14-150.55.1.s390x", "product_id": "kernel-default-man-4.12.14-150.55.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.55.1.s390x", "product": { "name": "kernel-obs-build-4.12.14-150.55.1.s390x", "product_id": "kernel-obs-build-4.12.14-150.55.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.55.1.s390x", "product": { "name": "kernel-obs-qa-4.12.14-150.55.1.s390x", "product_id": "kernel-obs-qa-4.12.14-150.55.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.55.1.s390x", "product": { "name": "kernel-syms-4.12.14-150.55.1.s390x", "product_id": "kernel-syms-4.12.14-150.55.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.55.1.s390x", "product": { "name": "kernel-vanilla-4.12.14-150.55.1.s390x", "product_id": "kernel-vanilla-4.12.14-150.55.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.55.1.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-150.55.1.s390x", "product_id": "kernel-vanilla-base-4.12.14-150.55.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.55.1.s390x", "product": { "name": "kernel-vanilla-devel-4.12.14-150.55.1.s390x", "product_id": "kernel-vanilla-devel-4.12.14-150.55.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-150.55.1.s390x", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-150.55.1.s390x", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.55.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.12.14-150.55.1.s390x", "product": { "name": "kernel-zfcpdump-4.12.14-150.55.1.s390x", "product_id": "kernel-zfcpdump-4.12.14-150.55.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-man-4.12.14-150.55.1.s390x", "product": { "name": "kernel-zfcpdump-man-4.12.14-150.55.1.s390x", "product_id": "kernel-zfcpdump-man-4.12.14-150.55.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.55.1.s390x", "product": { "name": "kselftests-kmp-default-4.12.14-150.55.1.s390x", "product_id": "kselftests-kmp-default-4.12.14-150.55.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.55.1.s390x", "product": { "name": "ocfs2-kmp-default-4.12.14-150.55.1.s390x", "product_id": "ocfs2-kmp-default-4.12.14-150.55.1.s390x" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.55.1.s390x", "product": { "name": "reiserfs-kmp-default-4.12.14-150.55.1.s390x", "product_id": "reiserfs-kmp-default-4.12.14-150.55.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.55.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.12.14-150.55.1.x86_64", "product_id": "cluster-md-kmp-default-4.12.14-150.55.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.55.1.x86_64", "product": { "name": "dlm-kmp-default-4.12.14-150.55.1.x86_64", "product_id": "dlm-kmp-default-4.12.14-150.55.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.55.1.x86_64", "product": { "name": "gfs2-kmp-default-4.12.14-150.55.1.x86_64", "product_id": "gfs2-kmp-default-4.12.14-150.55.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-150.55.1.x86_64", "product": { "name": "kernel-debug-4.12.14-150.55.1.x86_64", "product_id": "kernel-debug-4.12.14-150.55.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-150.55.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-150.55.1.x86_64", "product_id": "kernel-debug-base-4.12.14-150.55.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-150.55.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-150.55.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-150.55.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-4.12.14-150.55.1.x86_64", "product": { "name": "kernel-debug-livepatch-devel-4.12.14-150.55.1.x86_64", "product_id": "kernel-debug-livepatch-devel-4.12.14-150.55.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.55.1.x86_64", "product": { "name": "kernel-default-4.12.14-150.55.1.x86_64", "product_id": "kernel-default-4.12.14-150.55.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.55.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-150.55.1.x86_64", "product_id": "kernel-default-base-4.12.14-150.55.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.55.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-150.55.1.x86_64", "product_id": "kernel-default-devel-4.12.14-150.55.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.55.1.x86_64", "product": { "name": "kernel-default-extra-4.12.14-150.55.1.x86_64", "product_id": "kernel-default-extra-4.12.14-150.55.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.55.1.x86_64", "product": { "name": "kernel-default-livepatch-4.12.14-150.55.1.x86_64", "product_id": "kernel-default-livepatch-4.12.14-150.55.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-150.55.1.x86_64", "product": { "name": "kernel-default-livepatch-devel-4.12.14-150.55.1.x86_64", "product_id": "kernel-default-livepatch-devel-4.12.14-150.55.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-150.55.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-150.55.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-150.55.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-150.55.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-150.55.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-150.55.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-150.55.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-150.55.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-150.55.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-4.12.14-150.55.1.x86_64", "product": { "name": "kernel-kvmsmall-livepatch-devel-4.12.14-150.55.1.x86_64", "product_id": "kernel-kvmsmall-livepatch-devel-4.12.14-150.55.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_55-default-1-1.3.1.x86_64", "product": { "name": "kernel-livepatch-4_12_14-150_55-default-1-1.3.1.x86_64", "product_id": "kernel-livepatch-4_12_14-150_55-default-1-1.3.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.55.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-150.55.1.x86_64", "product_id": "kernel-obs-build-4.12.14-150.55.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.55.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-150.55.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-150.55.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.55.1.x86_64", "product": { "name": "kernel-syms-4.12.14-150.55.1.x86_64", "product_id": "kernel-syms-4.12.14-150.55.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.55.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-150.55.1.x86_64", "product_id": "kernel-vanilla-4.12.14-150.55.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.55.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-150.55.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-150.55.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.55.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-150.55.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-150.55.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-150.55.1.x86_64", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-150.55.1.x86_64", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.55.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.55.1.x86_64", "product": { "name": "kselftests-kmp-default-4.12.14-150.55.1.x86_64", "product_id": "kselftests-kmp-default-4.12.14-150.55.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.55.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.12.14-150.55.1.x86_64", "product_id": "ocfs2-kmp-default-4.12.14-150.55.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.55.1.x86_64", "product": { "name": "reiserfs-kmp-default-4.12.14-150.55.1.x86_64", "product_id": "reiserfs-kmp-default-4.12.14-150.55.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15", "product": { "name": "SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 15", "product": { "name": "SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-150.55.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.ppc64le" }, "product_reference": "kernel-default-livepatch-4.12.14-150.55.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-150.55.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.x86_64" }, "product_reference": "kernel-default-livepatch-4.12.14-150.55.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_55-default-1-1.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_55-default-1-1.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_55-default-1-1.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_55-default-1-1.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.55.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.aarch64" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.55.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.55.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.55.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.55.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.55.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.55.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.55.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.55.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.aarch64" }, "product_reference": "dlm-kmp-default-4.12.14-150.55.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.55.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.12.14-150.55.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.55.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.s390x" }, "product_reference": "dlm-kmp-default-4.12.14-150.55.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.55.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-150.55.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.55.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.aarch64" }, "product_reference": "gfs2-kmp-default-4.12.14-150.55.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.55.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.12.14-150.55.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.55.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.s390x" }, "product_reference": "gfs2-kmp-default-4.12.14-150.55.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.55.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-150.55.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.55.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.aarch64" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.55.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.55.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.55.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.55.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.55.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.55.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.55.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.55.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.aarch64" }, "product_reference": "kernel-default-4.12.14-150.55.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.55.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.x86_64" }, "product_reference": "kernel-default-4.12.14-150.55.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.55.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-150.55.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.55.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-150.55.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.55.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-150.55.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.55.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-150.55.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-150.55.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.55.1.noarch" }, "product_reference": "kernel-devel-4.12.14-150.55.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-150.55.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.55.1.noarch" }, "product_reference": "kernel-docs-4.12.14-150.55.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-150.55.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.55.1.noarch" }, "product_reference": "kernel-macros-4.12.14-150.55.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.55.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-150.55.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.55.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-150.55.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-150.55.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.55.1.noarch" }, "product_reference": "kernel-source-4.12.14-150.55.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.55.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-150.55.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.55.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-150.55.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.55.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.aarch64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.55.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.55.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.55.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.55.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64" }, "product_reference": "kernel-default-4.12.14-150.55.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.55.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64" }, "product_reference": "kernel-default-4.12.14-150.55.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.55.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-150.55.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.55.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-150.55.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.55.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-150.55.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.55.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-150.55.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-150.55.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch" }, "product_reference": "kernel-devel-4.12.14-150.55.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-150.55.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch" }, "product_reference": "kernel-docs-4.12.14-150.55.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-150.55.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch" }, "product_reference": "kernel-macros-4.12.14-150.55.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.55.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-150.55.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.55.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-150.55.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-150.55.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.55.1.noarch" }, "product_reference": "kernel-source-4.12.14-150.55.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.55.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-150.55.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.55.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-150.55.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.55.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.55.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.55.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.55.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.55.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64" }, "product_reference": "kernel-default-4.12.14-150.55.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.55.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-150.55.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.55.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.s390x" }, "product_reference": "kernel-default-4.12.14-150.55.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.55.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64" }, "product_reference": "kernel-default-4.12.14-150.55.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.55.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-150.55.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.55.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-150.55.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.55.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-150.55.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.55.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-150.55.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.55.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-150.55.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.55.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-150.55.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.55.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-150.55.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.55.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-150.55.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-150.55.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.55.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-150.55.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-150.55.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch" }, "product_reference": "kernel-devel-4.12.14-150.55.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-150.55.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch" }, "product_reference": "kernel-docs-4.12.14-150.55.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-150.55.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch" }, "product_reference": "kernel-macros-4.12.14-150.55.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.55.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-150.55.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.55.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-150.55.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.55.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.s390x" }, "product_reference": "kernel-obs-build-4.12.14-150.55.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.55.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-150.55.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-150.55.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.55.1.noarch" }, "product_reference": "kernel-source-4.12.14-150.55.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.55.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-150.55.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.55.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-150.55.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.55.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.s390x" }, "product_reference": "kernel-syms-4.12.14-150.55.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.55.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-150.55.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.55.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.55.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.55.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.ppc64le" }, "product_reference": "kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.55.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.s390x" }, "product_reference": "kernel-vanilla-base-4.12.14-150.55.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.55.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.55.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.55.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.aarch64" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.55.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.55.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.55.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.s390x" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.55.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.55.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", "product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.x86_64" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.55.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.55.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-150.55.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.55.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.x86_64" }, "product_reference": "kernel-default-4.12.14-150.55.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.55.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-150.55.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.55.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-150.55.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.55.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-150.55.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.55.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-150.55.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-150.55.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.55.1.noarch" }, "product_reference": "kernel-devel-4.12.14-150.55.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-150.55.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.55.1.noarch" }, "product_reference": "kernel-docs-4.12.14-150.55.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-150.55.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.55.1.noarch" }, "product_reference": "kernel-macros-4.12.14-150.55.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.55.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-150.55.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.55.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-150.55.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-150.55.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.55.1.noarch" }, "product_reference": "kernel-source-4.12.14-150.55.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.55.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-150.55.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.55.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-150.55.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.55.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.ppc64le" }, "product_reference": "kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.55.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.55.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.55.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.55.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.x86_64" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.55.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-16746", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16746" } ], "notes": [ { "category": "general", "text": "An issue was discovered in net/wireless/nl80211.c in the Linux kernel through 5.2.17. It does not check the length of variable elements in a beacon head, leading to a buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16746", "url": "https://www.suse.com/security/cve/CVE-2019-16746" }, { "category": "external", "summary": "SUSE Bug 1152107 for CVE-2019-16746", "url": "https://bugzilla.suse.com/1152107" }, { "category": "external", "summary": "SUSE Bug 1173659 for CVE-2019-16746", "url": "https://bugzilla.suse.com/1173659" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T14:44:03Z", "details": "moderate" } ], "title": "CVE-2019-16746" }, { "cve": "CVE-2019-20908", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20908" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/firmware/efi/efi.c in the Linux kernel before 5.4. Incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20908", "url": "https://www.suse.com/security/cve/CVE-2019-20908" }, { "category": "external", "summary": "SUSE Bug 1173567 for CVE-2019-20908", "url": "https://bugzilla.suse.com/1173567" }, { "category": "external", "summary": "SUSE Bug 1174187 for CVE-2019-20908", "url": "https://bugzilla.suse.com/1174187" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T14:44:03Z", "details": "important" } ], "title": "CVE-2019-20908" }, { "cve": "CVE-2020-0305", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0305" } ], "notes": [ { "category": "general", "text": "In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-153467744", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0305", "url": "https://www.suse.com/security/cve/CVE-2020-0305" }, { "category": "external", "summary": "SUSE Bug 1174462 for CVE-2020-0305", "url": "https://bugzilla.suse.com/1174462" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T14:44:03Z", "details": "moderate" } ], "title": "CVE-2020-0305" }, { "cve": "CVE-2020-10766", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10766" } ], "notes": [ { "category": "general", "text": "A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10766", "url": "https://www.suse.com/security/cve/CVE-2020-10766" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172781 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1172781" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T14:44:03Z", "details": "moderate" } ], "title": "CVE-2020-10766" }, { "cve": "CVE-2020-10767", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10767" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10767", "url": "https://www.suse.com/security/cve/CVE-2020-10767" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172782 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1172782" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T14:44:03Z", "details": "moderate" } ], "title": "CVE-2020-10767" }, { "cve": "CVE-2020-10768", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10768" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10768", "url": "https://www.suse.com/security/cve/CVE-2020-10768" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172783 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1172783" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T14:44:03Z", "details": "moderate" } ], "title": "CVE-2020-10768" }, { "cve": "CVE-2020-10769", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10769" } ], "notes": [ { "category": "general", "text": "A buffer over-read flaw was found in RH kernel versions before 5.0 in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm\u0027s module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash. This flaw allows a local attacker with user privileges to cause a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10769", "url": "https://www.suse.com/security/cve/CVE-2020-10769" }, { "category": "external", "summary": "SUSE Bug 1173265 for CVE-2020-10769", "url": "https://bugzilla.suse.com/1173265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T14:44:03Z", "details": "moderate" } ], "title": "CVE-2020-10769" }, { "cve": "CVE-2020-10773", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10773" } ], "notes": [ { "category": "general", "text": "A stack information leak flaw was found in s390/s390x in the Linux kernel\u0027s memory manager functionality, where it incorrectly writes to the /proc/sys/vm/cmm_timeout file. This flaw allows a local user to see the kernel data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10773", "url": "https://www.suse.com/security/cve/CVE-2020-10773" }, { "category": "external", "summary": "SUSE Bug 1172999 for CVE-2020-10773", "url": "https://bugzilla.suse.com/1172999" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T14:44:03Z", "details": "low" } ], "title": "CVE-2020-10773" }, { "cve": "CVE-2020-12771", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12771" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.6.11. btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12771", "url": "https://www.suse.com/security/cve/CVE-2020-12771" }, { "category": "external", "summary": "SUSE Bug 1171732 for CVE-2020-12771", "url": "https://bugzilla.suse.com/1171732" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T14:44:03Z", "details": "moderate" } ], "title": "CVE-2020-12771" }, { "cve": "CVE-2020-12888", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12888" } ], "notes": [ { "category": "general", "text": "The VFIO PCI driver in the Linux kernel through 5.6.13 mishandles attempts to access disabled memory space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12888", "url": "https://www.suse.com/security/cve/CVE-2020-12888" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1171868 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1171868" }, { "category": "external", "summary": "SUSE Bug 1176979 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1176979" }, { "category": "external", "summary": "SUSE Bug 1179612 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1179612" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T14:44:03Z", "details": "moderate" } ], "title": "CVE-2020-12888" }, { "cve": "CVE-2020-13974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-13974" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel 4.4 through 5.7.1. drivers/tty/vt/keyboard.c has an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. NOTE: Members in the community argue that the integer overflow does not lead to a security issue in this case.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-13974", "url": "https://www.suse.com/security/cve/CVE-2020-13974" }, { "category": "external", "summary": "SUSE Bug 1172775 for CVE-2020-13974", "url": "https://bugzilla.suse.com/1172775" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T14:44:03Z", "details": "moderate" } ], "title": "CVE-2020-13974" }, { "cve": "CVE-2020-14416", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14416" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.4.16, a race condition in tty-\u003edisc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14416", "url": "https://www.suse.com/security/cve/CVE-2020-14416" }, { "category": "external", "summary": "SUSE Bug 1162002 for CVE-2020-14416", "url": "https://bugzilla.suse.com/1162002" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T14:44:03Z", "details": "moderate" } ], "title": "CVE-2020-14416" }, { "cve": "CVE-2020-15393", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15393" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.4 through 5.7.6, usbtest_disconnect in drivers/usb/misc/usbtest.c has a memory leak, aka CID-28ebeb8db770.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15393", "url": "https://www.suse.com/security/cve/CVE-2020-15393" }, { "category": "external", "summary": "SUSE Bug 1173514 for CVE-2020-15393", "url": "https://bugzilla.suse.com/1173514" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T14:44:03Z", "details": "moderate" } ], "title": "CVE-2020-15393" }, { "cve": "CVE-2020-15780", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15780" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15780", "url": "https://www.suse.com/security/cve/CVE-2020-15780" }, { "category": "external", "summary": "SUSE Bug 1173573 for CVE-2020-15780", "url": "https://bugzilla.suse.com/1173573" }, { "category": "external", "summary": "SUSE Bug 1174186 for CVE-2020-15780", "url": "https://bugzilla.suse.com/1174186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_55-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.55.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.55.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.55.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T14:44:03Z", "details": "important" } ], "title": "CVE-2020-15780" } ] }
suse-su-2020:2105-1
Vulnerability from csaf_suse
Published
2020-08-03 14:42
Modified
2020-08-03 14:42
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2019-19462: relay_open in kernel/relay.c in the Linux kernel allowed local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result (bnc#1158265).
- CVE-2019-20810: Fixed a memory leak in go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c because it did not call snd_card_free for a failure path (bnc#1172458).
- CVE-2019-20812: An issue was discovered in the prb_calc_retire_blk_tmo() function in net/packet/af_packet.c could result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3 (bnc#1172453).
- CVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).
- CVE-2020-10135: Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key (bnc#1171988).
- CVE-2020-10711: A NULL pointer dereference flaw was found in the SELinux subsystem in versions This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. This flaw allowed a remote network user to crash the system kernel, resulting in a denial of service (bnc#1171191).
- CVE-2020-10732: A flaw was found in the implementation of Userspace core dumps. This flaw allowed an attacker with a local account to crash a trivial program and exfiltrate private kernel data (bnc#1171220).
- CVE-2020-10751: A flaw was found in the SELinux LSM hook implementation, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing (bnc#1171189).
- CVE-2020-10766: Fixed an issue which allowed an attacker with a local account to disable SSBD protection (bnc#1172781).
- CVE-2020-10767: Fixed an issue where Indirect Branch Prediction Barrier was disabled in certain circumstances, leaving the system open to a spectre v2 style attack (bnc#1172782).
- CVE-2020-10768: Fixed an issue with the prctl() function, where indirect branch speculation could be enabled even though it was diabled before (bnc#1172783).
- CVE-2020-10773: Fixed a memory leak on s390/s390x, in the cmm_timeout_hander in file arch/s390/mm/cmm.c (bnc#1172999).
- CVE-2020-10781: A zram sysfs resource consumption was fixed (bnc#1173074).
- CVE-2020-12656: Fixed a memory leak in gss_mech_free in the rpcsec_gss_krb5 implementation, caused by a lack of certain domain_release calls (bnc#1171219).
- CVE-2020-12769: An issue was discovered in drivers/spi/spi-dw.c allowed attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one (bnc#1171983).
- CVE-2020-12771: An issue was discovered in btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails (bnc#1171732).
- CVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).
- CVE-2020-13143: gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c relies on kstrdup without considering the possibility of an internal '\0' value, which allowed attackers to trigger an out-of-bounds read (bnc#1171982).
- CVE-2020-13974: Fixed a integer overflow in drivers/tty/vt/keyboard.c, if k_ascii is called several times in a row (bnc#1172775).
- CVE-2020-14416: Fixed a race condition in tty->disc_data handling in the slip and slcan line discipline could lead to a use-after-free. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).
- CVE-2020-15393: Fixed a memory leak in usbtest_disconnect (bnc#1173514).
- CVE-2020-15780: An issue was discovered in drivers/acpi/acpi_configfs.c where injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30 (bnc#1173573).
The following non-security bugs were fixed:
- ACPICA: Dispatcher: add status checks (git-fixes).
- ACPICA: Fixes for acpiExec namespace init file (git-fixes).
- ACPI: configfs: Disallow loading ACPI tables when locked down (git-fixes).
- ACPI: CPPC: Fix reference count leak in acpi_cppc_processor_probe() (git-fixes).
- ACPI: GED: add support for _Exx / _Lxx handler methods (git-fixes).
- ACPI: GED: use correct trigger type field in _Exx / _Lxx handling (git-fixes).
- ACPI/IORT: Fix PMCG node single ID mapping handling (git-fixes).
- ACPI: PM: Avoid using power resources if there are none for D0 (git-fixes).
- ACPI: sysfs: Fix pm_profile_attr type (git-fixes).
- ACPI: sysfs: Fix reference count leak in acpi_sysfs_add_hotplug_profile() (git-fixes).
- ACPI: video: Use native backlight on Acer Aspire 5783z (git-fixes).
- ACPI: video: Use native backlight on Acer TravelMate 5735Z (git-fixes).
- af_unix: add compat_ioctl support (git-fixes).
- agp/intel: Reinforce the barrier after GTT updates (git-fixes).
- aio: fix async fsync creds (bsc#1173828).
- ALSA: emu10k1: delete an unnecessary condition (git-fixes).
- ALSA: es1688: Add the missed snd_card_free() (git-fixes).
- ALSA: fireface: fix configuration error for nominal sampling transfer frequency (git-fixes).
- ALSA: firewire-lib: fix invalid assignment to union data for directional parameter (git-fixes).
- ALSA: hda: Add ElkhartLake HDMI codec vid (git-fixes).
- ALSA: hda: add member to store ratio for stripe control (git-fixes).
- ALSA: hda: Add NVIDIA codec IDs 9a & 9d through a0 to patch table (git-fixes).
- ALSA: hda: add sienna_cichlid audio asic id for sienna_cichlid up (git-fixes).
- ALSA: hda: Fix potential race in unsol event handler (git-fixes).
- ALSA: hda/hdmi: fix failures at PCM open on Intel ICL and later (git-fixes).
- ALSA: hda/hdmi: improve debug traces for stream lookups (git-fixes).
- ALSA: hda: Intel: add missing PCI IDs for ICL-H, TGL-H and EKL (jsc#SLE-13261).
- ALSA: hda - let hs_mic be picked ahead of hp_mic (git-fixes).
- ALSA: hda/realtek - Add a model for Thinkpad T570 without DAC workaround (bsc#1172017).
- ALSA: hda/realtek - add a pintbl quirk for several Lenovo machines (git-fixes).
- ALSA: hda/realtek - Add LED class support for micmute LED (git-fixes).
- ALSA: hda/realtek - Add more fixup entries for Clevo machines (git-fixes).
- ALSA: hda/realtek: Add mute LED and micmute LED support for HP systems (git-fixes).
- ALSA: hda/realtek - Add new codec supported for ALC287 (git-fixes).
- ALSA: hda/realtek - Add quirk for MSI GE63 laptop (git-fixes).
- ALSA: hda/realtek - change to suitable link model for ASUS platform (git-fixes).
- ALSA: hda/realtek - Enable audio jacks of Acer vCopperbox with ALC269VC (git-fixes).
- ALSA: hda/realtek: Enable headset mic of Acer C20-820 with ALC269VC (git-fixes).
- ALSA: hda/realtek: Enable headset mic of Acer TravelMate B311R-31 with ALC256 (git-fixes).
- ALSA: hda/realtek: Enable headset mic of Acer Veriton N4660G with ALC269VC (git-fixes).
- ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G14(G401) series with ALC289 (git-fixes).
- ALSA: hda/realtek - Enable micmute LED on and HP system (git-fixes).
- ALSA: hda/realtek - Enable Speaker for ASUS UX533 and UX534 (git-fixes).
- ALSA: hda/realtek - Enable Speaker for ASUS UX563 (git-fixes).
- ALSA: hda/realtek: Fixed ALC298 sound bug by adding quirk for Samsung Notebook Pen S (git-fixes).
- ALSA: hda/realtek - Fix Lenovo Thinkpad X1 Carbon 7th quirk subdevice id (git-fixes).
- ALSA: hda/realtek - Fix silent output on Gigabyte X570 Aorus Xtreme (git-fixes).
- ALSA: hda/realtek - Fix unused variable warning w/o CONFIG_LEDS_TRIGGER_AUDIO (git-fixes).
- ALSA: hda/realtek - fixup for yet another Intel reference board (git-fixes).
- ALSA: hda/realtek - Introduce polarity for micmute LED GPIO (git-fixes).
- ALSA: hda/tegra: correct number of SDO lines for Tegra194 (git-fixes).
- ALSA: hda/tegra: workaround playback failure on Tegra194 (git-fixes).
- ALSA: hwdep: fix a left shifting 1 by 31 UB bug (git-fixes).
- ALSA: iec1712: Initialize STDSP24 properly when using the model=staudio option (git-fixes).
- ALSA: info: Drop WARN_ON() from buffer NULL sanity check (git-fixes).
- ALSA: isa/wavefront: prevent out of bounds write in ioctl (git-fixes).
- ALSA: line6: Perform sanity check for each URB creation (git-fixes).
- ALSA: line6: Sync the pending work cancel at disconnection (git-fixes).
- ALSA: opl3: fix infoleak in opl3 (git-fixes).
- ALSA: pcm: disallow linking stream to itself (git-fixes).
- ALSA: pcm: fix incorrect hw_base increase (git-fixes).
- ALSA: pcm: fix snd_pcm_link() lockdep splat (git-fixes).
- ALSA: usb-audio: Add duplex sound support for USB devices using implicit feedback (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for RTX6001 (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for SSL2+ (git-fixes).
- ALSA: usb-audio: Add Pioneer DJ DJM-900NXS2 support (git-fixes).
- ALSA: usb-audio: add quirk for Denon DCD-1500RE (git-fixes).
- ALSA: usb-audio: add quirk for MacroSilicon MS2109 (git-fixes).
- ALSA: usb-audio: add quirk for Samsung USBC Headset (AKG) (git-fixes).
- ALSA: usb-audio: Add registration quirk for Kingston HyperX Cloud Flight S (git-fixes).
- ALSA: usb-audio: Add vendor, product and profile name for HP Thunderbolt Dock (git-fixes).
- ALSA: usb-audio: Clean up quirk entries with macros (git-fixes).
- ALSA: usb-audio: Fix a limit check in proc_dump_substream_formats() (git-fixes).
- ALSA: usb-audio: Fix inconsistent card PM state after resume (git-fixes).
- ALSA: usb-audio: fixing upper volume limit for RME Babyface Pro routing crosspoints (git-fixes).
- ALSA: usb-audio: Fixing usage of plain int instead of NULL (git-fixes).
- ALSA: usb-audio: Fix OOB access of mixer element list (git-fixes).
- ALSA: usb-audio: Fix packet size calculation (bsc#1173847).
- ALSA: usb-audio: Fix potential use-after-free of streams (git-fixes).
- ALSA: usb-audio: Fix race against the error recovery URB submission (git-fixes).
- ALSA: usb-audio: Fix racy list management in output queue (git-fixes).
- ALSA: usb-audio: Improve frames size computation (git-fixes).
- ALSA: usb-audio: Manage auto-pm of all bundled interfaces (git-fixes).
- ALSA: usb-audio: mixer: volume quirk for ESS Technology Asus USB DAC (git-fixes).
- ALSA: usb-audio: Print more information in stream proc files (git-fixes).
- ALSA: usb-audio: Quirks for Gigabyte TRX40 Aorus Master onboard audio (git-fixes).
- ALSA: usb-audio: Remove async workaround for Scarlett 2nd gen (git-fixes).
- ALSA: usb-audio: Replace s/frame/packet/ where appropriate (git-fixes).
- ALSA: usb-audio: RME Babyface Pro mixer patch (git-fixes).
- ALSA: usb-audio: Use the new macro for HP Dock rename quirks (git-fixes).
- amdgpu: a NULL ->mm does not mean a thread is a kthread (git-fixes).
- amd-xgbe: Use __napi_schedule() in BH context (networking-stable-20_04_17).
- apparmor: ensure that dfa state tables have entries (git-fixes).
- apparmor: fix introspection of of task mode for unconfined tasks (git-fixes).
- apparmor: Fix memory leak of profile proxy (git-fixes).
- apparmor: Fix use-after-free in aa_audit_rule_init (git-fixes).
- apparmor: remove useless aafs_create_symlink (git-fixes).
- arm64: dts: ls1043a-rdb: correct RGMII delay mode to rgmii-id (bsc#1174398).
- arm64: dts: ls1046ardb: set RGMII interfaces to RGMII_ID mode (bsc#1174398).
- arm64: map FDT as RW for early_init_dt_scan() (jsc#SLE-12424).
- ARM: oxnas: make ox820_boot_secondary static (git-fixes).
- asm-gemeric/tlb: remove stray function declarations (bsc#1156395).
- ASoC: codecs: max98373: Removed superfluous volume control from chip default (git-fixes).
- ASoc: codecs: max98373: remove Idle_bias_on to let codec suspend (git-fixes).
- ASoC: core: only convert non DPCM link to DPCM link (git-fixes).
- ASoC: davinci-mcasp: Fix dma_chan refcnt leak when getting dma type (git-fixes).
- ASoC: fix incomplete error-handling in img_i2s_in_probe (git-fixes).
- ASoC: fsl_asrc_dma: Fix dma_chan leak when config DMA channel failed (git-fixes).
- ASoC: fsl_ssi: Fix bclk calculation for mono channel (git-fixes).
- ASoC: Intel: bytcht_es8316: Add missed put_device() (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for Toshiba Encore WT10-A tablet (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for Toshiba Encore WT8-A tablet (git-fixes).
- ASoC: intel: cht_bsw_max98090_ti: Add all Chromebooks that need pmc_plt_clk_0 quirk (bsc#1171246).
- ASoC: intel - fix the card names (git-fixes).
- ASoC: max98373: reorder max98373_reset() in resume (git-fixes).
- ASoC: max9867: fix volume controls (git-fixes).
- ASoC: meson: add missing free_irq() in error path (git-fixes).
- ASoc: q6afe: add support to get port direction (git-fixes).
- ASoC: q6asm: handle EOS correctly (git-fixes).
- ASoC: qcom: q6asm-dai: kCFI fix (git-fixes).
- ASoC: rockchip: add format and rate constraints on rk3399 (git-fixes).
- ASoC: rockchip: Fix a reference count leak (git-fixes).
- ASoC: rt286: fix unexpected interrupt happens (git-fixes).
- ASoC: rt5645: Add platform-data for Asus T101HA (git-fixes).
- ASoC: rt5670: Add new gpio1_is_ext_spk_en quirk and enable it on the Lenovo Miix 2 10 (git-fixes).
- ASoC: rt5670: Correct RT5670_LDO_SEL_MASK (git-fixes).
- ASoC: rt5670: Fix dac- and adc- vol-tlv values being off by a factor of 10 (git-fixes).
- ASoC: rt5682: Report the button event in the headset type only (git-fixes).
- ASoC: SOF: core: fix error return code in sof_probe_continue() (git-fixes).
- ASoC: SOF: Do nothing when DSP PM callbacks are not set (git-fixes).
- ASoC: SOF: nocodec: conditionally set dpcm_capture/dpcm_playback flags (git-fixes).
- ASoC: tegra: tegra_wm8903: Support nvidia, headset property (git-fixes).
- ASoC: ti: omap-mcbsp: Fix an error handling path in 'asoc_mcbsp_probe()' (git-fixes).
- ASoC: topology: fix kernel oops on route addition error (git-fixes).
- ASoC: topology: fix tlvs in error handling for widget_dmixer (git-fixes).
- ASoC: ux500: mop500: Fix some refcounted resources issues (git-fixes).
- ASoC: wm8974: fix Boost Mixer Aux Switch (git-fixes).
- ASoC: wm8974: remove unsupported clock mode (git-fixes).
- ata/libata: Fix usage of page address by page_address in ata_scsi_mode_select_xlat function (git-fixes).
- ath10k: fix kernel null pointer dereference (git-fixes).
- ath10k: Fix the race condition in firmware dump work queue (git-fixes).
- ath10k: Remove ath10k_qmi_register_service_notifier() declaration (git-fixes).
- ath10k: remove the max_sched_scan_reqs value (git-fixes).
- ath10k: Skip handling del_server during driver exit (git-fixes).
- ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb (git-fixes).
- ath9k: Fix use-after-free Read in ath9k_wmi_ctrl_rx (git-fixes).
- ath9k: Fix use-after-free Read in htc_connect_service (git-fixes).
- ath9k: Fix use-after-free Write in ath9k_htc_rx_msg (git-fixes).
- ath9k_htc: Silence undersized packet warnings (git-fixes).
- ath9x: Fix stack-out-of-bounds Write in ath9k_hif_usb_rx_cb (git-fixes).
- ax25: fix setsockopt(SO_BINDTODEVICE) (git-fixes).
- ax88172a: fix ax88172a_unbind() failures (git-fixes).
- b43: Fix connection problem with WPA3 (git-fixes).
- b43legacy: Fix case where channel status is corrupted (git-fixes).
- b43_legacy: Fix connection problem with WPA3 (git-fixes).
- backlight: lp855x: Ensure regulators are disabled on probe failure (git-fixes).
- batman-adv: Revert 'disable ethtool link speed detection when auto negotiation off' (git-fixes).
- bdev: fix bdev inode reference count disbalance regression (bsc#1174244)
- bfq: Avoid false bfq queue merging (bsc#1171513).
- bfq: Fix check detecting whether waker queue should be selected (bsc#1168838).
- bfq: Use only idle IO periods for think time calculations (bsc#1171513).
- bfq: Use 'ttime' local variable (bsc#1171513).
- blacklist.conf: Add 9486727f5981 iommu/vt-d: Make Intel SVM code 64-bit only
- blacklist.conf: Add superfluous stable commit IDs
- blacklist.conf: cleanup removing unused exported symbols, unavoidable kABI breakage
- blacklist.conf: for future infrastructure, and will need kABI workarounds in each user, only if we really need it
- blk-iocost: Fix error on iocost_ioc_vrate_adj (bsc#1173206).
- blk-iocost: fix incorrect vtime comparison in iocg_is_idle() (bsc#1173206).
- blk-mq: consider non-idle request as 'inflight' in blk_mq_rq_inflight() (bsc#1165933).
- block/bio-integrity: do not free 'buf' if bio_integrity_add_page() failed (bsc#1173817).
- block: Fix use-after-free in blkdev_get() (bsc#1173834).
- block: nr_sects_write(): Disable preemption on seqcount write (bsc#1173818).
- Bluetooth: Add SCO fallback for invalid LMP parameters error (git-fixes).
- Bluetooth: btbcm: Add 2 missing models to subver tables (git-fixes).
- Bluetooth: btmtkuart: Improve exception handling in btmtuart_probe() (git-fixes).
- Bluetooth: hci_bcm: fix freeing not-requested IRQ (git-fixes).
- bnxt_en: Fix AER reset logic on 57500 chips (bsc#1171150).
- bnxt_en: fix firmware message length endianness (bsc#1173894).
- bnxt_en: Fix return code to 'flash_device' (bsc#1173894).
- bnxt_en: Improve TQM ring context memory sizing formulas (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Re-enable SRIOV during resume (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Return from timer if interface is not in open state (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Simplify bnxt_resume() (jsc#SLE-8371 bsc#1153274).
- bpf: Document optval > PAGE_SIZE behavior for sockopt hooks (bsc#1155518).
- bpf: Do not allow btf_ctx_access with __int128 types (bsc#1155518).
- bpf: Do not return EINVAL from {get,set}sockopt when optlen > PAGE_SIZE (bsc#1155518).
- bpf: Fix an error code in check_btf_func() (bsc#1154353).
- bpf: Fix map permissions check (bsc#1155518).
- bpf: Prevent mmap()'ing read-only maps as writable (bsc#1155518).
- bpf: Restrict bpf_probe_read{, str}() only to archs where they work (bsc#1172344).
- bpf: Restrict bpf_trace_printk()'s %s usage and add %pks, %pus specifier (bsc#1172344).
- bpf, sockhash: Synchronize_rcu before free'ing map (git-fixes).
- bpf, sockmap: Check update requirements after locking (git-fixes).
- bpf: Undo internal BPF_PROBE_MEM in BPF insns dump (bsc#1155518).
- bpf, xdp, samples: Fix null pointer dereference in *_user code (bsc#1155518).
- brcmfmac: expose RPi firmware config files through modinfo (bsc#1169094).
- brcmfmac: fix wrong location to get firmware feature (git-fixes).
- brcmfmac: Transform compatible string for FW loading (bsc#1169771).
- bridge: Avoid infinite loop when suppressing NS messages with invalid options (networking-stable-20_06_10).
- bridge: mcast: Fix MLD2 Report IPv6 payload length check (git-fixes).
- btrfs: add assertions for tree == inode->io_tree to extent IO helpers (bsc#1174438).
- btrfs: drop argument tree from btrfs_lock_and_flush_ordered_range (bsc#1174438).
- btrfs: fix failure of RWF_NOWAIT write into prealloc extent beyond eof (bsc#1174438).
- btrfs: fix hang on snapshot creation after RWF_NOWAIT write (bsc#1174438).
- btrfs: fix log context list corruption after rename whiteout error (bsc#1172342).
- btrfs: fix partial loss of prealloc extent past i_size after fsync (bsc#1172343).
- btrfs: fix RWF_NOWAIT write not failling when we need to cow (bsc#1174438).
- btrfs: fix RWF_NOWAIT writes blocking on extent locks and waiting for IO (bsc#1174438).
- btrfs: reloc: clear DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417 bsc#1160947 bsc#1172366).
- btrfs: reloc: fix reloc root leak and NULL pointer dereference (bsc#1171417 bsc#1160947 bsc#1172366).
- btrfs: use correct count in btrfs_file_write_iter() (bsc#1174438).
- bus: ti-sysc: Do not disable on suspend for no-idle (git-fixes).
- bus: ti-sysc: Ignore clockactivity unless specified as a quirk (git-fixes).
- carl9170: remove P2P_GO support (git-fixes).
- cdc-acm: Add DISABLE_ECHO quirk for Microchip/SMSC chip (git-fixes).
- CDC-ACM: heed quirk also in error handling (git-fixes).
- CDC-ACM: heed quirk also in error handling (git-fixes).
- ceph: add comments for handle_cap_flush_ack logic (bsc#1172940).
- ceph: allow rename operation under different quota realms (bsc#1172988).
- ceph: ceph_kick_flushing_caps needs the s_mutex (bsc#1172986).
- ceph: convert mdsc->cap_dirty to a per-session list (bsc#1172984 bsc#1167104).
- ceph: document what protects i_dirty_item and i_flushing_item (bsc#1172940).
- ceph: do not release i_ceph_lock in handle_cap_trunc (bsc#1172940).
- ceph: do not return -ESTALE if there's still an open file (bsc#1171915).
- ceph: do not take i_ceph_lock in handle_cap_import (bsc#1172940).
- ceph: fix potential race in ceph_check_caps (bsc#1172940).
- ceph: flush release queue when handling caps for unknown inode (bsc#1172939).
- ceph: make sure mdsc->mutex is nested in s->s_mutex to fix dead lock (bsc#1172989).
- ceph: normalize 'delta' parameter usage in check_quota_exceeded (bsc#1172987).
- ceph: reorganize __send_cap for less spinlock abuse (bsc#1172940).
- ceph: request expedited service on session's last cap flush (bsc#1172985 bsc#1167104).
- ceph: reset i_requested_max_size if file write is not wanted (bsc#1172983).
- ceph: skip checking caps when session reconnecting and releasing reqs (bsc#1172990).
- ceph: split up __finish_cap_flush (bsc#1172940).
- ceph: throw a warning if we destroy session with mutex still locked (bsc#1172940).
- char/random: Add a newline at the end of the file (jsc#SLE-12424).
- clk: bcm2835: Fix return type of bcm2835_register_gate (git-fixes).
- clk: bcm2835: Remove casting to bcm2835_clk_register (git-fixes).
- clk: clk-flexgen: fix clock-critical handling (git-fixes).
- clk: mediatek: assign the initial value to clk_init_data of mtk_mux (git-fixes).
- clk: meson: meson8b: Do not rely on u-boot to init all GP_PLL registers (git-fixes).
- clk: meson: meson8b: Fix the polarity of the RESET_N lines (git-fixes).
- clk: meson: meson8b: Fix the vclk_div{1, 2, 4, 6, 12}_en gate bits (git-fixes).
- clk: qcom: Add missing msm8998 ufs_unipro_core_clk_src (git-fixes).
- clk: qcom: msm8916: Fix the address location of pll->config_reg (git-fixes).
- clk: renesas: cpg-mssr: Fix STBCR suspend/resume handling (git-fixes).
- clk: samsung: exynos5433: Add IGNORE_UNUSED flag to sclk_i2s1 (git-fixes).
- clk: samsung: Mark top ISP and CAM clocks on Exynos542x as critical (git-fixes).
- clk: sifive: allocate sufficient memory for struct __prci_data (git-fixes).
- clk: sprd: return correct type of value for _sprd_pll_recalc_rate (git-fixes).
- clk: sunxi: Fix incorrect usage of round_down() (git-fixes).
- clk: ti: am33xx: fix RTC clock parent (git-fixes).
- clk: ti: composite: fix memory leak (git-fixes).
- clk: zynqmp: fix memory leak in zynqmp_register_clocks (git-fixes).
- clocksource: dw_apb_timer: Make CPU-affiliation being optional (git-fixes).
- clocksource: dw_apb_timer_of: Fix missing clockevent timers (git-fixes).
- component: Silence bind error on -EPROBE_DEFER (git-fixes).
- config: arm64: enable CONFIG_IOMMU_DEFAULT_PASSTHROUGH References: bsc#1172739
- coredump: fix crash when umh is disabled (git-fixes).
- coredump: fix null pointer dereference on coredump (git-fixes).
- cpufreq: Fix up cpufreq_boost_set_sw() (git-fixes).
- cpufreq: intel_pstate: Only mention the BIOS disabling turbo mode once (git-fixes).
- cpufreq: powernv: Fix frame-size-overflow in powernv_cpufreq_work_fn (git-fixes).
- cpuidle: Fix three reference count leaks (git-fixes).
- crypto: algapi - Avoid spurious modprobe on LOADED (git-fixes).
- crypto: algboss - do not wait during notifier callback (git-fixes).
- crypto: algif_skcipher - Cap recv SG list at ctx->used (git-fixes).
- crypto - Avoid free() namespace collision (git-fixes).
- crypto: cavium/nitrox - Fix 'nitrox_get_first_device()' when ndevlist is fully iterated (git-fixes).
- crypto: ccp -- do not 'select' CONFIG_DMADEVICES (git-fixes).
- crypto/chcr: fix for ccm(aes) failed test (git-fixes).
- crypto: chelsio/chtls: properly set tp->lsndtime (git-fixes).
- crypto: drbg - fix error return code in drbg_alloc_state() (git-fixes).
- crypto: omap-sham - add proper load balancing support for multicore (git-fixes).
- crypto: stm32/crc32 - fix ext4 chksum BUG_ON() (git-fixes).
- crypto: stm32/crc32 - fix multi-instance (git-fixes).
- crypto: stm32/crc32 - fix run-time self test issue (git-fixes).
- cxgb4: fix adapter crash due to wrong MC size (networking-stable-20_04_27).
- cxgb4: fix large delays in PTP synchronization (networking-stable-20_04_27).
- dccp: Fix possible memleak in dccp_init and dccp_fini (networking-stable-20_06_16).
- debugfs: Check module state before warning in {full/open}_proxy_open() (bsc#1173746).
- devinet: fix memleak in inetdev_init() (networking-stable-20_06_07).
- devlink: fix return value after hitting end in region read (networking-stable-20_05_12).
- devmap: Use bpf_map_area_alloc() for allocating hash buckets (bsc#1154353).
- /dev/mem: Add missing memory barriers for devmem_inode (git-fixes).
- /dev/mem: Revoke mappings when a driver claims the region (git-fixes).
- dma-coherent: fix integer overflow in the reserved-memory dma allocation (git-fixes).
- dma-debug: fix displaying of dma allocation type (git-fixes).
- dma-direct: fix data truncation in dma_direct_get_required_mask() (git-fixes).
- dmaengine: dmatest: Fix process hang when reading 'wait' parameter (git-fixes).
- dmaengine: dmatest: Restore default for channel (git-fixes).
- dmaengine: dmatest: stop completed threads when running without set channel (git-fixes).
- dmaengine: dw: Initialize channel before each transfer (git-fixes).
- dmaengine: fsl-edma-common: correct DSIZE_32BYTE (git-fixes).
- dmaengine: fsl-edma: Fix NULL pointer exception in fsl_edma_tx_handler (git-fixes).
- dmaengine: imx-sdma: Fix: Remove 'always true' comparison (git-fixes).
- dmaengine: mcf-edma: Fix NULL pointer exception in mcf_edma_tx_handler (git-fixes).
- dmaengine: mmp_tdma: Do not ignore slave config validation errors (git-fixes).
- dmaengine: mmp_tdma: Reset channel error on release (git-fixes).
- dmaengine: owl: Use correct lock in owl_dma_get_pchan() (git-fixes).
- dmaengine: pch_dma.c: Avoid data race between probe and irq handler (git-fixes).
- dmaengine: sh: usb-dmac: set tx_result parameters (git-fixes).
- dmaengine: tegra210-adma: Fix an error handling path in 'tegra_adma_probe()' (git-fixes).
- dm: do not use waitqueue for request-based DM (bsc#1165933).
- dm verity fec: fix hash block number in verity_fec_decode (git fixes (block drivers)).
- dm writecache: fix data corruption when reloading the target (git fixes (block drivers)).
- dm writecache: reject asynchronous pmem devices (bsc#1156395).
- dpaa2-eth: prevent array underflow in update_cls_rule() (networking-stable-20_05_16).
- dpaa2-eth: properly handle buffer size restrictions (networking-stable-20_05_16).
- dpaa_eth: fix usage as DSA master, try 3 (networking-stable-20_05_27).
- dpaa_eth: FMan erratum A050385 workaround (bsc#1174396).
- dpaa_eth: Make dpaa_a050385_wa static (bsc#1174396).
- drivers: base: Fix NULL pointer exception in __platform_driver_probe() if a driver developer is foolish (git-fixes).
- drivers: hv: Change flag to write log level in panic msg to false (bsc#1170617).
- drivers/net/ibmvnic: Update VNIC protocol version reporting (bsc#1065729).
- drivers: phy: sr-usb: do not use internal fsm for USB2 phy init (git-fixes).
- drivers: soc: ti: knav_qmss_queue: Make knav_gp_range_ops static (git-fixes).
- drm/amd/display: add basic atomic check for cursor plane (git-fixes).
- drm/amd/display: drop cursor position check in atomic test (git-fixes).
- drm: amd/display: fix Kconfig help text (bsc#1152489) * context changes
- drm/amd/display: Only revalidate bandwidth on medium and fast updates (git-fixes).
- drm/amd/display: Prevent dpcd reads with passive dongles (git-fixes).
- drm/amd/display: Revalidate bandwidth before commiting DC updates (git-fixes).
- drm/amd/display: Use kfree() to free rgb_user in calculate_user_regamma_ramp() (git-fixes).
- drm/amd: fix potential memleak in err branch (git-fixes).
- drm/amdgpu: add fw release for sdma v5_0 (git-fixes).
- drm/amdgpu/atomfirmware: fix vram_info fetching for renoir (git-fixes).
- drm/amdgpu: do not do soft recovery if gpu_recovery=0 (git-fixes).
- drm/amdgpu: drop redundant cg/pg ungate on runpm enter (git-fixes).
- drm/amdgpu: fix gfx hang during suspend with video playback (v2) (git-fixes).
- drm/amdgpu: fix the hw hang during perform system reboot and reset (git-fixes).
- drm/amdgpu: force fbdev into vram (bsc#1152472) * context changes
- drm/amdgpu: Init data to avoid oops while reading pp_num_states (git-fixes).
- drm/amdgpu: invalidate L2 before SDMA IBs (v2) (git-fixes).
- drm/amdgpu: move kfd suspend after ip_suspend_phase1 (git-fixes).
- drm/amdgpu: Replace invalid device ID with a valid device ID (bsc#1152472)
- drm/amdgpu/sdma5: fix wptr overwritten in ->get_wptr() (git-fixes).
- drm/amdgpu: simplify padding calculations (v2) (git-fixes).
- drm/amdgpu: use %u rather than %d for sclk/mclk (git-fixes).
- drm/amd/powerpay: Disable gfxoff when setting manual mode on picasso and raven (git-fixes).
- drm/amd/powerplay: avoid using pm_en before it is initialized revised (git-fixes).
- drm/amd/powerplay: perform PG ungate prior to CG ungate (git-fixes).
- drm: bridge: adv7511: Extend list of audio sample rates (git-fixes).
- drm/connector: notify userspace on hotplug after register complete (bsc#1152489) * context changes
- drm/dp_mst: Increase ACT retry timeout to 3s (bsc#1152472) * context changes
- drm/dp_mst: Reformat drm_dp_check_act_status() a bit (git-fixes).
- drm/edid: Add Oculus Rift S to non-desktop list (git-fixes).
- drm: encoder_slave: fix refcouting error for modules (git-fixes).
- drm/etnaviv: fix perfmon domain interation (git-fixes).
- drm/etnaviv: rework perfmon query infrastructure (git-fixes).
- drm/exynos: fix ref count leak in mic_pre_enable (git-fixes).
- drm/exynos: Properly propagate return value in drm_iommu_attach_device() (git-fixes).
- drm/i915: Do not enable WaIncreaseLatencyIPCEnabled when IPC is (bsc#1152489)
- drm/i915: Do not enable WaIncreaseLatencyIPCEnabled when IPC is disabled (git-fixes).
- drm/i915: extend audio CDCLK>=2*BCLK constraint to more platforms (git-fixes).
- drm/i915: Extend WaDisableDARBFClkGating to icl,ehl,tgl (bsc#1152489)
- drm/i915: fix port checks for MST support on gen >= 11 (git-fixes).
- drm/i915/gem: Avoid iterating an empty list (git-fixes).
- drm/i915/gt: Do not schedule normal requests immediately along (bsc#1152489)
- drm/i915/gt: Ignore irq enabling on the virtual engines (git-fixes).
- drm/i915/gvt: Fix kernel oops for 3-level ppgtt guest (bsc#1152489)
- drm/i915/gvt: Fix kernel oops for 3-level ppgtt guest (git-fixes).
- drm/i915/gvt: Fix two CFL MMIO handling caused by regression. (bsc#1152489)
- drm/i915/gvt: Fix two CFL MMIO handling caused by regression (git-fixes).
- drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of (bsc#1152489)
- drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of inheritance (git-fixes).
- drm/i915: HDCP: fix Ri prime check done during link check (bsc#1152489) * context changes
- drm/i915: HDCP: fix Ri prime check done during link check (git-fixes).
- drm/i915/icl+: Fix hotplug interrupt disabling after storm detection (bsc#1152489)
- drm/i915: Limit audio CDCLK>=2*BCLK constraint back to GLK only (git-fixes).
- drm/i915: Propagate error from completed fences (git-fixes).
- drm/i915: Whitelist context-local timestamp in the gen9 cmdparser (git-fixes).
- drm/i915: work around false-positive maybe-uninitialized warning (git-fixes).
- drm/mcde: dsi: Fix return value check in mcde_dsi_bind() (git-fixes).
- drm: mcde: Fix display initialization problem (git-fixes).
- drm/mediatek: Check plane visibility in atomic_update (git-fixes).
- drm/msm: Check for powered down HW in the devfreq callbacks (bsc#1152489)
- drm/msm/dpu: allow initialization of encoder locks during encoder init (git-fixes).
- drm/msm/dpu: fix error return code in dpu_encoder_init (bsc#1152489)
- drm/msm/dpu: fix error return code in dpu_encoder_init (git-fixes).
- drm/msm: fix potential memleak in error branch (git-fixes).
- drm/msm/mdp5: Fix mdp5_init error path for failed mdp5_kms allocation (git-fixes).
- drm/nouveau/disp/gm200-: fix NV_PDISP_SOR_HDMI2_CTRL(n) selection (git-fixes).
- drm: panel-orientation-quirks: Add quirk for Asus T101HA panel (git-fixes).
- drm: panel-orientation-quirks: Use generic orientation-data for Acer S1003 (git-fixes).
- drm/qxl: lost qxl_bo_kunmap_atomic_page in qxl_image_init_helper() (git-fixes).
- drm/qxl: Use correct notify port address when creating cursor ring (bsc#1152472)
- drm/radeon: fix double free (git-fixes).
- drm/radeon: fix fb_div check in ni_init_smc_spll_table() (bsc#1152472)
- drm: rcar-du: Fix build error (bsc#1152472)
- drm/sun4i: hdmi ddc clk: Fix size of m divider (git-fixes).
- drm: sun4i: hdmi: Remove extra HPD polling (bsc#1152489)
- drm: sun4i: hdmi: Remove extra HPD polling (git-fixes).
- drm/sun4i: tcon: Separate quirks for tcon0 and tcon1 on A20 (git-fixes).
- drm/tegra: hub: Do not enable orphaned window group (git-fixes).
- drm/vkms: Hold gem object while still in-use (git-fixes).
- Drop a couple of block layer git-fixes (bsc#1170891 bsc#1173139) Upstream changed the partition usage counter check back and forth and ended up reverting all changes. Let's drop our the partial backport. (cherry picked from commit 70ad1b2fa5955d91e1a09a8027daf210e28fee30)
- Drop a couple of block layer git-fixes Upstream changed the partition usage counter check back and forth and ended up reverting all changes. Let's drop our the partial backport.
- dwc3: Remove check for HWO flag in dwc3_gadget_ep_reclaim_trb_sg() (git-fixes).
- e1000: Distribute switch variables for initialization (git-fixes).
- e1000e: Disable TSO for buffer overrun workaround (git-fixes).
- e1000e: Do not wake up the system via WOL if device wakeup is disabled (git-fixes).
- e1000e: Relax condition to trigger reset for ME workaround (git-fixes).
- EDAC/amd64: Add PCI device IDs for family 17h, model 70h (bsc#1165975).
- EDAC/ghes: Setup DIMM label from DMI and use it in error reports (bsc#1168779).
- EDAC/skx: Use the mcmtr register to retrieve close_pg/bank_xor_enable (bsc#1152489).
- EDAC/synopsys: Do not dump uninitialized pinf->col (bsc#1152489).
- efi/efivars: Add missing kobject_put() in sysfs entry creation error path (git-fixes).
- efi/random: Treat EFI_RNG_PROTOCOL output as bootloader randomness (jsc#SLE-12424).
- efi: READ_ONCE rng seed size before munmap (jsc#SLE-12424).
- efi/tpm: Verify event log header before parsing (bsc#1173461).
- eventpoll: fix missing wakeup for ovflist in ep_poll_callback (bsc#1159867).
- evm: Check also if *tfm is an error pointer in init_desc() (git-fixes).
- evm: Fix a small race in init_desc() (git-fixes).
- evm: Fix possible memory leak in evm_calc_hmac_or_hash() (git-fixes).
- evm: Fix RCU list related warnings (git-fixes).
- exfat: add missing brelse() calls on error paths (git-fixes).
- exfat: fix incorrect update of stream entry in __exfat_truncate() (git-fixes).
- exfat: fix memory leak in exfat_parse_param() (git-fixes).
- exfat: move setting VOL_DIRTY over exfat_remove_entries() (git-fixes).
- ext4: avoid utf8_strncasecmp() with unstable name (bsc#1173843).
- ext4: fix error pointer dereference (bsc#1173837).
- ext4: fix EXT_MAX_EXTENT/INDEX to check for zeroed eh_max (bsc#1173836).
- ext4: fix partial cluster initialization when splitting extent (bsc#1173839).
- ext4: fix race between ext4_sync_parent() and rename() (bsc#1173838).
- ext4, jbd2: ensure panic by fix a race between jbd2 abort and ext4 error handlers (bsc#1173833).
- ext4: stop overwrite the errcode in ext4_setup_super (bsc#1173841).
- extcon: adc-jack: Fix an error handling path in 'adc_jack_probe()' (git-fixes).
- fanotify: fix ignore mask logic for events on child and on dir (bsc#1172719).
- fat: do not allow to mount if the FAT length == 0 (bsc#1173831).
- fdt: add support for rng-seed (jsc#SLE-12424).
- fdt: Update CRC check for rng-seed (jsc#SLE-12424).
- firmware: imx: scu: Fix corruption of header (git-fixes).
- firmware: imx: scu: Fix possible memory leak in imx_scu_probe() (git-fixes).
- firmware: imx-scu: Support one TX and one RX (git-fixes).
- firmware: imx: warn on unexpected RX (git-fixes).
- firmware: qcom_scm: fix bogous abuse of dma-direct internals (git-fixes).
- firmware: xilinx: Fix an error handling path in 'zynqmp_firmware_probe()' (git-fixes).
- Fix a regression of AF_ALG crypto interface hang with aes_s390 (bsc#1167651)
- fix multiplication overflow in copy_fdtable() (bsc#1173825).
- fork: prevent accidental access to clone3 features (bsc#1174018).
- fpga: dfl: afu: Corrected error handling levels (git-fixes).
- fq_codel: fix TCA_FQ_CODEL_DROP_BATCH_SIZE sanity checks (networking-stable-20_05_12).
- fs: Do not check if there is a fsnotify watcher on pseudo inodes (bsc#1158765).
- fsl/fman: detect FMan erratum A050385 (bsc#1174396) Update arm64 config file
- fsnotify: Rearrange fast path to minimise overhead when there is no watcher (bsc#1158765).
- fuse: copy_file_range should truncate cache (git-fixes).
- fuse: fix copy_file_range cache issues (git-fixes).
- genetlink: clean up family attributes allocations (git-fixes).
- genetlink: fix memory leaks in genl_family_rcv_msg_dumpit() (bsc#1154353).
- geneve: allow changing DF behavior after creation (git-fixes).
- geneve: change from tx_error to tx_dropped on missing metadata (git-fixes).
- gfs2: fix glock reference problem in gfs2_trans_remove_revoke (bsc#1173823).
- gfs2: Multi-block allocations in gfs2_page_mkwrite (bsc#1173822).
- gpio: bcm-kona: Fix return value of bcm_kona_gpio_probe() (git-fixes).
- gpio: dwapb: Append MODULE_ALIAS for platform driver (git-fixes).
- gpio: dwapb: Call acpi_gpiochip_free_interrupts() on GPIO chip de-registration (git-fixes).
- gpio: exar: Fix bad handling for ida_simple_get error path (git-fixes).
- gpiolib: Document that GPIO line names are not globally unique (git-fixes).
- gpio: pca953x: disable regmap locking for automatic address incrementing (git-fixes).
- gpio: pca953x: Fix GPIO resource leak on Intel Galileo Gen 2 (git-fixes).
- gpio: pca953x: fix handling of automatic address incrementing (git-fixes).
- gpio: pca953x: Fix pca953x_gpio_set_config (git-fixes).
- gpio: pca953x: Override IRQ for one of the expanders on Galileo Gen 2 (git-fixes).
- gpio: pxa: Fix return value of pxa_gpio_probe() (git-fixes).
- gpio: tegra: mask GPIO IRQs during IRQ shutdown (git-fixes).
- gpu/drm: Ingenic: Fix opaque pointer casted to wrong type (git-fixes).
- gpu: host1x: Detach driver on unregister (git-fixes).
- habanalabs: Align protection bits configuration of all TPCs (git-fixes).
- HID: Add quirks for Trust Panora Graphic Tablet (git-fixes).
- HID: alps: Add AUI1657 device ID (git-fixes).
- HID: alps: ALPS_1657 is too specific; use U1_UNICORN_LEGACY instead (git-fixes).
- HID: i2c-hid: add Schneider SCL142ALM to descriptor override (git-fixes).
- HID: i2c-hid: reset Synaptics SYNA2393 on resume (git-fixes).
- HID: intel-ish-hid: avoid bogus uninitialized-variable warning (git-fixes).
- HID: logitech-hidpp: avoid repeated 'multiplier = ' log messages (git-fixes).
- HID: magicmouse: do not set up autorepeat (git-fixes).
- HID: multitouch: add eGalaxTouch P80H84 support (git-fixes).
- HID: multitouch: enable multi-input as a quirk for some devices (git-fixes).
- HID: quirks: Add HID_QUIRK_NO_INIT_REPORTS quirk for Dell K12A keyboard-dock (git-fixes).
- HID: quirks: Always poll Obins Anne Pro 2 keyboard (git-fixes).
- HID: quirks: Ignore Simply Automated UPB PIM (git-fixes).
- HID: quirks: Remove ITE 8595 entry from hid_have_special_driver (git-fixes).
- HID: sony: Fix for broken buttons on DS3 USB dongles (git-fixes).
- hinic: fix a bug of ndo_stop (networking-stable-20_05_16).
- hinic: fix wrong para of wait_for_completion_timeout (networking-stable-20_05_16).
- hsr: check protocol version in hsr_newlink() (networking-stable-20_04_17).
- hv_netvsc: Fix netvsc_start_xmit's return type (git-fixes).
- hwmon: (acpi_power_meter) Fix potential memory leak in acpi_power_meter_add() (git-fixes).
- hwmon: (emc2103) fix unable to change fan pwm1_enable attribute (git-fixes).
- hwmon: (k10temp) Add AMD family 17h model 60h PCI match (git-fixes).
- hwmon: (max6697) Make sure the OVERT mask is set correctly (git-fixes).
- hwmon: (pmbus) fix a typo in Kconfig SENSORS_IR35221 option (git-fixes).
- hwrng: ks-sa - Fix runtime PM imbalance on error (git-fixes).
- i2c: acpi: put device when verifying client fails (git-fixes).
- i2c: algo-pca: Add 0x78 as SCL stuck low status for PCA9665 (git-fixes).
- i2c: altera: Fix race between xfer_msg and isr thread (git-fixes).
- i2c: core: check returned size of emulated smbus block read (git-fixes).
- i2c: designware-pci: Add support for Elkhart Lake PSE I2C (jsc#SLE-12734).
- i2c: designware-pci: Fix BUG_ON during device removal (jsc#SLE-12734).
- i2c: designware-pci: Switch over to MSI interrupts (jsc#SLE-12734).
- i2c: dev: Fix the race between the release of i2c_dev and cdev (git-fixes).
- i2c: eg20t: Load module automatically if ID matches (git-fixes).
- i2c: fix missing pm_runtime_put_sync in i2c_device_probe (git-fixes).
- i2c: fsi: Fix the port number field in status register (git-fixes).
- i2c: mlxcpld: check correct size of maximum RECV_LEN packet (git-fixes).
- i2c: mux: demux-pinctrl: Fix an error handling path in 'i2c_demux_pinctrl_probe()' (git-fixes).
- i2c: piix4: Detect secondary SMBus controller on AMD AM4 chipsets (git-fixes).
- i2c: pxa: clear all master action bits in i2c_pxa_stop_message() (git-fixes).
- i2c: pxa: fix i2c_pxa_scream_blue_murder() debug output (git-fixes).
- IB/hfi1: Do not destroy hfi1_wq when the device is shut down (bsc#1174409).
- IB/hfi1: Do not destroy link_wq when the device is shut down (bsc#1174409).
- IB/hfi1: Fix another case where pq is left on waitlist (bsc#1174411).
- IB/hfi1: Fix module use count flaw due to leftover module put calls (bsc#1174407).
- ibmveth: Fix max MTU limit (bsc#1173428 ltc#186397).
- ibmvnic: continue to init in CRQ reset returns H_CLOSED (bsc#1173280 ltc#185369).
- ibmvnic: Flush existing work items before device removal (bsc#1065729).
- ibmvnic: Harden device login requests (bsc#1170011 ltc#183538).
- IB/rdmavt: Free kernel completion queue when done (bsc#1173625).
- ice: Fix error return code in ice_add_prof() (jsc#SLE-7926).
- ice: Fix inability to set channels when down (jsc#SLE-7926).
- ieee80211: Fix incorrect mask for default PE duration (git-fixes).
- iio: adc: ad7780: Fix a resource handling path in 'ad7780_probe()' (git-fixes).
- iio: adc: stm32-adc: fix device used to request dma (git-fixes).
- iio: adc: stm32-adc: Use dma_request_chan() instead dma_request_slave_channel() (git-fixes).
- iio: adc: stm32-dfsdm: fix device used to request dma (git-fixes).
- iio: adc: stm32-dfsdm: Use dma_request_chan() instead dma_request_slave_channel() (git-fixes).
- iio: adc: ti-ads8344: Fix channel selection (git-fixes).
- iio: bmp280: fix compensation of humidity (git-fixes).
- iio: buffer: Do not allow buffers without any channels enabled to be activated (git-fixes).
- iio:chemical:pms7003: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:chemical:sps30: Fix timestamp alignment (git-fixes).
- iio: core: add missing IIO_MOD_H2/ETHANOL string identifiers (git-fixes).
- iio: dac: vf610: Fix an error handling path in 'vf610_dac_probe()' (git-fixes).
- iio:health:afe4404 Fix timestamp alignment and prevent data leak (git-fixes).
- iio:humidity:hdc100x Fix alignment and data leak issues (git-fixes).
- iio:humidity:hts221 Fix alignment and data leak issues (git-fixes).
- iio:magnetometer:ak8974: Fix alignment and data leak issues (git-fixes).
- iio: magnetometer: ak8974: Fix runtime PM imbalance on error (git-fixes).
- iio: mma8452: Add missed iio_device_unregister() call in mma8452_probe() (git-fixes).
- iio: pressure: bmp280: Tolerate IRQ before registering (git-fixes).
- iio:pressure:ms5611 Fix buffer element alignment (git-fixes).
- iio: pressure: zpa2326: handle pm_runtime_get_sync failure (git-fixes).
- iio: sca3000: Remove an erroneous 'get_device()' (git-fixes).
- iio: vcnl4000: Fix i2c swapped word reading (git-fixes).
- ima: Call ima_calc_boot_aggregate() in ima_eventdigest_init() (bsc#1172223).
- ima: Directly assign the ima_default_policy pointer to ima_rules (bsc#1172223)
- ima: Directly free *entry in ima_alloc_init_template() if digests is NULL (bsc#1172223).
- ima: Remove __init annotation from ima_pcrread() (git-fixes).
- include/asm-generic/topology.h: guard cpumask_of_node() macro argument (bsc#1148868).
- Input: dlink-dir685-touchkeys - fix a typo in driver name (git-fixes).
- Input: edt-ft5x06 - fix get_default register write access (git-fixes).
- Input: elan_i2c - add more hardware ID for Lenovo laptops (git-fixes).
- Input: evdev - call input_flush_device() on release(), not flush() (git-fixes).
- Input: goodix - fix touch coordinates on Cube I15-TC (git-fixes).
- Input: i8042 - add Lenovo XiaoXin Air 12 to i8042 nomux list (git-fixes).
- Input: i8042 - add ThinkPad S230u to i8042 reset list (git-fixes).
- input: i8042 - Remove special PowerPC handling (git-fixes).
- Input: mms114 - add extra compatible for mms345l (git-fixes).
- Input: mms114 - fix handling of mms345l (git-fixes).
- Input: synaptics - add a second working PNP_ID for Lenovo T470s (git-fixes).
- Input: synaptics-rmi4 - fix error return code in rmi_driver_probe() (git-fixes).
- Input: synaptics-rmi4 - really fix attn_data use-after-free (git-fixes).
- Input: usbtouchscreen - add support for BonXeon TP (git-fixes).
- Input: xpad - add custom init packet for Xbox One S controllers (git-fixes).
- intel_th: Fix a NULL dereference when hub driver is not loaded (git-fixes).
- intel_th: pci: Add Emmitsburg PCH support (git-fixes).
- intel_th: pci: Add Jasper Lake CPU support (git-fixes).
- intel_th: pci: Add Tiger Lake PCH-H support (git-fixes).
- iocost: check active_list of all the ancestors in iocg_activate() (bsc#1173206).
- iocost: over-budget forced IOs should schedule async delay (bsc#1173206).
- iommu/amd: Call domain_flush_complete() in update_domain() (bsc#1172061).
- iommu/amd: Do not flush Device Table in iommu_map_page() (bsc#1172062).
- iommu/amd: Do not loop forever when trying to increase address space (bsc#1172063).
- iommu/amd: Fix legacy interrupt remapping for x2APIC-enabled system (bsc#1172393).
- iommu/amd: Fix over-read of ACPI UID from IVRS table (bsc#1172064).
- iommu/amd: Fix race in increase_address_space()/fetch_pte() (bsc#1172065).
- iommu/amd: Update Device Table in increase_address_space() (bsc#1172066).
- iommu/arm-smmu-v3: Do not reserve implementation defined register space (bsc#1174126).
- iommu: Fix reference count leak in iommu_group_alloc (bsc#1172394).
- iommu/qcom: Fix local_base status check (bsc#1172067).
- iommu/virtio: Reverse arguments to list_add (bsc#1172068).
- iommu/vt-d: Enable PCI ACS for platform opt in hint (bsc#1174127).
- iommu/vt-d: Update scalable mode paging structure coherency (bsc#1174128).
- ionic: add pcie_print_link_status (bsc#1167773).
- ionic: centralize queue reset code (bsc#1167773).
- ionic: export features for vlans to use (bsc#1167773).
- ionic: no link check while resetting queues (bsc#1167773).
- ionic: remove support for mgmt device (bsc#1167773).
- ionic: tame the watchdog timer on reconfig (bsc#1167773).
- ionic: update the queue count on open (bsc#1167773).
- ionic: wait on queue start until after IFF_UP (bsc#1167773).
- io_uring: use kvfree() in io_sqe_buffer_register() (bsc#1173832).
- ipmi: use vzalloc instead of kmalloc for user creation (git-fixes).
- ipv4: Update fib_select_default to handle nexthop objects (networking-stable-20_04_27).
- ipv6: fix IPV6_ADDRFORM operation logic (bsc#1171662).
- ipvs: Improve robustness to the ipvs sysctl (git-fixes).
- irqchip/al-fic: Add support for irq retrigger (jsc#SLE-10505).
- irqchip/ti-sci-inta: Fix processing of masked irqs (git-fixes).
- irqchip/versatile-fpga: Apply clear-mask earlier (git-fixes).
- irqchip/versatile-fpga: Handle chained IRQs properly (git-fixes).
- iwlwifi: avoid debug max amsdu config overwriting itself (git-fixes).
- iwlwifi: mvm: fix aux station leak (git-fixes).
- iwlwifi: mvm: limit maximum queue appropriately (git-fixes).
- iwlwifi: pcie: handle QuZ configs with killer NICs as well (bsc#1172374).
- ixgbe: do not check firmware errors (bsc#1170284).
- jbd2: avoid leaking transaction credits when unreserving handle (bsc#1173845).
- jbd2: fix data races at struct journal_head (bsc#1173438).
- jbd2: Preserve kABI when adding j_abort_mutex (bsc#1173833).
- kabi fix for SUNRPC-dont-update-timeout-value-on-connection-reset.patch (bsc1174263).
- kABI fixup mtk-vpu: avoid unaligned access to DTCM buffer (git-fixes).
- kabi: hv: prevent struct device_node to become defined (bsc#1172871).
- kabi: ppc64le: prevent struct dma_map_ops to become defined (jsc#SLE-12424).
- kABI: protect struct fib_dump_filter (kabi).
- kABI: protect struct mlx5_cmd_work_ent (kabi).
- kABI: reintroduce inet_hashtables.h include to l2tp_ip (kabi).
- kabi/severities: Ingnore get_dev_data() The function is internal to the AMD IOMMU driver and must not be called by any third party.
- kABI workaround for struct hdac_bus changes (git-fixes).
- keys: asymmetric: fix error return code in software_key_query() (git-fixes).
- ktest: Add timeout for ssh sync testing (git-fixes).
- KVM: Check validity of resolved slot when searching memslots (bsc#1172069).
- KVM: nVMX: always update CR3 in VMCS (git-fixes).
- KVM: x86/mmu: Set mmio_value to '0' if reserved #PF can't be generated (bsc#1171904).
- KVM: x86: only do L1TF workaround on affected processors (bsc#1171904).
- l2tp: add sk_family checks to l2tp_validate_socket (networking-stable-20_06_07).
- l2tp: Allow management of tunnels and session in user namespace (networking-stable-20_04_17).
- l2tp: do not use inet_hash()/inet_unhash() (networking-stable-20_06_07).
- libbpf: Fix perf_buffer__free() API for sparse allocs (bsc#1155518).
- libceph: do not omit recovery_deletes in target_copy() (git-fixes).
- libceph: ignore pool overlay and cache logic on redirects (bsc#1172938).
- lib: devres: add a helper function for ioremap_uc (git-fixes).
- libertas_tf: avoid a null dereference in pointer priv (git-fixes).
- lib/lzo: fix ambiguous encoding bug in lzo-rle (git-fixes).
- libnvdimm/btt: fix variable 'rc' set but not used (bsc#1162400).
- libnvdimm: cover up nd_pfn_sb changes (bsc#1171759).
- libnvdimm: cover up nd_region changes (bsc#1162400).
- libnvdimm/dax: Pick the right alignment default when creating dax devices (bsc#1171759).
- libnvdimm/label: Remove the dpa align check (bsc#1171759).
- libnvdimm/namespace: Enforce memremap_compat_align() (bsc#1162400).
- libnvdimm/namsepace: Do not set claim_class on error (bsc#1162400).
- libnvdimm/of_pmem: Provide a unique name for bus provider (bsc#1171739).
- libnvdimm: Out of bounds read in __nd_ioctl() (bsc#1065729).
- libnvdimm/pfn_dev: Add a build check to make sure we notice when struct page size change (bsc#1171743).
- libnvdimm/pfn_dev: Add page size and struct page size to pfn superblock (bsc#1171759).
- libnvdimm/pfn: Prevent raw mode fallback if pfn-infoblock valid (bsc#1171743).
- libnvdimm/pmem: Advance namespace seed for specific probe errors (bsc#1171743).
- libnvdimm/region: Fix build error (bsc#1162400).
- libnvdimm/region: Introduce an 'align' attribute (bsc#1162400).
- libnvdimm/region: Introduce NDD_LABELING (bsc#1162400).
- libnvdimm/region: Rewrite _probe_success() to _advance_seeds() (bsc#1171743).
- libnvdimm: Use PAGE_SIZE instead of SZ_4K for align check (bsc#1171759).
- lib: Reduce user_access_begin() boundaries in strncpy_from_user() and strnlen_user() (bsc#1174331).
- lib: Uplevel the pmem 'region' ida to a global allocator (bc#1162400).
- list: Add hlist_unhashed_lockless() (bsc#1173438).
- livepatch: Apply vmlinux-specific KLP relocations early (bsc#1071995).
- livepatch: Disallow vmlinux.ko (bsc#1071995).
- livepatch: Make klp_apply_object_relocs static (bsc#1071995).
- livepatch: Prevent module-specific KLP rela sections from referencing vmlinux symbols (bsc#1071995).
- livepatch: Remove .klp.arch (bsc#1071995).
- locktorture: Allow CPU-hotplug to be disabled via --bootargs (bsc#1173068).
- loop: replace kill_bdev with invalidate_bdev (bsc#1173820).
- lpfc_debugfs: get rid of pointless access_ok() (bsc#1171530).
- lpfc: fix axchg pointer reference after free and double frees (bsc#1171530).
- lpfc: Fix pointer checks and comments in LS receive refactoring (bsc#1171530).
- lpfc: Fix return value in __lpfc_nvme_ls_abort (bsc#1171530).
- lpfc: Synchronize NVME transport and lpfc driver devloss_tmo (bcs#1173060).
- mac80211: mesh: fix discovery timer re-arming issue / crash (git-fixes).
- mailbox: zynqmp-ipi: Fix NULL vs IS_ERR() check in zynqmp_ipi_mbox_probe() (git-fixes).
- Make the 'Reducing compressed framebufer size' message be DRM_INFO_ONCE() (git-fixes).
- mdraid: fix read/write bytes accounting (bsc#1172537).
- media: cec: silence shift wrapping warning in __cec_s_log_addrs() (git-fixes).
- media: cedrus: Program output format during each run (git-fixes).
- media: dvbdev: Fix tuner->demod media controller link (git-fixes).
- media: dvb: return -EREMOTEIO on i2c transfer failure (git-fixes).
- media: dvbsky: add support for eyeTV Geniatech T2 lite (bsc#1173776).
- media: dvbsky: add support for Mygica T230C v2 (bsc#1173776).
- media: imx: imx7-mipi-csis: Cleanup and fix subdev pad format handling (git-fixes).
- media: mtk-vpu: avoid unaligned access to DTCM buffer (git-fixes).
- media: ov5640: fix use of destroyed mutex (git-fixes).
- media: platform: fcp: Set appropriate DMA parameters (git-fixes).
- media: Revert 'staging: imgu: Address a compiler warning on alignment' (git-fixes).
- media: si2157: Better check for running tuner in init (git-fixes).
- media: si2168: add support for Mygica T230C v2 (bsc#1173776).
- media: staging: imgu: do not hold spinlock during freeing mmu page table (git-fixes).
- media: staging/intel-ipu3: Implement lock for stream on/off operations (git-fixes).
- media: staging: ipu3: Fix stale list entries on parameter queue failure (git-fixes).
- media: staging: ipu3-imgu: Move alignment attribute to field (git-fixes).
- media: vicodec: Fix error codes in probe function (git-fixes).
- mei: bus: do not clean driver pointer (git-fixes).
- mei: release me_cl object reference (git-fixes).
- mfd: intel-lpss: Add Intel Jasper Lake PCI IDs (jsc#SLE-12602).
- mfd: intel-lpss: Add Intel Tiger Lake PCI IDs (jsc#SLE-12737).
- mfd: intel-lpss: Use devm_ioremap_uc for MMIO (git-fixes).
- mfd: stmfx: Fix stmfx_irq_init error path (git-fixes).
- mfd: stmfx: Reset chip on resume as supply was disabled (git-fixes).
- mfd: wm8994: Fix driver operation if loaded as modules (git-fixes).
- misc: fastrpc: fix potential fastrpc_invoke_ctx leak (git-fixes).
- misc: rtsx: Add short delay after exit from ASPM (git-fixes).
- mlxsw: core: Use different get_trend() callbacks for different thermal zones (networking-stable-20_06_10).
- mlxsw: Fix some IS_ERR() vs NULL bugs (networking-stable-20_04_27).
- mlxsw: spectrum_acl_tcam: Position vchunk in a vregion list properly (networking-stable-20_05_12).
- mm: adjust vm_committed_as_batch according to vm overcommit policy (bnc#1173271).
- mmc: block: Fix use-after-free issue for rpmb (git-fixes).
- mmc: core: Use DEFINE_DEBUGFS_ATTRIBUTE instead of DEFINE_SIMPLE_ATTRIBUTE (git-fixes).
- mmc: fix compilation of user API (git-fixes).
- mmc: meson-gx: limit segments to 1 when dram-access-quirk is needed (git-fixes).
- mmc: meson-mx-sdio: trigger a soft reset after a timeout or CRC error (git-fixes).
- mmc: mmci_sdmmc: fix DMA API warning overlapping mappings (git-fixes).
- mmc: sdhci: do not enable card detect interrupt for gpio cd type (git-fixes).
- mmc: sdhci-esdhc-imx: fix the mask for tuning start point (git-fixes).
- mmc: sdhci-msm: Clear tuning done flag while hs400 tuning (git-fixes).
- mmc: sdhci-msm: Set SDHCI_QUIRK_MULTIBLOCK_READ_ACMD12 quirk (git-fixes).
- mmc: sdio: Fix potential NULL pointer error in mmc_sdio_init_card() (git-fixes).
- mmc: sdio: Fix several potential memory leaks in mmc_sdio_init_card() (git-fixes).
- mmc: tmio: Further fixup runtime PM management at remove (git-fixes).
- mmc: uniphier-sd: call devm_request_irq() after tmio_mmc_host_probe() (git-fixes).
- mmc: via-sdmmc: Respect the cmd->busy_timeout from the mmc core (git-fixes).
- mm: do not prepare anon_vma if vma has VM_WIPEONFORK (bsc#1169681).
- mm: fix NUMA node file count error in replace_page_cache() (bsc#1173844).
- mm: memcontrol: fix memory.low proportional distribution (bsc#1168230).
- mm/memory_hotplug: refrain from adding memory into an impossible node (bsc#1173552).
- mm/memremap: drop unused SECTION_SIZE and SECTION_MASK (bsc#1162400 bsc#1170895 ltc#184375 ltc#185686).
- mm/memremap_pages: Introduce memremap_compat_align() (bsc#1162400).
- mm/memremap_pages: Kill unused __devm_memremap_pages() (bsc#1162400).
- mm/mmap.c: close race between munmap() and expand_upwards()/downwards() (bsc#1174527).
- mm/util.c: make vm_memory_committed() more accurate (bnc#1173271).
- move unsortable patch out of sorted section patches.suse/revert-zram-convert-remaining-class_attr-to-class_attr_ro
- mt76: mt76x02u: Add support for newer versions of the XBox One wifi adapter (git-fixes).
- mtd: Fix mtd not registered due to nvmem name collision (git-fixes).
- mtd: rawnand: brcmnand: correctly verify erased pages (git-fixes).
- mtd: rawnand: brcmnand: fix CS0 layout (git-fixes).
- mtd: rawnand: brcmnand: fix hamming oob layout (git-fixes).
- mtd: rawnand: diskonchip: Fix the probe error path (git-fixes).
- mtd: rawnand: Fix nand_gpio_waitrdy() (git-fixes).
- mtd: rawnand: ingenic: Fix the probe error path (git-fixes).
- mtd: rawnand: marvell: Fix probe error path (git-fixes).
- mtd: rawnand: marvell: Fix the condition on a return code (git-fixes).
- mtd: rawnand: marvell: Use nand_cleanup() when the device is not yet registered (git-fixes).
- mtd: rawnand: mtk: Fix the probe error path (git-fixes).
- mtd: rawnand: onfi: Fix redundancy detection check (git-fixes).
- mtd: rawnand: orion: Fix the probe error path (git-fixes).
- mtd: rawnand: oxnas: Keep track of registered devices (git-fixes).
- mtd: rawnand: oxnas: Release all devices in the _remove() path (git-fixes).
- mtd: rawnand: pasemi: Fix the probe error path (git-fixes).
- mtd: rawnand: plat_nand: Fix the probe error path (git-fixes).
- mtd: rawnand: sharpsl: Fix the probe error path (git-fixes).
- mtd: rawnand: socrates: Fix the probe error path (git-fixes).
- mtd: rawnand: sunxi: Fix the probe error path (git-fixes).
- mtd: rawnand: timings: Fix default tR_max and tCCS_min timings (git-fixes).
- mtd: rawnand: tmio: Fix the probe error path (git-fixes).
- mtd: rawnand: xway: Fix the probe error path (git-fixes).
- mtd: spinand: Propagate ECC information to the MTD structure (git-fixes).
- mtd: spi-nor: intel-spi: Add support for Intel Tiger Lake SPI serial flash (jsc#SLE-12737).
- mvpp2: remove module bugfix (bsc#1154353).
- mwifiex: avoid -Wstringop-overflow warning (git-fixes).
- mwifiex: Fix memory corruption in dump_station (git-fixes).
- namei: only return -ECHILD from follow_dotdot_rcu() (bsc#1173824).
- nbd: Fix memory leak in nbd_add_socket (git-fixes).
- neigh: send protocol value in neighbor create notification (networking-stable-20_05_12).
- net: bcmgenet: correct per TX/RX ring statistics (networking-stable-20_04_27).
- net: be more gentle about silly gso requests coming from user (networking-stable-20_06_07).
- net: check untrusted gso_size at kernel entry (networking-stable-20_06_07).
- net: core: device_rename: Use rwsem instead of a seqcount (bsc#1162702).
- net: do not return invalid table id error when we fall back to PF_UNSPEC (networking-stable-20_05_27).
- net: dsa: b53: b53_arl_rw_op() needs to select IVL or SVL (networking-stable-20_04_27).
- net: dsa: b53: Fix ARL register definitions (networking-stable-20_04_27).
- net: dsa: b53: Lookup VID in ARL searches when VLAN is enabled (networking-stable-20_04_27).
- net: dsa: b53: Rework ARL bin logic (networking-stable-20_04_27).
- net: dsa: bcm_sf2: Fix node reference count (git-fixes).
- net: dsa: declare lockless TX feature for slave ports (bsc#1154353).
- net: dsa: Do not leave DSA master with NULL netdev_ops (networking-stable-20_05_12).
- net: dsa: loop: Add module soft dependency (networking-stable-20_05_16).
- net: dsa: mt7530: fix roaming from DSA user ports (networking-stable-20_05_27).
- net: dsa: mt7530: fix tagged frames pass-through in VLAN-unaware mode (networking-stable-20_04_17).
- net: ena: xdp: update napi budget for DROP and ABORTED (bsc#1154492).
- net: ena: xdp: XDP_TX: fix memory leak (bsc#1154492).
- net: ethernet: ti: cpsw: fix ASSERT_RTNL() warning during suspend (networking-stable-20_05_27).
- net_failover: fixed rollback in net_failover_open() (networking-stable-20_06_10).
- netfilter: connlabels: prefer static lock initialiser (git-fixes).
- netfilter: ip6tables: Add a .pre_exit hook in all ip6table_foo.c (bsc#1171857).
- netfilter: ip6tables: Split ip6t_unregister_table() into pre_exit and exit helpers (bsc#1171857).
- netfilter: iptables: Add a .pre_exit hook in all iptable_foo.c (bsc#1171857).
- netfilter: iptables: Split ipt_unregister_table() into pre_exit and exit helpers (bsc#1171857).
- netfilter: nf_queue: enqueue skbs with NULL dst (git-fixes).
- netfilter: nf_tables_offload: return EOPNOTSUPP if rule specifies no actions (git-fixes).
- netfilter: nft_tproxy: Fix port selector on Big Endian (git-fixes).
- netfilter: nft_tunnel: add the missing ERSPAN_VERSION nla_policy (git-fixes).
- netfilter: not mark a spinlock as __read_mostly (git-fixes).
- net: fix a potential recursive NETDEV_FEAT_CHANGE (networking-stable-20_05_16).
- net: fsl/fman: treat all RGMII modes in memac_adjust_link() (bsc#1174398).
- net: hns3: check reset pending after FLR prepare (bsc#1154353).
- __netif_receive_skb_core: pass skb by reference (networking-stable-20_05_27).
- net: inet_csk: Fix so_reuseport bind-address cache in tb->fast* (networking-stable-20_05_27).
- net: ipip: fix wrong address family in init error path (networking-stable-20_05_27).
- net: ipv4: devinet: Fix crash when add/del multicast IP with autojoin (networking-stable-20_04_17).
- net: ipv4: Fix wrong type conversion from hint to rt in ip_route_use_hint() (bsc#1154353).
- net: ipv6: do not consider routes via gateways for anycast address check (networking-stable-20_04_17).
- net: macb: call pm_runtime_put_sync on failure path (git-fixes).
- net: macb: fix an issue about leak related system resources (networking-stable-20_05_12).
- net: macsec: preserve ingress frame ordering (networking-stable-20_05_12).
- net/mlx4_core: Fix use of ENOSPC around mlx4_counter_alloc() (networking-stable-20_05_12).
- net/mlx4_en: avoid indirect call in TX completion (networking-stable-20_04_27).
- net/mlx5: Add command entry handling completion (networking-stable-20_05_27).
- net/mlx5: Disable reload while removing the device (jsc#SLE-8464).
- net/mlx5: drain health workqueue in case of driver load error (networking-stable-20_06_16).
- net/mlx5: DR, Fix freeing in dr_create_rc_qp() (jsc#SLE-8464).
- net/mlx5e: Add missing release firmware call (networking-stable-20_04_17).
- net/mlx5e: Fix CPU mapping after function reload to avoid aRFS RX crash (jsc#SLE-8464).
- net/mlx5e: Fix inner tirs handling (networking-stable-20_05_27).
- net/mlx5e: Fix pfnum in devlink port attribute (networking-stable-20_04_17).
- net/mlx5e: Fix repeated XSK usage on one channel (networking-stable-20_06_16).
- net/mlx5e: Fix stats update for matchall classifier (jsc#SLE-8464).
- net/mlx5e: Fix VXLAN configuration restore after function reload (jsc#SLE-8464).
- net/mlx5e: kTLS, Destroy key object after destroying the TIS (networking-stable-20_05_27).
- net/mlx5e: replace EINVAL in mlx5e_flower_parse_meta() (jsc#SLE-8464).
- net/mlx5e: Update netdev txq on completions during closure (networking-stable-20_05_27).
- net/mlx5: Fix cleaning unmanaged flow tables (jsc#SLE-8464).
- net/mlx5: Fix command entry leak in Internal Error State (networking-stable-20_05_12).
- net/mlx5: Fix crash upon suspend/resume (bsc#1172365).
- net/mlx5: Fix error flow in case of function_setup failure (networking-stable-20_05_27).
- net/mlx5: Fix fatal error handling during device load (networking-stable-20_06_16).
- net/mlx5: Fix forced completion access non initialized command entry (networking-stable-20_05_12).
- net/mlx5: Fix frequent ioread PCI access during recovery (networking-stable-20_04_17).
- net/mlx5: Fix memory leak in mlx5_events_init (networking-stable-20_05_27).
- net: mvpp2: cls: Prevent buffer overflow in mvpp2_ethtool_cls_rule_del() (networking-stable-20_05_12).
- net: mvpp2: fix RX hashing for non-10G ports (networking-stable-20_05_27).
- net: mvpp2: prevent buffer overflow in mvpp22_rss_ctx() (networking-stable-20_05_12).
- net: netrom: Fix potential nr_neigh refcnt leak in nr_add_node (networking-stable-20_04_27).
- net: nlmsg_cancel() if put fails for nhmsg (networking-stable-20_05_27).
- net: openvswitch: ovs_ct_exit to be done under ovs_lock (networking-stable-20_04_27).
- net: phy: fix aneg restart in phy_ethtool_set_eee (networking-stable-20_05_16).
- net: phy: propagate an error back to the callers of phy_sfp_probe (bsc#1154353).
- net: phy: realtek: add support for configuring the RX delay on RTL8211F (bsc#1174398).
- netprio_cgroup: Fix unlimited memory leak of v2 cgroups (networking-stable-20_05_16).
- net: qrtr: Fix passing invalid reference to qrtr_local_enqueue() (networking-stable-20_05_27).
- net: qrtr: send msgs from local of same id as broadcast (networking-stable-20_04_17).
- net: revert default NAPI poll timeout to 2 jiffies (networking-stable-20_04_17).
- net: revert 'net: get rid of an signed integer overflow in ip_idents_reserve()' (bnc#1158748 (network regression)).
- net sched: fix reporting the first-time use timestamp (networking-stable-20_05_27).
- net_sched: sch_skbprio: add message validation to skbprio_change() (networking-stable-20_05_12).
- net/smc: fix restoring of fallback changes (git-fixes).
- net/smc: tolerate future SMCD versions (bsc#1172543 LTC#186069).
- net: stmmac: do not attach interface until resume finishes (bsc#1174072).
- net: stmmac: dwc-qos: avoid clk and reset for acpi device (bsc#1174072).
- net: stmmac: dwc-qos: use generic device api (bsc#1174072).
- net: stmmac: enable timestamp snapshot for required PTP packets in dwmac v5.10a (networking-stable-20_06_07).
- net: stmmac: fix num_por initialization (networking-stable-20_05_16).
- net: stmmac: platform: fix probe for ACPI devices (bsc#1174072).
- net: stricter validation of untrusted gso packets (networking-stable-20_05_12).
- net: tc35815: Fix phydev supported/advertising mask (networking-stable-20_05_12).
- net: tcp: fix rx timestamp behavior for tcp_recvmsg (networking-stable-20_05_16).
- net/tls: fix encryption error checking (git-fixes).
- net/tls: fix race condition causing kernel panic (networking-stable-20_05_27).
- net/tls: Fix sk_psock refcnt leak in bpf_exec_tx_verdict() (networking-stable-20_05_12).
- net/tls: Fix sk_psock refcnt leak when in tls_data_ready() (networking-stable-20_05_12).
- net/tls: free record only on encryption error (git-fixes).
- net: tun: record RX queue in skb before do_xdp_generic() (networking-stable-20_04_17).
- net: usb: qmi_wwan: add support for DW5816e (networking-stable-20_05_12).
- net: usb: qmi_wwan: add Telit LE910C1-EUX composition (networking-stable-20_06_07).
- net: vmxnet3: fix possible buffer overflow caused by bad DMA value in vmxnet3_get_rss() (bsc#1172484).
- net/x25: Fix x25_neigh refcnt leak when receiving frame (networking-stable-20_04_27).
- nexthop: Fix attribute checking for groups (networking-stable-20_05_27).
- NFC: st21nfca: add missed kfree_skb() in an error path (git-fixes).
- nfp: abm: fix a memory leak bug (networking-stable-20_05_12).
- nfp: abm: fix error return code in nfp_abm_vnic_alloc() (networking-stable-20_05_16).
- nfp: flower: fix used time of merge flow statistics (networking-stable-20_06_07).
- nfs: add minor version to nfs_server_key for fscache (bsc#1172467).
- nfsd4: fix nfsdfs reference count loop (git-fixes).
- nfsd4: make drc_slab global, not per-net (git-fixes).
- nfsd: always check return value of find_any_file (bsc#1172208).
- nfsd: apply umask on fs without ACL support (git-fixes).
- nfsd: fix nfsdfs inode reference count leak (git-fixes).
- NFS: Fix fscache super_cookie index_key from changing after umount (git-fixes).
- NFS: Fix interrupted slots by sending a solo SEQUENCE operation (bsc#1174264).
- nfs: fix NULL deference in nfs4_get_valid_delegation.
- nfs: fscache: use timespec64 in inode auxdata (git-fixes).
- nfs: set invalid blocks after NFSv4 writes (git-fixes).
- NFSv4.1 fix rpc_call_done assignment for BIND_CONN_TO_SESSION (git-fixes).
- NFSv4 fix CLOSE not waiting for direct IO compeletion (git-fixes).
- NFSv4: Fix fscache cookie aux_data to ensure change_attr is included (git-fixes).
- ntb: intel: add hw workaround for NTB BAR alignment (jsc#SLE-12710).
- ntb: intel: Add Icelake (gen4) support for Intel NTB (jsc#SLE-12710).
- ntb: intel: fix static declaration (jsc#SLE-12710).
- nvdimm: Avoid race between probe and reading device attributes (bsc#1170442).
- nvme-fc: avoid gcc-10 zero-length-bounds warning (bsc#1173206).
- nvme-fc: do not call nvme_cleanup_cmd() for AENs (bsc#1171688).
- nvme-fc: print proper nvme-fc devloss_tmo value (bsc#1172391).
- objtool: Allow no-op CFI ops in alternatives (bsc#1169514).
- objtool: Clean instruction state before each function validation (bsc#1169514).
- objtool: Fix !CFI insn_state propagation (bsc#1169514).
- objtool: Fix ORC vs alternatives (bsc#1169514).
- objtool: Ignore empty alternatives (bsc#1169514).
- objtool: Remove check preventing branches within alternative (bsc#1169514).
- objtool: Rename struct cfi_state (bsc#1169514).
- objtool: Uniquely identify alternative instruction groups (bsc#1169514).
- ovl: inode reference leak in ovl_is_inuse true case (git-fixes).
- p54usb: add AirVasT USB stick device-id (git-fixes).
- padata: add separate cpuhp node for CPUHP_PADATA_DEAD (git-fixes).
- padata: kABI fixup for struct padata_instance splitting nodes (git-fixes).
- panic: do not print uninitialized taint_flags (bsc#1172814).
- PCI: aardvark: Do not blindly enable ASPM L0s and do not write to read-only register (git-fixes).
- PCI: Add ACS quirk for Intel Root Complex Integrated Endpoints (git-fixes).
- PCI: Add Loongson vendor ID (git-fixes).
- PCI/AER: Remove HEST/FIRMWARE_FIRST parsing for AER ownership (bsc#1174356).
- PCI/AER: Use only _OSC to determine AER ownership (bsc#1174356).
- PCI: Allow pci_resize_resource() for devices on root bus (git-fixes).
- PCI: amlogic: meson: Do not use FAST_LINK_MODE to set up link (git-fixes).
- PCI/ASPM: Allow ASPM on links to PCIe-to-PCI/PCI-X Bridges (git-fixes).
- PCI: Avoid FLR for AMD Matisse HD Audio & USB 3.0 (git-fixes).
- PCI: Avoid FLR for AMD Starship USB 3.0 (git-fixes).
- PCI: brcmstb: Assert fundamental reset on initialization (git-fixes).
- PCI: brcmstb: Assert fundamental reset on initialization (git-fixes).
- PCI: brcmstb: Fix window register offset from 4 to 8 (git-fixes).
- PCI: brcmstb: Fix window register offset from 4 to 8 (git-fixes).
- PCI: Do not disable decoding when mmio_always_on is set (git-fixes).
- PCI: dwc: Fix inner MSI IRQ domain registration (git-fixes).
- PCI/EDR: Log only ACPI_NOTIFY_DISCONNECT_RECOVER events (bsc#1174513).
- pcie: mobiveil: remove patchset v9 Prepare to backport upstream version.
- PCI: Fix pci_register_host_bridge() device_register() error handling (git-fixes).
- PCI: hv: Add support for protocol 1.3 and support PCI_BUS_RELATIONS2 (bsc#1172201).
- PCI: hv: Change pci_protocol_version to per-hbus (bsc#1172871).
- PCI: hv: Decouple the func definition in hv_dr_state from VSP message (bsc#1172871).
- PCI: hv: Fix the PCI HyperV probe failure path to release resource properly (bsc#1172871).
- PCI: hv: Introduce hv_msi_entry (bsc#1172871).
- PCI: hv: Move hypercall related definitions into tlfs header (bsc#1172871).
- PCI: hv: Move retarget related structures into tlfs header (bsc#1172871).
- PCI: hv: Reorganize the code in preparation of hibernation (bsc#1172871).
- PCI: hv: Retry PCI bus D0 entry on invalid device state (bsc#1172871).
- PCI: mobiveil: Add 8-bit and 16-bit CSR register accessors (bsc#1161495).
- PCI: mobiveil: Add callback function for interrupt initialization (bsc#1161495).
- PCI: mobiveil: Add callback function for link up check (bsc#1161495).
- PCI: mobiveil: Add Header Type field check (bsc#1161495).
- PCI: mobiveil: Add PCIe Gen4 RC driver for Layerscape SoCs (bsc#1161495).
- PCI: mobiveil: Allow mobiveil_host_init() to be used to re-init host (bsc#1161495).
- PCI: mobiveil: Collect the interrupt related operations into a function (bsc#1161495).
- PCI: mobiveil: Fix sparse different address space warnings (bsc#1161495).
- PCI: mobiveil: Fix unmet dependency warning for PCIE_MOBIVEIL_PLAT (bsc#1161495).
- PCI: mobiveil: Introduce a new structure mobiveil_root_port (bsc#1161495).
- PCI: mobiveil: ls_pcie_g4: add Workaround for A-011451 (bsc#1161495).
- PCI: mobiveil: ls_pcie_g4: add Workaround for A-011577 (bsc#1161495).
- PCI: mobiveil: ls_pcie_g4: fix SError when accessing config space (bsc#1161495).
- PCI: mobiveil: Modularize the Mobiveil PCIe Host Bridge IP driver (bsc#1161495).
- PCI: mobiveil: Move the host initialization into a function (bsc#1161495).
- PCI: pci-bridge-emul: Fix PCIe bit conflicts (git-fixes).
- PCI/PM: Adjust pcie_wait_for_link_delay() for caller delay (git-fixes).
- PCI/PM: Call .bridge_d3() hook only if non-NULL (git-fixes).
- PCI: Program MPS for RCiEP devices (git-fixes).
- PCI/PTM: Inherit Switch Downstream Port PTM settings from Upstream Port (git-fixes).
- PCI: rcar: Fix incorrect programming of OB windows (git-fixes).
- pci: Revive pci_dev __aer_firmware_first* fields for kABI (bsc#1174356).
- PCI: v3-semi: Fix a memory leak in v3_pci_probe() error handling paths (git-fixes).
- PCI: vmd: Add device id for VMD device 8086:9A0B (git-fixes).
- PCI: vmd: Filter resource type bits from shadow register (git-fixes).
- pcm_native: result of put_user() needs to be checked (git-fixes).
- percpu: Separate decrypted varaibles anytime encryption can be enabled (bsc#1174332).
- perf/core: Fix endless multiplex timer (git-fixes).
- perf/core: fix parent pid/tid in task exit events (git-fixes).
- pinctrl: freescale: imx: Fix an error handling path in 'imx_pinctrl_probe()' (git-fixes).
- pinctrl: freescale: imx: Use 'devm_of_iomap()' to avoid a resource leak in case of error in 'imx_pinctrl_probe()' (git-fixes).
- pinctrl: imxl: Fix an error handling path in 'imx1_pinctrl_core_probe()' (git-fixes).
- pinctrl: intel: Add Intel Tiger Lake pin controller support (jsc#SLE-12737).
- pinctrl: ocelot: Fix GPIO interrupt decoding on Jaguar2 (git-fixes).
- pinctrl: rockchip: fix memleak in rockchip_dt_node_to_map (git-fixes).
- pinctrl: rza1: Fix wrong array assignment of rza1l_swio_entries (git-fixes).
- pinctrl: samsung: Correct setting of eint wakeup mask on s5pv210 (git-fixes).
- pinctrl: samsung: Save/restore eint_mask over suspend for EINT_TYPE GPIOs (git-fixes).
- pinctrl: sprd: Fix the incorrect pull-up definition (git-fixes).
- pinctrl: stmfx: stmfx_pinconf_set does not require to get direction anymore (git-fixes).
- pinctrl: tegra: Use noirq suspend/resume callbacks (git-fixes).
- pinctrl: tigerlake: Tiger Lake uses _HID enumeration (jsc#SLE-12737).
- platform/x86: asus-nb-wmi: Do not load on Asus T100TA and T200TA (git-fixes).
- platform/x86: asus_wmi: Reserve more space for struct bias_args (git-fixes).
- platform/x86: dell-laptop: do not register micmute LED if there is no token (git-fixes).
- platform/x86: hp-wmi: Convert simple_strtoul() to kstrtou32() (git-fixes).
- platform/x86: intel-hid: Add a quirk to support HP Spectre X2 (2015) (git-fixes).
- platform/x86: intel-vbtn: Also handle tablet-mode switch on 'Detachable' and 'Portable' chassis-types (git-fixes).
- platform/x86: intel-vbtn: Do not advertise switches to userspace if they are not there (git-fixes).
- platform/x86: intel-vbtn: Only blacklist SW_TABLET_MODE on the 9 / 'Laptop' chasis-type (git-fixes).
- platform/x86: intel-vbtn: Split keymap into buttons and switches parts (git-fixes).
- platform/x86: intel-vbtn: Use acpi_evaluate_integer() (git-fixes).
- platform/x86: ISST: Increase timeout (bsc#1174185).
- PM: runtime: clk: Fix clk_pm_runtime_get() error path (git-fixes).
- pNFS/flexfiles: Fix list corruption if the mirror count changes (git-fixes).
- pnp: Use list_for_each_entry() instead of open coding (git-fixes).
- powerpc/64s: Do not let DT CPU features set FSCR_DSCR (bsc#1065729).
- powerpc/64s/exception: Fix machine check no-loss idle wakeup (bsc#1156395).
- powerpc/64s/kuap: Restore AMR in system reset exception (bsc#1156395).
- powerpc/64s: Save FSCR to init_task.thread.fscr after feature init (bsc#1065729).
- powerpc/book3s64: Export has_transparent_hugepage() related functions (bsc#1171759).
- powerpc/book3s64/pkeys: Fix pkey_access_permitted() for execute disable pkey (bsc#1065729).
- powerpc/bpf: Enable bpf_probe_read{, str}() on powerpc again (bsc#1172344).
- powerpc/fadump: Account for memory_limit while reserving memory (jsc#SLE-9099 git-fixes).
- powerpc/fadump: consider reserved ranges while reserving memory (jsc#SLE-9099 git-fixes).
- powerpc/fadump: fix race between pstore write and fadump crash trigger (bsc#1168959 ltc#185010).
- powerpc/fadump: use static allocation for reserved memory ranges (jsc#SLE-9099 git-fixes).
- powerpc/kasan: Fix issues by lowering KASAN_SHADOW_END (git-fixes).
- powerpc/kuap: PPC_KUAP_DEBUG should depend on PPC_KUAP (bsc#1156395).
- powerpc/powernv: Fix a warning message (bsc#1156395).
- powerpc/setup_64: Set cache-line-size based on cache-block-size (bsc#1065729).
- powerpc/xive: Clear the page tables for the ESB IO mapping (bsc#1085030).
- powerpc/xmon: Reset RCU and soft lockup watchdogs (bsc#1065729).
- power: reset: qcom-pon: reg write mask depends on pon generation (git-fixes).
- power: supply: bq24257_charger: Replace depends on REGMAP_I2C with select (git-fixes).
- power: supply: core: fix HWMON temperature labels (git-fixes).
- power: supply: core: fix memory leak in HWMON error path (git-fixes).
- power: supply: lp8788: Fix an error handling path in 'lp8788_charger_probe()' (git-fixes).
- power: supply: smb347-charger: IRQSTAT_D is volatile (git-fixes).
- pppoe: only process PADT targeted at local interfaces (networking-stable-20_05_16).
- printk: queue wake_up_klogd irq_work only if per-CPU areas are ready (bsc#1172095).
- proc/meminfo: avoid open coded reading of vm_committed_as (bnc#1173271).
- proc: Use new_inode not new_inode_pseudo (bsc#1173830).
- pwm: img: Call pm_runtime_put() in pm_runtime_get_sync() failed case (git-fixes).
- pwm: sun4i: Move pwm_calculate() out of spin_lock() (git-fixes).
- r8152: support additional Microsoft Surface Ethernet Adapter variant (git-fixes).
- r8169: Revive default chip version for r8168 (bsc#1173085).
- raid5: remove gfp flags from scribble_alloc() (bsc#1166985).
- random: fix data races at timer_rand_state (bsc#1173438).
- rcu: Avoid data-race in rcu_gp_fqs_check_wake() (bsc#1171828).
- rcu: Fix data-race due to atomic_t copy-by-value (bsc#1171828).
- rcu: Make rcu_read_unlock_special() checks match raise_softirq_irqoff() (bsc#1172046).
- rcu: Simplify rcu_read_unlock_special() deferred wakeups (bsc#1172046).
- rcutorture: Add 100-CPU configuration (bsc#1173068).
- rcutorture: Add worst-case call_rcu() forward-progress results (bsc#1173068).
- rcutorture: Dispense with Dracut for initrd creation (bsc#1173068).
- rcutorture: Make kvm-find-errors.sh abort on bad directory (bsc#1173068).
- rcutorture: Remove CONFIG_HOTPLUG_CPU=n from scenarios (bsc#1173068).
- rcutorture: Summarize summary of build and run results (bsc#1173068).
- rcutorture: Test TREE03 with the threadirqs kernel boot parameter (bsc#1173068).
- rcu: Use *_ONCE() to protect lockless ->expmask accesses (bsc#1171828).
- rcu: Use WRITE_ONCE() for assignments to ->pprev for hlist_nulls (bsc#1173438).
- RDMA/bnxt_re: Remove dead code from rcfw (bsc#1170774).
- RDMA/core: Check that type_attrs is not NULL prior access (jsc#SLE-8449).
- RDMA/core: Move and rename trace_cm_id_create() (jsc#SLE-8449).
- RDMA/mlx5: Fix NULL pointer dereference in destroy_prefetch_work (jsc#SLE-8446).
- RDMA/nl: Do not permit empty devices names during RDMA_NLDEV_CMD_NEWLINK/SET (bsc#1172841).
- RDMA/srpt: Fix disabling device management (jsc#SLE-8449).
- RDMA/uverbs: Make the event_queue fds return POLLERR when disassociated (jsc#SLE-8449).
- regmap: debugfs: Do not sleep while atomic for fast_io regmaps (git-fixes).
- regmap: fix alignment issue (git-fixes).
- regmap: Fix memory leak from regmap_register_patch (git-fixes).
- regualtor: pfuze100: correct sw1a/sw2 on pfuze3000 (git-fixes).
- remoteproc: Add missing '\n' in log messages (git-fixes).
- remoteproc: Fall back to using parent memory pool if no dedicated available (git-fixes).
- remoteproc: Fix and restore the parenting hierarchy for vdev (git-fixes).
- remoteproc: Fix IDR initialisation in rproc_alloc() (git-fixes).
- remoteproc: qcom_q6v5_mss: map/unmap mpss segments before/after use (git-fixes).
- Revert commit e918e570415c ('tpm_tis: Remove the HID IFX0102') (git-fixes).
- Revert 'drm/amd/display: disable dcn20 abm feature for bring up' (git-fixes).
- Revert 'i2c: tegra: Fix suspending in active runtime PM state' (git-fixes).
- Revert 'pinctrl: freescale: imx: Use 'devm_of_iomap()' to avoid a resource leak in case of error in 'imx_pinctrl_probe()'' (git-fixes).
- Revert 'thermal: mediatek: fix register index error' (git-fixes).
- ring-buffer: Zero out time extend if it is nested and not absolute (git-fixes).
- rpm: drop execute permissions on source files Sometimes a source file with execute permission appears in upstream repository and makes it into our kernel-source packages. This is caught by OBS build checks and may even result in build failures. Sanitize the source tree by removing execute permissions from all C source and header files.
- rpm/modules.fips: add aes-ce-ccm, des3_ede-x86_64, aes_ti and aes_neon_bs
- rtc: mc13xxx: fix a double-unlock issue (git-fixes).
- rtc: rv3028: Add missed check for devm_regmap_init_i2c() (git-fixes).
- rtlwifi: Fix a double free in _rtl_usb_tx_urb_setup() (git-fixes).
- rtw88: fix an issue about leak system resources (git-fixes).
- rxrpc: Fix call RCU cleanup using non-bh-safe locks (git-fixes).
- s390/bpf: Maintain 8-byte stack alignment (bsc#1169194, LTC#185911).
- s390: fix syscall_get_error for compat processes (git-fixes).
- s390/ism: fix error return code in ism_probe() (git-fixes).
- s390/kaslr: add support for R_390_JMP_SLOT relocation type (git-fixes).
- s390/pci: Fix s390_mmio_read/write with MIO (git-fixes).
- s390/pci: Log new handle in clp_disable_fh() (git-fixes).
- s390/qdio: consistently restore the IRQ handler (git-fixes).
- s390/qdio: put thinint indicator after early error (git-fixes).
- s390/qdio: tear down thinint indicator after early error (git-fixes).
- s390/qeth: fix error handling for isolation mode cmds (git-fixes).
- sata_rcar: handle pm_runtime_get_sync failure cases (git-fixes).
- sch_choke: avoid potential panic in choke_reset() (networking-stable-20_05_12).
- sched/cfs: change initial value of runnable_avg (bsc#1158765).
- sched/core: Check cpus_mask, not cpus_ptr in __set_cpus_allowed_ptr(), to fix mask corruption (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/core: Fix PI boosting between RT and DEADLINE tasks (bsc#1172823).
- sched/core: Fix PI boosting between RT and DEADLINE tasks (git fixes (sched)).
- sched/core: Fix ttwu() race (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/core: s/WF_ON_RQ/WQ_ON_CPU/ (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/cpuacct: Fix charge cpuacct.usage_sys (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/deadline: Initialize ->dl_boosted (bsc#1172823).
- sched/deadline: Initialize ->dl_boosted (git fixes (sched)).
- sched: etf: do not assume all sockets are full blown (networking-stable-20_04_27).
- sched/fair: find_idlest_group(): Remove unused sd_flag parameter (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Fix enqueue_task_fair() warning some more (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: fix nohz next idle balance (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: handle case of task_h_load() returning 0 (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Optimize dequeue_task_fair() (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Optimize enqueue_task_fair() (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Simplify the code of should_we_balance() (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched: Fix loadavg accounting race (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched: Fix race against ptrace_freeze_trace() (bsc#1174345).
- sched: Make newidle_balance() static again (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched: Offload wakee task activation if it the wakee is descheduling (bnc#1158748, bnc#1159781).
- sched: Optimize ttwu() spinning on p->on_cpu (bnc#1158748, bnc#1159781).
- sched/pelt: Sync util/runnable_sum with PELT window when propagating (bnc#1155798 (CPU scheduler functional and performance backports)).
- sch_sfq: validate silly quantum values (networking-stable-20_05_12).
- scripts/decodecode: fix trapping instruction formatting (bsc#1065729).
- scsi: ibmvscsi: Do not send host info in adapter info MAD after LPM (bsc#1172759 ltc#184814).
- scsi: libfc: free response frame from GPN_ID (bsc#1173849).
- scsi: libfc: Handling of extra kref (bsc#1173849).
- scsi: libfc: If PRLI rejected, move rport to PLOGI state (bsc#1173849).
- scsi: libfc: rport state move to PLOGI if all PRLI retry exhausted (bsc#1173849).
- scsi: libfc: Skip additional kref updating work event (bsc#1173849).
- scsi: lpfc: Add an internal trace log buffer (bsc#1172687 bsc#1171530).
- scsi: lpfc: Add blk_io_poll support for latency improvment (bsc#1172687 bsc#1171530).
- scsi: lpfc: Add support to display if adapter dumps are available (bsc#1172687 bsc#1171530).
- scsi: lpfc: Allow applications to issue Common Set Features mailbox command (bsc#1172687 bsc#1171530).
- scsi: lpfc: Change default queue allocation for reduced memory consumption (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: fix build failure with DEBUGFS disabled (bsc#1171530).
- scsi: lpfc: Fix incomplete NVME discovery when target (bsc#1171530).
- scsi: lpfc: Fix inconsistent indenting (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix interrupt assignments when multiple vectors are supported on same CPU (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix kdump hang on PPC (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix language in 0373 message to reflect non-error message (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix less-than-zero comparison of unsigned value (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix lpfc_nodelist leak when processing unsolicited event (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Fix MDS Diagnostic Enablement definition (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Fix memory leak on lpfc_bsg_write_ebuf_set func (bsc#1171530).
- scsi: lpfc: Fix missing MDS functionality (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix negation of else clause in lpfc_prep_node_fc4type (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Fix noderef and address space warnings (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Fix NVMe rport deregister and registration during ADISC (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix oops due to overrun when reading SLI3 data (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix shost refcount mismatch when deleting vport (bsc#1172687 bsc#1171530).
- scsi: lpfc: fix spelling mistakes of asynchronous (bsc#1171530).
- scsi: lpfc: Fix stack trace seen while setting rrq active (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix unused assignment in lpfc_sli4_bsg_link_diag_test (bsc#1172687 bsc#1171530).
- scsi: lpfc: Maintain atomic consistency of queue_claimed flag (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Make lpfc_defer_acc_rsp static (bsc#1171530).
- scsi: lpfc: remove duplicate unloading checks (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Remove re-binding of nvme rport during registration (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Remove redundant initialization to variable rc (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Remove unnecessary lockdep_assert_held calls (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Update lpfc version to 12.8.0.1 (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Update lpfc version to 12.8.0.2 (bsc#1172687 bsc#1171530).
- scsi: megaraid_sas: Replace undefined MFI_BIG_ENDIAN macro with __BIG_ENDIAN_BITFIELD macro (bsc#1173206).
- scsi: qla2xxx: Delete all sessions before unregister local nvme port (jsc#SLE-9714 jsc#SLE-10327 jsc#SLE-10334 bsc#1157169).
- scsi: qla2xxx: Do not log message when reading port speed via sysfs (jsc#SLE-9714 jsc#SLE-10327 jsc#SLE-10334 bsc#1157169).
- scsi: qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV (jsc#SLE-9714 jsc#SLE-10327 jsc#SLE-10334 bsc#1157169).
- scsi: qla2xxx: Set NVMe status code for failed NVMe FCP request (bsc#1158983).
- scsi: sd_zbc: Fix sd_zbc_complete() (bsc#1173206).
- scsi: smartpqi: Update attribute name to `driver_version` (bsc#1173206).
- scsi: ufs-bsg: Fix runtime PM imbalance on error (git-fixes).
- scsi: zfcp: add diagnostics buffer for exchange config data (bsc#1158050).
- scsi: zfcp: auto variables for dereferenced structs in open port handler (bsc#1158050).
- scsi: zfcp: diagnostics buffer caching and use for exchange port data (bsc#1158050).
- scsi: zfcp: enhance handling of FC Endpoint Security errors (bsc#1158050).
- scsi: zfcp: expose fabric name as common fc_host sysfs attribute (bsc#1158050).
- scsi: zfcp: Fence adapter status propagation for common statuses (bsc#1158050).
- scsi: zfcp: Fence early sysfs interfaces for accesses of shost objects (bsc#1158050).
- scsi: zfcp: Fence fc_host updates during link-down handling (bsc#1158050).
- scsi: zfcp: fix fc_host attributes that should be unknown on local link down (bsc#1158050).
- scsi: zfcp: Fix panic on ERP timeout for previously dismissed ERP action (git-fixes).
- scsi: zfcp: fix wrong data and display format of SFP+ temperature (bsc#1158050).
- scsi: zfcp: implicitly refresh config-data diagnostics when reading sysfs (bsc#1158050).
- scsi: zfcp: implicitly refresh port-data diagnostics when reading sysfs (bsc#1158050).
- scsi: zfcp: introduce sysfs interface for diagnostics of local SFP transceiver (bsc#1158050).
- scsi: zfcp: introduce sysfs interface to read the local B2B-Credit (bsc#1158050).
- scsi: zfcp: log FC Endpoint Security errors (bsc#1158050).
- scsi: zfcp: log FC Endpoint Security of connections (bsc#1158050).
- scsi: zfcp: Move allocation of the shost object to after xconf- and xport-data (bsc#1158050).
- scsi: zfcp: Move fc_host updates during xport data handling into fenced function (bsc#1158050).
- scsi: zfcp: move maximum age of diagnostic buffers into a per-adapter variable (bsc#1158050).
- scsi: zfcp: Move p-t-p port allocation to after xport data (bsc#1158050).
- scsi: zfcp: Move shost modification after QDIO (re-)open into fenced function (bsc#1158050).
- scsi: zfcp: Move shost updates during xconfig data handling into fenced function (bsc#1158050).
- scsi: zfcp: proper indentation to reduce confusion in zfcp_erp_required_act (bsc#1158050).
- scsi: zfcp: report FC Endpoint Security in sysfs (bsc#1158050).
- scsi: zfcp: signal incomplete or error for sync exchange config/port data (bsc#1158050).
- scsi: zfcp: support retrieval of SFP Data via Exchange Port Data (bsc#1158050).
- scsi: zfcp: trace FC Endpoint Security of FCP devices and connections (bsc#1158050).
- scsi: zfcp: wire previously driver-specific sysfs attributes also to fc_host (bsc#1158050).
- sctp: Do not add the shutdown timer if its already been added (networking-stable-20_05_27).
- sctp: Start shutdown on association restart if in SHUTDOWN-SENT state and socket is closed (networking-stable-20_05_27).
- selftests/bpf: CONFIG_IPV6_SEG6_BPF required for test_seg6_loop.o (bsc#1155518).
- selftests/bpf: CONFIG_LIRC required for test_lirc_mode2.sh (bsc#1155518).
- selftests/bpf: Fix invalid memory reads in core_relo selftest (bsc#1155518).
- selftests/bpf: Fix memory leak in extract_build_id() (bsc#1155518).
- selftests/bpf, flow_dissector: Close TAP device FD after the test (bsc#1155518).
- selftests/bpf: Make sure optvals > PAGE_SIZE are bypassed (bsc#1155518).
- selftests/net: in rxtimestamp getopt_long needs terminating null entry (networking-stable-20_06_16).
- selftests/timens: handle a case when alarm clocks are not supported (bsc#1164648,jsc#SLE-11493).
- selinux: fall back to ref-walk if audit is required (bsc#1174333).
- selinux: revert 'stop passing MAY_NOT_BLOCK to the AVC upon follow_link' (bsc#1174333).
- serial: 8250: Fix max baud limit in generic 8250 port (git-fixes).
- serial: 8250_tegra: Create Tegra specific 8250 driver (bsc#1173941).
- signal: Avoid corrupting si_pid and si_uid in do_notify_parent (bsc#1171529).
- slimbus: core: Fix mismatch in of_node_get/put (git-fixes).
- slimbus: ngd: get drvdata from correct device (git-fixes).
- SMB3: Honor lease disabling for multiuser mounts (git-fixes).
- socionext: account for napi_gro_receive never returning GRO_DROP (bsc#1154353).
- soc: mediatek: cmdq: return send msg error code (git-fixes).
- soc: qcom: rpmh: Dirt can only make you dirtier, not cleaner (git-fixes).
- soc: qcom: rpmh: Invalidate SLEEP and WAKE TCSes before flushing new data (git-fixes).
- soc: qcom: rpmh-rsc: Allow using free WAKE TCS for active request (git-fixes).
- soc: qcom: rpmh-rsc: Clear active mode configuration for wake TCS (git-fixes).
- soc: qcom: rpmh: Update dirty flag only when data changes (git-fixes).
- soc/tegra: pmc: Select GENERIC_PINCONF (git-fixes).
- soundwire: intel: fix memory leak with devm_kasprintf (git-fixes).
- spi: bcm2835aux: Fix controller unregister order (git-fixes).
- spi: bcm2835: Fix controller unregister order (git-fixes).
- spi: bcm-qspi: Handle clock probe deferral (git-fixes).
- spi: bcm-qspi: when tx/rx buffer is NULL set to 0 (git-fixes).
- SPI: designware: pci: Switch over to MSI interrupts (jsc#SLE-12735).
- spi: dt-bindings: spi-controller: Fix #address-cells for slave mode (git-fixes).
- spi: dw: Add SPI Rx-done wait method to DMA-based transfer (git-fixes).
- spi: dw: Add SPI Tx-done wait method to DMA-based transfer (git-fixes).
- spi: dw: Enable interrupts in accordance with DMA xfer mode (git-fixes).
- spi: dw: Fix controller unregister order (git-fixes).
- spi: dw: Fix native CS being unset (git-fixes).
- spi: dw: Fix Rx-only DMA transfers (git-fixes).
- spi: dw-pci: Add MODULE_DEVICE_TABLE (jsc#SLE-12735).
- spi: dw-pci: Add runtime power management support (jsc#SLE-12735).
- spi: dw-pci: Add support for Intel Elkhart Lake PSE SPI (jsc#SLE-12735).
- spi: dw-pci: Fix Chip Select amount on Intel Elkhart Lake PSE SPI (jsc#SLE-12735).
- spi: dw: Return any value retrieved from the dma_transfer callback (git-fixes).
- spi: dw: use 'smp_mb()' to avoid sending spi data error (git-fixes).
- spi: dw: Zero DMA Tx and Rx configurations on stack (git-fixes).
- spi: Fix controller unregister order (git-fixes).
- spi: fsl: do not map irq during probe (git-fixes).
- spi: fsl: use platform_get_irq() instead of of_irq_to_resource() (git-fixes).
- spi: pxa2xx: Apply CS clk quirk to BXT (git-fixes).
- spi: pxa2xx: Fix controller unregister order (git-fixes).
- spi: pxa2xx: Fix runtime PM ref imbalance on probe error (git-fixes).
- spi: Respect DataBitLength field of SpiSerialBusV2() ACPI resource (git-fixes).
- spi: spidev: fix a potential use-after-free in spidev_release() (git-fixes).
- spi: spidev: fix a race between spidev_release and spidev_remove (git-fixes).
- spi: spi-fsl-dspi: Change usage pattern of SPI_MCR_* and SPI_CTAR_* macros (git-fixes).
- spi: spi-fsl-dspi: Do not access reserved fields in SPI_MCR (git-fixes).
- spi: spi-fsl-dspi: Fix 16-bit word order in 32-bit XSPI mode (git-fixes).
- spi: spi-fsl-dspi: Replace interruptible wait queue with a simple completion (git-fixes).
- spi: spi-mem: Fix Dual/Quad modes on Octal-capable devices (git-fixes).
- spi: spi-sun6i: sun6i_spi_transfer_one(): fix setting of clock rate (git-fixes).
- spi: sprd: switch the sequence of setting WDG_LOAD_LOW and _HIGH (git-fixes).
- staging: comedi: verify array index is correct before using it (git-fixes).
- staging: iio: ad2s1210: Fix SPI reading (git-fixes).
- staging: kpc2000: fix error return code in kp2000_pcie_probe() (git-fixes).
- staging: rtl8712: Fix IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK (git-fixes).
- Staging: rtl8723bs: prevent buffer overflow in update_sta_support_rate() (git-fixes).
- staging: sm750fb: add missing case while setting FB_VISUAL (git-fixes).
- sun6i: dsi: fix gcc-4.8 (bsc#1152489)
- SUNRPC dont update timeout value on connection reset (bsc#1174263).
- sunrpc: fixed rollback in rpc_gssd_dummy_populate() (git-fixes).
- sunrpc: Fix gss_unwrap_resp_integ() again (bsc#1174116).
- SUNRPC: Properly set the @subbuf parameter of xdr_buf_subsegment() (git-fixes).
- SUNRPC: Signalled ASYNC tasks need to exit (git-fixes).
- supported.conf: Add pinctrl-tigerlake as supported
- supported.conf: Mark two hwtracing helper modules as externally supported (bsc#1170879)
- svcrdma: Fix leak of svc_rdma_recv_ctxt objects (git-fixes).
- tcp: cache line align MAX_TCP_HEADER (networking-stable-20_04_27).
- tcp: fix error recovery in tcp_zerocopy_receive() (networking-stable-20_05_16).
- tcp: fix SO_RCVLOWAT hangs with fat skbs (networking-stable-20_05_16).
- tcp: md5: allow changing MD5 keys in all socket states (git-fixes).
- team: fix hang in team_mode_get() (networking-stable-20_04_27).
- tg3: driver sleeps indefinitely when EEH errors exceed eeh_max_freezes (bsc#1173284).
- thermal/drivers: imx: Fix missing of_node_put() at probe time (git-fixes).
- thermal/drivers/mediatek: Fix bank number settings on mt8183 (git-fixes).
- thermal/drivers/rcar_gen3: Fix undefined temperature if negative (git-fixes).
- thermal/drivers/ti-soc-thermal: Avoid dereferencing ERR_PTR (git-fixes).
- thermal: int3403_thermal: Downgrade error message (git-fixes).
- thermal: intel: intel_pch_thermal: Add Comet Lake (CML) platform support (jsc#SLE-12668).
- tick/sched: Annotate lockless access to last_jiffies_update (bsc#1173438).
- timer: Use hlist_unhashed_lockless() in timer_pending() (bsc#1173438).
- tipc: block BH before using dst_cache (networking-stable-20_05_27).
- tipc: fix partial topology connection closure (networking-stable-20_05_12).
- torture: Allow 'CFLIST' to specify default list of scenarios (bsc#1173068).
- torture: Expand last_ts variable in kvm-test-1-run.sh (bsc#1173068).
- torture: Handle jitter for CPUs that cannot be offlined (bsc#1173068).
- torture: Handle systems lacking the mpstat command (bsc#1173068).
- torture: Hoist calls to lscpu to higher-level kvm.sh script (bsc#1173068).
- torture: Make results-directory date format completion-friendly (bsc#1173068).
- torture: Use gawk instead of awk for systime() function (bsc#1173068).
- tpm: Fix TIS locality timeout problems (git-fixes).
- tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send() (bsc#1065729).
- tpm_tis: extra chip->ops check on error path in tpm_tis_core_init (git-fixes).
- tpm_tis: Remove the HID IFX0102 (git-fixes).
- tracing: Fix event trigger to accept redundant spaces (git-fixes).
- tty: hvc_console, fix crashes on parallel open/close (git-fixes).
- tty: n_gsm: Fix bogus i++ in gsm_data_kick (git-fixes).
- tty: n_gsm: Fix SOF skipping (git-fixes).
- tty: n_gsm: Fix waking up upper tty layer when room available (git-fixes).
- tty: serial: add missing spin_lock_init for SiFive serial console (git-fixes).
- tun: correct header offsets in napi frags mode (git-fixes).
- tunnel: Propagate ECT(1) when decapsulating as recommended by RFC6040 (networking-stable-20_05_12).
- ubifs: fix wrong use of crypto_shash_descsize() (bsc#1173827).
- ubifs: remove broken lazytime support (bsc#1173826).
- udp: Copy has_conns in reuseport_grow() (git-fixes).
- udp: Improve load balancing for SO_REUSEPORT (git-fixes).
- usb: add USB_QUIRK_DELAY_INIT for Logitech C922 (git-fixes).
- USB: c67x00: fix use after free in c67x00_giveback_urb (git-fixes).
- usb: chipidea: core: add wakeup support for extcon (git-fixes).
- USB: core: Fix misleading driver bug report (git-fixes).
- usb: core: hub: limit HUB_QUIRK_DISABLE_AUTOSUSPEND to USB5534B (git-fixes).
- usb: dwc2: Fix shutdown callback in platform (git-fixes).
- usb: dwc2: gadget: move gadget resume after the core is in L0 state (git-fixes).
- usb: dwc3: gadget: Properly handle ClearFeature(halt) (git-fixes).
- usb: dwc3: gadget: Properly handle failed kick_transfer (git-fixes).
- usb: dwc3: pci: Enable extcon driver for Intel Merrifield (git-fixes).
- usb: dwc3: pci: Fix reference count leak in dwc3_pci_resume_work (git-fixes).
- usb/ehci-platform: Set PM runtime as active on resume (git-fixes).
- USB: ehci: reopen solution for Synopsys HC bug (git-fixes).
- usb: gadget: audio: Fix a missing error return value in audio_bind() (git-fixes).
- USB: gadget: fix illegal array access in binding with UDC (git-fixes).
- usb: gadget: Fix issue with config_ep_by_speed function (git-fixes).
- usb: gadget: fix potential double-free in m66592_probe (git-fixes).
- usb: gadget: function: fix missing spinlock in f_uac1_legacy (git-fixes).
- usb: gadget: legacy: fix error return code in cdc_bind() (git-fixes).
- usb: gadget: legacy: fix error return code in gncm_bind() (git-fixes).
- usb: gadget: legacy: fix redundant initialization warnings (git-fixes).
- usb: gadget: lpc32xx_udc: do not dereference ep pointer before null check (git-fixes).
- usb: gadget: net2272: Fix a memory leak in an error handling path in 'net2272_plat_probe()' (git-fixes).
- usb: gadget: udc: atmel: fix uninitialized read in debug printk (git-fixes).
- usb: gadget: udc: atmel: Make some symbols static (git-fixes).
- usb: gadget: udc: atmel: remove outdated comment in usba_ep_disable() (git-fixes).
- usb: gadget: udc: Potential Oops in error handling code (git-fixes).
- USB: gadget: udc: s3c2410_udc: Remove pointless NULL check in s3c2410_udc_nuke (git-fixes).
- usb: host: ehci-exynos: Fix error check in exynos_ehci_probe() (git-fixes).
- USB: host: ehci-mxc: Add error handling in ehci_mxc_drv_probe() (git-fixes).
- usb: host: ehci-platform: add a quirk to avoid stuck (git-fixes).
- usb: host: xhci-mtk: avoid runtime suspend when removing hcd (git-fixes).
- usb: host: xhci-plat: keep runtime active when removing host (git-fixes).
- usblp: poison URBs upon disconnect (git-fixes).
- usb: musb: Fix runtime PM imbalance on error (git-fixes).
- usb: musb: start session in resume for host port (git-fixes).
- usbnet: smsc95xx: Fix use-after-free after removal (git-fixes).
- usb/ohci-platform: Fix a warning when hibernating (git-fixes).
- USB: ohci-sm501: Add missed iounmap() in remove (git-fixes).
- USB: ohci-sm501: fix error return code in ohci_hcd_sm501_drv_probe() (git-fixes).
- usb: renesas_usbhs: getting residue from callback_result (git-fixes).
- USB: serial: ch341: add basis for quirk detection (git-fixes).
- USB: serial: ch341: add new Product ID for CH340 (git-fixes).
- USB: serial: cypress_m8: enable Simply Automated UPB PIM (git-fixes).
- USB: serial: iuu_phoenix: fix memory corruption (git-fixes).
- USB: serial: option: add GosunCn GM500 series (git-fixes).
- USB: serial: option: add Quectel EG95 LTE modem (git-fixes).
- USB: serial: option: add Telit LE910C1-EUX compositions (git-fixes).
- USB: serial: qcserial: add DW5816e QDL support (git-fixes).
- USB: serial: usb_wwan: do not resubmit rx urb on fatal errors (git-fixes).
- usb: typec: tcpci_rt1711h: avoid screaming irq causing boot hangs (git-fixes).
- usb: usbfs: correct kernel->user page attribute mismatch (git-fixes).
- USB: usbfs: fix mmap dma mismatch (git-fixes).
- usb/xhci-plat: Set PM runtime as active on resume (git-fixes).
- vfio: avoid possible overflow in vfio_iommu_type1_pin_pages (git-fixes).
- vfio: Ignore -ENODEV when getting MSI cookie (git-fixes).
- vfio/mdev: Fix reference count leak in add_mdev_supported_type (git-fixes).
- vfio/pci: fix memory leaks in alloc_perm_bits() (git-fixes).
- vfio/pci: Fix SR-IOV VF handling with MMIO blocking (bsc#1174129).
- vfio/type1: Fix VA->PA translation for PFNMAP VMAs in vaddr_get_pfn() (git-fixes).
- video: fbdev: w100fb: Fix a potential double free (git-fixes).
- video: vt8500lcdfb: fix fallthrough warning (bsc#1152489)
- virtio-blk: handle block_device_operations callbacks after hot unplug (git fixes (block drivers)).
- virtio_net: fix lockdep warning on 32 bit (networking-stable-20_05_16).
- virtio: virtio_console: add missing MODULE_DEVICE_TABLE() for rproc serial (git-fixes).
- virt: vbox: Fix guest capabilities mask check (git-fixes).
- virt: vbox: Fix VBGL_IOCTL_VMMDEV_REQUEST_BIG and _LOG req numbers to match upstream (git-fixes).
- vmxnet3: add geneve and vxlan tunnel offload support (bsc#1172484).
- vmxnet3: add support to get/set rx flow hash (bsc#1172484).
- vmxnet3: allow rx flow hash ops only when rss is enabled (bsc#1172484).
- vmxnet3: prepare for version 4 changes (bsc#1172484).
- vmxnet3: update to version 4 (bsc#1172484).
- vmxnet3: use correct hdr reference when packet is encapsulated (bsc#1172484).
- vrf: Check skb for XFRM_TRANSFORMED flag (networking-stable-20_04_27).
- vrf: Fix IPv6 with qdisc and xfrm (networking-stable-20_04_27).
- vsock: fix timeout in vsock_accept() (networking-stable-20_06_07).
- vsprintf: do not obfuscate NULL and error pointers (bsc#1172086).
- vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console (git-fixes).
- vt: vt_ioctl: remove unnecessary console allocation checks (git-fixes).
- vxlan: Avoid infinite loop when suppressing NS messages with invalid options (networking-stable-20_06_10).
- vxlan: use the correct nlattr array in NL_SET_ERR_MSG_ATTR (networking-stable-20_04_27).
- w1: omap-hdq: cleanup to add missing newline for some dev_dbg (git-fixes).
- watchdog: da9062: No need to ping manually before setting timeout (git-fixes).
- watchdog: imx_sc_wdt: Fix reboot on crash (git-fixes).
- watchdog: iTCO: Add support for Cannon Lake PCH iTCO (jsc#SLE-13202).
- wcn36xx: Fix error handling path in 'wcn36xx_probe()' (git-fixes).
- wil6210: account for napi_gro_receive never returning GRO_DROP (bsc#1154353).
- wil6210: add wil_netif_rx() helper function (bsc#1154353).
- wil6210: use after free in wil_netif_rx_any() (bsc#1154353).
- wireguard: device: avoid circular netns references (git-fixes).
- wireguard: noise: do not assign initiation time in if condition (git-fixes).
- wireguard: noise: read preshared key while taking lock (bsc#1169021 jsc#SLE-12250).
- wireguard: noise: separate receive counter from send counter (bsc#1169021 jsc#SLE-12250).
- wireguard: queueing: preserve flow hash across packet scrubbing (bsc#1169021 jsc#SLE-12250).
- wireguard: receive: account for napi_gro_receive never returning GRO_DROP (git-fixes).
- wireguard: selftests: initalize ipv6 members to NULL to squelch clang warning (git-fixes).
- wireguard: selftests: use newer iproute2 for gcc-10 (bsc#1169021 jsc#SLE-12250).
- work around mvfs bug (bsc#1162063).
- workqueue: do not use wq_select_unbound_cpu() for bound works (git-fixes).
- workqueue: Remove the warning in wq_worker_sleeping() (git-fixes).
- x86/amd_nb: Add AMD family 17h model 60h PCI IDs (git-fixes).
- x86/cpu/amd: Make erratum #1054 a legacy erratum (bsc#1152489).
- x86: Fix early boot crash on gcc-10, third try (bsc#1152489).
- x86/mm/cpa: Flush direct map alias during cpa (bsc#1152489).
- x86/PCI: Mark Intel C620 MROMs as having non-compliant BARs (git-fixes).
- x86/reboot/quirks: Add MacBook6,1 reboot quirk (git-fixes).
- x86/resctrl: Fix invalid attempt at removing the default resource group (bsc#1152489).
- x86/resctrl: Preserve CDP enable over CPU hotplug (bsc#1152489).
- x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks (bsc#1058115).
- xfrm: Always set XFRM_TRANSFORMED in xfrm{4,6}_output_finish (networking-stable-20_04_27).
- xfrm: fix error in comment (git fixes (block drivers)).
- xfs: clean up the error handling in xfs_swap_extents (git-fixes).
- xfs: do not commit sunit/swidth updates to disk if that would cause repair failures (bsc#1172169).
- xfs: do not fail unwritten extent conversion on writeback due to edquot (bsc#1158242).
- xfs: fix duplicate verification from xfs_qm_dqflush() (git-fixes).
- xfs: force writes to delalloc regions to unwritten (bsc#1158242).
- xfs: measure all contiguous previous extents for prealloc size (bsc#1158242).
- xfs: preserve default grace interval during quotacheck (bsc#1172170).
- xfs: refactor agfl length computation function (bsc#1172169).
- xfs: split the sunit parameter update into two parts (bsc#1172169).
- xhci: Fix enumeration issue when setting max packet size for FS devices (git-fixes).
- xhci: Fix incorrect EP_STATE_MASK (git-fixes).
- xhci: Poll for U0 after disabling USB2 LPM (git-fixes).
- xhci: Return if xHCI does not support LPM (git-fixes).
- xprtrdma: Fix handling of RDMA_ERROR replies (git-fixes).
- workqueue: Remove unnecessary kfree() call in rcu_free_wq() (git-fixes).
Patchnames
SUSE-2020-2105,SUSE-SLE-Module-Basesystem-15-SP2-2020-2105,SUSE-SLE-Module-Development-Tools-15-SP2-2020-2105,SUSE-SLE-Module-Legacy-15-SP2-2020-2105,SUSE-SLE-Module-Live-Patching-15-SP2-2020-2105,SUSE-SLE-Product-HA-15-SP2-2020-2105,SUSE-SLE-Product-WE-15-SP2-2020-2105
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2019-19462: relay_open in kernel/relay.c in the Linux kernel allowed local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result (bnc#1158265).\n- CVE-2019-20810: Fixed a memory leak in go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c because it did not call snd_card_free for a failure path (bnc#1172458).\n- CVE-2019-20812: An issue was discovered in the prb_calc_retire_blk_tmo() function in net/packet/af_packet.c could result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3 (bnc#1172453).\n- CVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).\n- CVE-2020-10135: Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key (bnc#1171988).\n- CVE-2020-10711: A NULL pointer dereference flaw was found in the SELinux subsystem in versions This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol\u0027s category bitmap into the SELinux extensible bitmap via the\u0027 ebitmap_netlbl_import\u0027 routine. This flaw allowed a remote network user to crash the system kernel, resulting in a denial of service (bnc#1171191).\n- CVE-2020-10732: A flaw was found in the implementation of Userspace core dumps. This flaw allowed an attacker with a local account to crash a trivial program and exfiltrate private kernel data (bnc#1171220).\n- CVE-2020-10751: A flaw was found in the SELinux LSM hook implementation, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing (bnc#1171189).\n- CVE-2020-10766: Fixed an issue which allowed an attacker with a local account to disable SSBD protection (bnc#1172781).\n- CVE-2020-10767: Fixed an issue where Indirect Branch Prediction Barrier was disabled in certain circumstances, leaving the system open to a spectre v2 style attack (bnc#1172782).\n- CVE-2020-10768: Fixed an issue with the prctl() function, where indirect branch speculation could be enabled even though it was diabled before (bnc#1172783).\n- CVE-2020-10773: Fixed a memory leak on s390/s390x, in the cmm_timeout_hander in file arch/s390/mm/cmm.c (bnc#1172999).\n- CVE-2020-10781: A zram sysfs resource consumption was fixed (bnc#1173074).\n- CVE-2020-12656: Fixed a memory leak in gss_mech_free in the rpcsec_gss_krb5 implementation, caused by a lack of certain domain_release calls (bnc#1171219).\n- CVE-2020-12769: An issue was discovered in drivers/spi/spi-dw.c allowed attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one (bnc#1171983).\n- CVE-2020-12771: An issue was discovered in btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails (bnc#1171732).\n- CVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).\n- CVE-2020-13143: gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c relies on kstrdup without considering the possibility of an internal \u0027\\0\u0027 value, which allowed attackers to trigger an out-of-bounds read (bnc#1171982).\n- CVE-2020-13974: Fixed a integer overflow in drivers/tty/vt/keyboard.c, if k_ascii is called several times in a row (bnc#1172775).\n- CVE-2020-14416: Fixed a race condition in tty-\u003edisc_data handling in the slip and slcan line discipline could lead to a use-after-free. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).\n- CVE-2020-15393: Fixed a memory leak in usbtest_disconnect (bnc#1173514).\n- CVE-2020-15780: An issue was discovered in drivers/acpi/acpi_configfs.c where injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30 (bnc#1173573).\n\nThe following non-security bugs were fixed:\n\n- ACPICA: Dispatcher: add status checks (git-fixes).\n- ACPICA: Fixes for acpiExec namespace init file (git-fixes).\n- ACPI: configfs: Disallow loading ACPI tables when locked down (git-fixes).\n- ACPI: CPPC: Fix reference count leak in acpi_cppc_processor_probe() (git-fixes).\n- ACPI: GED: add support for _Exx / _Lxx handler methods (git-fixes).\n- ACPI: GED: use correct trigger type field in _Exx / _Lxx handling (git-fixes).\n- ACPI/IORT: Fix PMCG node single ID mapping handling (git-fixes).\n- ACPI: PM: Avoid using power resources if there are none for D0 (git-fixes).\n- ACPI: sysfs: Fix pm_profile_attr type (git-fixes).\n- ACPI: sysfs: Fix reference count leak in acpi_sysfs_add_hotplug_profile() (git-fixes).\n- ACPI: video: Use native backlight on Acer Aspire 5783z (git-fixes).\n- ACPI: video: Use native backlight on Acer TravelMate 5735Z (git-fixes).\n- af_unix: add compat_ioctl support (git-fixes).\n- agp/intel: Reinforce the barrier after GTT updates (git-fixes).\n- aio: fix async fsync creds (bsc#1173828).\n- ALSA: emu10k1: delete an unnecessary condition (git-fixes).\n- ALSA: es1688: Add the missed snd_card_free() (git-fixes).\n- ALSA: fireface: fix configuration error for nominal sampling transfer frequency (git-fixes).\n- ALSA: firewire-lib: fix invalid assignment to union data for directional parameter (git-fixes).\n- ALSA: hda: Add ElkhartLake HDMI codec vid (git-fixes).\n- ALSA: hda: add member to store ratio for stripe control (git-fixes).\n- ALSA: hda: Add NVIDIA codec IDs 9a \u0026 9d through a0 to patch table (git-fixes).\n- ALSA: hda: add sienna_cichlid audio asic id for sienna_cichlid up (git-fixes).\n- ALSA: hda: Fix potential race in unsol event handler (git-fixes).\n- ALSA: hda/hdmi: fix failures at PCM open on Intel ICL and later (git-fixes).\n- ALSA: hda/hdmi: improve debug traces for stream lookups (git-fixes).\n- ALSA: hda: Intel: add missing PCI IDs for ICL-H, TGL-H and EKL (jsc#SLE-13261).\n- ALSA: hda - let hs_mic be picked ahead of hp_mic (git-fixes).\n- ALSA: hda/realtek - Add a model for Thinkpad T570 without DAC workaround (bsc#1172017).\n- ALSA: hda/realtek - add a pintbl quirk for several Lenovo machines (git-fixes).\n- ALSA: hda/realtek - Add LED class support for micmute LED (git-fixes).\n- ALSA: hda/realtek - Add more fixup entries for Clevo machines (git-fixes).\n- ALSA: hda/realtek: Add mute LED and micmute LED support for HP systems (git-fixes).\n- ALSA: hda/realtek - Add new codec supported for ALC287 (git-fixes).\n- ALSA: hda/realtek - Add quirk for MSI GE63 laptop (git-fixes).\n- ALSA: hda/realtek - change to suitable link model for ASUS platform (git-fixes).\n- ALSA: hda/realtek - Enable audio jacks of Acer vCopperbox with ALC269VC (git-fixes).\n- ALSA: hda/realtek: Enable headset mic of Acer C20-820 with ALC269VC (git-fixes).\n- ALSA: hda/realtek: Enable headset mic of Acer TravelMate B311R-31 with ALC256 (git-fixes).\n- ALSA: hda/realtek: Enable headset mic of Acer Veriton N4660G with ALC269VC (git-fixes).\n- ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G14(G401) series with ALC289 (git-fixes).\n- ALSA: hda/realtek - Enable micmute LED on and HP system (git-fixes).\n- ALSA: hda/realtek - Enable Speaker for ASUS UX533 and UX534 (git-fixes).\n- ALSA: hda/realtek - Enable Speaker for ASUS UX563 (git-fixes).\n- ALSA: hda/realtek: Fixed ALC298 sound bug by adding quirk for Samsung Notebook Pen S (git-fixes).\n- ALSA: hda/realtek - Fix Lenovo Thinkpad X1 Carbon 7th quirk subdevice id (git-fixes).\n- ALSA: hda/realtek - Fix silent output on Gigabyte X570 Aorus Xtreme (git-fixes).\n- ALSA: hda/realtek - Fix unused variable warning w/o CONFIG_LEDS_TRIGGER_AUDIO (git-fixes).\n- ALSA: hda/realtek - fixup for yet another Intel reference board (git-fixes).\n- ALSA: hda/realtek - Introduce polarity for micmute LED GPIO (git-fixes).\n- ALSA: hda/tegra: correct number of SDO lines for Tegra194 (git-fixes).\n- ALSA: hda/tegra: workaround playback failure on Tegra194 (git-fixes).\n- ALSA: hwdep: fix a left shifting 1 by 31 UB bug (git-fixes).\n- ALSA: iec1712: Initialize STDSP24 properly when using the model=staudio option (git-fixes).\n- ALSA: info: Drop WARN_ON() from buffer NULL sanity check (git-fixes).\n- ALSA: isa/wavefront: prevent out of bounds write in ioctl (git-fixes).\n- ALSA: line6: Perform sanity check for each URB creation (git-fixes).\n- ALSA: line6: Sync the pending work cancel at disconnection (git-fixes).\n- ALSA: opl3: fix infoleak in opl3 (git-fixes).\n- ALSA: pcm: disallow linking stream to itself (git-fixes).\n- ALSA: pcm: fix incorrect hw_base increase (git-fixes).\n- ALSA: pcm: fix snd_pcm_link() lockdep splat (git-fixes).\n- ALSA: usb-audio: Add duplex sound support for USB devices using implicit feedback (git-fixes).\n- ALSA: usb-audio: Add implicit feedback quirk for RTX6001 (git-fixes).\n- ALSA: usb-audio: Add implicit feedback quirk for SSL2+ (git-fixes).\n- ALSA: usb-audio: Add Pioneer DJ DJM-900NXS2 support (git-fixes).\n- ALSA: usb-audio: add quirk for Denon DCD-1500RE (git-fixes).\n- ALSA: usb-audio: add quirk for MacroSilicon MS2109 (git-fixes).\n- ALSA: usb-audio: add quirk for Samsung USBC Headset (AKG) (git-fixes).\n- ALSA: usb-audio: Add registration quirk for Kingston HyperX Cloud Flight S (git-fixes).\n- ALSA: usb-audio: Add vendor, product and profile name for HP Thunderbolt Dock (git-fixes).\n- ALSA: usb-audio: Clean up quirk entries with macros (git-fixes).\n- ALSA: usb-audio: Fix a limit check in proc_dump_substream_formats() (git-fixes).\n- ALSA: usb-audio: Fix inconsistent card PM state after resume (git-fixes).\n- ALSA: usb-audio: fixing upper volume limit for RME Babyface Pro routing crosspoints (git-fixes).\n- ALSA: usb-audio: Fixing usage of plain int instead of NULL (git-fixes).\n- ALSA: usb-audio: Fix OOB access of mixer element list (git-fixes).\n- ALSA: usb-audio: Fix packet size calculation (bsc#1173847).\n- ALSA: usb-audio: Fix potential use-after-free of streams (git-fixes).\n- ALSA: usb-audio: Fix race against the error recovery URB submission (git-fixes).\n- ALSA: usb-audio: Fix racy list management in output queue (git-fixes).\n- ALSA: usb-audio: Improve frames size computation (git-fixes).\n- ALSA: usb-audio: Manage auto-pm of all bundled interfaces (git-fixes).\n- ALSA: usb-audio: mixer: volume quirk for ESS Technology Asus USB DAC (git-fixes).\n- ALSA: usb-audio: Print more information in stream proc files (git-fixes).\n- ALSA: usb-audio: Quirks for Gigabyte TRX40 Aorus Master onboard audio (git-fixes).\n- ALSA: usb-audio: Remove async workaround for Scarlett 2nd gen (git-fixes).\n- ALSA: usb-audio: Replace s/frame/packet/ where appropriate (git-fixes).\n- ALSA: usb-audio: RME Babyface Pro mixer patch (git-fixes).\n- ALSA: usb-audio: Use the new macro for HP Dock rename quirks (git-fixes).\n- amdgpu: a NULL -\u003emm does not mean a thread is a kthread (git-fixes).\n- amd-xgbe: Use __napi_schedule() in BH context (networking-stable-20_04_17).\n- apparmor: ensure that dfa state tables have entries (git-fixes).\n- apparmor: fix introspection of of task mode for unconfined tasks (git-fixes).\n- apparmor: Fix memory leak of profile proxy (git-fixes).\n- apparmor: Fix use-after-free in aa_audit_rule_init (git-fixes).\n- apparmor: remove useless aafs_create_symlink (git-fixes).\n- arm64: dts: ls1043a-rdb: correct RGMII delay mode to rgmii-id (bsc#1174398).\n- arm64: dts: ls1046ardb: set RGMII interfaces to RGMII_ID mode (bsc#1174398).\n- arm64: map FDT as RW for early_init_dt_scan() (jsc#SLE-12424).\n- ARM: oxnas: make ox820_boot_secondary static (git-fixes).\n- asm-gemeric/tlb: remove stray function declarations (bsc#1156395).\n- ASoC: codecs: max98373: Removed superfluous volume control from chip default (git-fixes).\n- ASoc: codecs: max98373: remove Idle_bias_on to let codec suspend (git-fixes).\n- ASoC: core: only convert non DPCM link to DPCM link (git-fixes).\n- ASoC: davinci-mcasp: Fix dma_chan refcnt leak when getting dma type (git-fixes).\n- ASoC: fix incomplete error-handling in img_i2s_in_probe (git-fixes).\n- ASoC: fsl_asrc_dma: Fix dma_chan leak when config DMA channel failed (git-fixes).\n- ASoC: fsl_ssi: Fix bclk calculation for mono channel (git-fixes).\n- ASoC: Intel: bytcht_es8316: Add missed put_device() (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for Toshiba Encore WT10-A tablet (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for Toshiba Encore WT8-A tablet (git-fixes).\n- ASoC: intel: cht_bsw_max98090_ti: Add all Chromebooks that need pmc_plt_clk_0 quirk (bsc#1171246).\n- ASoC: intel - fix the card names (git-fixes).\n- ASoC: max98373: reorder max98373_reset() in resume (git-fixes).\n- ASoC: max9867: fix volume controls (git-fixes).\n- ASoC: meson: add missing free_irq() in error path (git-fixes).\n- ASoc: q6afe: add support to get port direction (git-fixes).\n- ASoC: q6asm: handle EOS correctly (git-fixes).\n- ASoC: qcom: q6asm-dai: kCFI fix (git-fixes).\n- ASoC: rockchip: add format and rate constraints on rk3399 (git-fixes).\n- ASoC: rockchip: Fix a reference count leak (git-fixes).\n- ASoC: rt286: fix unexpected interrupt happens (git-fixes).\n- ASoC: rt5645: Add platform-data for Asus T101HA (git-fixes).\n- ASoC: rt5670: Add new gpio1_is_ext_spk_en quirk and enable it on the Lenovo Miix 2 10 (git-fixes).\n- ASoC: rt5670: Correct RT5670_LDO_SEL_MASK (git-fixes).\n- ASoC: rt5670: Fix dac- and adc- vol-tlv values being off by a factor of 10 (git-fixes).\n- ASoC: rt5682: Report the button event in the headset type only (git-fixes).\n- ASoC: SOF: core: fix error return code in sof_probe_continue() (git-fixes).\n- ASoC: SOF: Do nothing when DSP PM callbacks are not set (git-fixes).\n- ASoC: SOF: nocodec: conditionally set dpcm_capture/dpcm_playback flags (git-fixes).\n- ASoC: tegra: tegra_wm8903: Support nvidia, headset property (git-fixes).\n- ASoC: ti: omap-mcbsp: Fix an error handling path in \u0027asoc_mcbsp_probe()\u0027 (git-fixes).\n- ASoC: topology: fix kernel oops on route addition error (git-fixes).\n- ASoC: topology: fix tlvs in error handling for widget_dmixer (git-fixes).\n- ASoC: ux500: mop500: Fix some refcounted resources issues (git-fixes).\n- ASoC: wm8974: fix Boost Mixer Aux Switch (git-fixes).\n- ASoC: wm8974: remove unsupported clock mode (git-fixes).\n- ata/libata: Fix usage of page address by page_address in ata_scsi_mode_select_xlat function (git-fixes).\n- ath10k: fix kernel null pointer dereference (git-fixes).\n- ath10k: Fix the race condition in firmware dump work queue (git-fixes).\n- ath10k: Remove ath10k_qmi_register_service_notifier() declaration (git-fixes).\n- ath10k: remove the max_sched_scan_reqs value (git-fixes).\n- ath10k: Skip handling del_server during driver exit (git-fixes).\n- ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb (git-fixes).\n- ath9k: Fix use-after-free Read in ath9k_wmi_ctrl_rx (git-fixes).\n- ath9k: Fix use-after-free Read in htc_connect_service (git-fixes).\n- ath9k: Fix use-after-free Write in ath9k_htc_rx_msg (git-fixes).\n- ath9k_htc: Silence undersized packet warnings (git-fixes).\n- ath9x: Fix stack-out-of-bounds Write in ath9k_hif_usb_rx_cb (git-fixes).\n- ax25: fix setsockopt(SO_BINDTODEVICE) (git-fixes).\n- ax88172a: fix ax88172a_unbind() failures (git-fixes).\n- b43: Fix connection problem with WPA3 (git-fixes).\n- b43legacy: Fix case where channel status is corrupted (git-fixes).\n- b43_legacy: Fix connection problem with WPA3 (git-fixes).\n- backlight: lp855x: Ensure regulators are disabled on probe failure (git-fixes).\n- batman-adv: Revert \u0027disable ethtool link speed detection when auto negotiation off\u0027 (git-fixes).\n- bdev: fix bdev inode reference count disbalance regression (bsc#1174244)\n- bfq: Avoid false bfq queue merging (bsc#1171513).\n- bfq: Fix check detecting whether waker queue should be selected (bsc#1168838).\n- bfq: Use only idle IO periods for think time calculations (bsc#1171513).\n- bfq: Use \u0027ttime\u0027 local variable (bsc#1171513).\n- blacklist.conf: Add 9486727f5981 iommu/vt-d: Make Intel SVM code 64-bit only\n- blacklist.conf: Add superfluous stable commit IDs\n- blacklist.conf: cleanup removing unused exported symbols, unavoidable kABI breakage\n- blacklist.conf: for future infrastructure, and will need kABI workarounds in each user, only if we really need it\n- blk-iocost: Fix error on iocost_ioc_vrate_adj (bsc#1173206).\n- blk-iocost: fix incorrect vtime comparison in iocg_is_idle() (bsc#1173206).\n- blk-mq: consider non-idle request as \u0027inflight\u0027 in blk_mq_rq_inflight() (bsc#1165933).\n- block/bio-integrity: do not free \u0027buf\u0027 if bio_integrity_add_page() failed (bsc#1173817).\n- block: Fix use-after-free in blkdev_get() (bsc#1173834).\n- block: nr_sects_write(): Disable preemption on seqcount write (bsc#1173818).\n- Bluetooth: Add SCO fallback for invalid LMP parameters error (git-fixes).\n- Bluetooth: btbcm: Add 2 missing models to subver tables (git-fixes).\n- Bluetooth: btmtkuart: Improve exception handling in btmtuart_probe() (git-fixes).\n- Bluetooth: hci_bcm: fix freeing not-requested IRQ (git-fixes).\n- bnxt_en: Fix AER reset logic on 57500 chips (bsc#1171150).\n- bnxt_en: fix firmware message length endianness (bsc#1173894).\n- bnxt_en: Fix return code to \u0027flash_device\u0027 (bsc#1173894).\n- bnxt_en: Improve TQM ring context memory sizing formulas (jsc#SLE-8371 bsc#1153274).\n- bnxt_en: Re-enable SRIOV during resume (jsc#SLE-8371 bsc#1153274).\n- bnxt_en: Return from timer if interface is not in open state (jsc#SLE-8371 bsc#1153274).\n- bnxt_en: Simplify bnxt_resume() (jsc#SLE-8371 bsc#1153274).\n- bpf: Document optval \u003e PAGE_SIZE behavior for sockopt hooks (bsc#1155518).\n- bpf: Do not allow btf_ctx_access with __int128 types (bsc#1155518).\n- bpf: Do not return EINVAL from {get,set}sockopt when optlen \u003e PAGE_SIZE (bsc#1155518).\n- bpf: Fix an error code in check_btf_func() (bsc#1154353).\n- bpf: Fix map permissions check (bsc#1155518).\n- bpf: Prevent mmap()\u0027ing read-only maps as writable (bsc#1155518).\n- bpf: Restrict bpf_probe_read{, str}() only to archs where they work (bsc#1172344).\n- bpf: Restrict bpf_trace_printk()\u0027s %s usage and add %pks, %pus specifier (bsc#1172344).\n- bpf, sockhash: Synchronize_rcu before free\u0027ing map (git-fixes).\n- bpf, sockmap: Check update requirements after locking (git-fixes).\n- bpf: Undo internal BPF_PROBE_MEM in BPF insns dump (bsc#1155518).\n- bpf, xdp, samples: Fix null pointer dereference in *_user code (bsc#1155518).\n- brcmfmac: expose RPi firmware config files through modinfo (bsc#1169094).\n- brcmfmac: fix wrong location to get firmware feature (git-fixes).\n- brcmfmac: Transform compatible string for FW loading (bsc#1169771).\n- bridge: Avoid infinite loop when suppressing NS messages with invalid options (networking-stable-20_06_10).\n- bridge: mcast: Fix MLD2 Report IPv6 payload length check (git-fixes).\n- btrfs: add assertions for tree == inode-\u003eio_tree to extent IO helpers (bsc#1174438).\n- btrfs: drop argument tree from btrfs_lock_and_flush_ordered_range (bsc#1174438).\n- btrfs: fix failure of RWF_NOWAIT write into prealloc extent beyond eof (bsc#1174438).\n- btrfs: fix hang on snapshot creation after RWF_NOWAIT write (bsc#1174438).\n- btrfs: fix log context list corruption after rename whiteout error (bsc#1172342).\n- btrfs: fix partial loss of prealloc extent past i_size after fsync (bsc#1172343).\n- btrfs: fix RWF_NOWAIT write not failling when we need to cow (bsc#1174438).\n- btrfs: fix RWF_NOWAIT writes blocking on extent locks and waiting for IO (bsc#1174438).\n- btrfs: reloc: clear DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417 bsc#1160947 bsc#1172366).\n- btrfs: reloc: fix reloc root leak and NULL pointer dereference (bsc#1171417 bsc#1160947 bsc#1172366).\n- btrfs: use correct count in btrfs_file_write_iter() (bsc#1174438).\n- bus: ti-sysc: Do not disable on suspend for no-idle (git-fixes).\n- bus: ti-sysc: Ignore clockactivity unless specified as a quirk (git-fixes).\n- carl9170: remove P2P_GO support (git-fixes).\n- cdc-acm: Add DISABLE_ECHO quirk for Microchip/SMSC chip (git-fixes).\n- CDC-ACM: heed quirk also in error handling (git-fixes).\n- CDC-ACM: heed quirk also in error handling (git-fixes).\n- ceph: add comments for handle_cap_flush_ack logic (bsc#1172940).\n- ceph: allow rename operation under different quota realms (bsc#1172988).\n- ceph: ceph_kick_flushing_caps needs the s_mutex (bsc#1172986).\n- ceph: convert mdsc-\u003ecap_dirty to a per-session list (bsc#1172984 bsc#1167104).\n- ceph: document what protects i_dirty_item and i_flushing_item (bsc#1172940).\n- ceph: do not release i_ceph_lock in handle_cap_trunc (bsc#1172940).\n- ceph: do not return -ESTALE if there\u0027s still an open file (bsc#1171915).\n- ceph: do not take i_ceph_lock in handle_cap_import (bsc#1172940).\n- ceph: fix potential race in ceph_check_caps (bsc#1172940).\n- ceph: flush release queue when handling caps for unknown inode (bsc#1172939).\n- ceph: make sure mdsc-\u003emutex is nested in s-\u003es_mutex to fix dead lock (bsc#1172989).\n- ceph: normalize \u0027delta\u0027 parameter usage in check_quota_exceeded (bsc#1172987).\n- ceph: reorganize __send_cap for less spinlock abuse (bsc#1172940).\n- ceph: request expedited service on session\u0027s last cap flush (bsc#1172985 bsc#1167104).\n- ceph: reset i_requested_max_size if file write is not wanted (bsc#1172983).\n- ceph: skip checking caps when session reconnecting and releasing reqs (bsc#1172990).\n- ceph: split up __finish_cap_flush (bsc#1172940).\n- ceph: throw a warning if we destroy session with mutex still locked (bsc#1172940).\n- char/random: Add a newline at the end of the file (jsc#SLE-12424).\n- clk: bcm2835: Fix return type of bcm2835_register_gate (git-fixes).\n- clk: bcm2835: Remove casting to bcm2835_clk_register (git-fixes).\n- clk: clk-flexgen: fix clock-critical handling (git-fixes).\n- clk: mediatek: assign the initial value to clk_init_data of mtk_mux (git-fixes).\n- clk: meson: meson8b: Do not rely on u-boot to init all GP_PLL registers (git-fixes).\n- clk: meson: meson8b: Fix the polarity of the RESET_N lines (git-fixes).\n- clk: meson: meson8b: Fix the vclk_div{1, 2, 4, 6, 12}_en gate bits (git-fixes).\n- clk: qcom: Add missing msm8998 ufs_unipro_core_clk_src (git-fixes).\n- clk: qcom: msm8916: Fix the address location of pll-\u003econfig_reg (git-fixes).\n- clk: renesas: cpg-mssr: Fix STBCR suspend/resume handling (git-fixes).\n- clk: samsung: exynos5433: Add IGNORE_UNUSED flag to sclk_i2s1 (git-fixes).\n- clk: samsung: Mark top ISP and CAM clocks on Exynos542x as critical (git-fixes).\n- clk: sifive: allocate sufficient memory for struct __prci_data (git-fixes).\n- clk: sprd: return correct type of value for _sprd_pll_recalc_rate (git-fixes).\n- clk: sunxi: Fix incorrect usage of round_down() (git-fixes).\n- clk: ti: am33xx: fix RTC clock parent (git-fixes).\n- clk: ti: composite: fix memory leak (git-fixes).\n- clk: zynqmp: fix memory leak in zynqmp_register_clocks (git-fixes).\n- clocksource: dw_apb_timer: Make CPU-affiliation being optional (git-fixes).\n- clocksource: dw_apb_timer_of: Fix missing clockevent timers (git-fixes).\n- component: Silence bind error on -EPROBE_DEFER (git-fixes).\n- config: arm64: enable CONFIG_IOMMU_DEFAULT_PASSTHROUGH References: bsc#1172739\n- coredump: fix crash when umh is disabled (git-fixes).\n- coredump: fix null pointer dereference on coredump (git-fixes).\n- cpufreq: Fix up cpufreq_boost_set_sw() (git-fixes).\n- cpufreq: intel_pstate: Only mention the BIOS disabling turbo mode once (git-fixes).\n- cpufreq: powernv: Fix frame-size-overflow in powernv_cpufreq_work_fn (git-fixes).\n- cpuidle: Fix three reference count leaks (git-fixes).\n- crypto: algapi - Avoid spurious modprobe on LOADED (git-fixes).\n- crypto: algboss - do not wait during notifier callback (git-fixes).\n- crypto: algif_skcipher - Cap recv SG list at ctx-\u003eused (git-fixes).\n- crypto - Avoid free() namespace collision (git-fixes).\n- crypto: cavium/nitrox - Fix \u0027nitrox_get_first_device()\u0027 when ndevlist is fully iterated (git-fixes).\n- crypto: ccp -- do not \u0027select\u0027 CONFIG_DMADEVICES (git-fixes).\n- crypto/chcr: fix for ccm(aes) failed test (git-fixes).\n- crypto: chelsio/chtls: properly set tp-\u003elsndtime (git-fixes).\n- crypto: drbg - fix error return code in drbg_alloc_state() (git-fixes).\n- crypto: omap-sham - add proper load balancing support for multicore (git-fixes).\n- crypto: stm32/crc32 - fix ext4 chksum BUG_ON() (git-fixes).\n- crypto: stm32/crc32 - fix multi-instance (git-fixes).\n- crypto: stm32/crc32 - fix run-time self test issue (git-fixes).\n- cxgb4: fix adapter crash due to wrong MC size (networking-stable-20_04_27).\n- cxgb4: fix large delays in PTP synchronization (networking-stable-20_04_27).\n- dccp: Fix possible memleak in dccp_init and dccp_fini (networking-stable-20_06_16).\n- debugfs: Check module state before warning in {full/open}_proxy_open() (bsc#1173746).\n- devinet: fix memleak in inetdev_init() (networking-stable-20_06_07).\n- devlink: fix return value after hitting end in region read (networking-stable-20_05_12).\n- devmap: Use bpf_map_area_alloc() for allocating hash buckets (bsc#1154353).\n- /dev/mem: Add missing memory barriers for devmem_inode (git-fixes).\n- /dev/mem: Revoke mappings when a driver claims the region (git-fixes).\n- dma-coherent: fix integer overflow in the reserved-memory dma allocation (git-fixes).\n- dma-debug: fix displaying of dma allocation type (git-fixes).\n- dma-direct: fix data truncation in dma_direct_get_required_mask() (git-fixes).\n- dmaengine: dmatest: Fix process hang when reading \u0027wait\u0027 parameter (git-fixes).\n- dmaengine: dmatest: Restore default for channel (git-fixes).\n- dmaengine: dmatest: stop completed threads when running without set channel (git-fixes).\n- dmaengine: dw: Initialize channel before each transfer (git-fixes).\n- dmaengine: fsl-edma-common: correct DSIZE_32BYTE (git-fixes).\n- dmaengine: fsl-edma: Fix NULL pointer exception in fsl_edma_tx_handler (git-fixes).\n- dmaengine: imx-sdma: Fix: Remove \u0027always true\u0027 comparison (git-fixes).\n- dmaengine: mcf-edma: Fix NULL pointer exception in mcf_edma_tx_handler (git-fixes).\n- dmaengine: mmp_tdma: Do not ignore slave config validation errors (git-fixes).\n- dmaengine: mmp_tdma: Reset channel error on release (git-fixes).\n- dmaengine: owl: Use correct lock in owl_dma_get_pchan() (git-fixes).\n- dmaengine: pch_dma.c: Avoid data race between probe and irq handler (git-fixes).\n- dmaengine: sh: usb-dmac: set tx_result parameters (git-fixes).\n- dmaengine: tegra210-adma: Fix an error handling path in \u0027tegra_adma_probe()\u0027 (git-fixes).\n- dm: do not use waitqueue for request-based DM (bsc#1165933).\n- dm verity fec: fix hash block number in verity_fec_decode (git fixes (block drivers)).\n- dm writecache: fix data corruption when reloading the target (git fixes (block drivers)).\n- dm writecache: reject asynchronous pmem devices (bsc#1156395).\n- dpaa2-eth: prevent array underflow in update_cls_rule() (networking-stable-20_05_16).\n- dpaa2-eth: properly handle buffer size restrictions (networking-stable-20_05_16).\n- dpaa_eth: fix usage as DSA master, try 3 (networking-stable-20_05_27).\n- dpaa_eth: FMan erratum A050385 workaround (bsc#1174396).\n- dpaa_eth: Make dpaa_a050385_wa static (bsc#1174396).\n- drivers: base: Fix NULL pointer exception in __platform_driver_probe() if a driver developer is foolish (git-fixes).\n- drivers: hv: Change flag to write log level in panic msg to false (bsc#1170617).\n- drivers/net/ibmvnic: Update VNIC protocol version reporting (bsc#1065729).\n- drivers: phy: sr-usb: do not use internal fsm for USB2 phy init (git-fixes).\n- drivers: soc: ti: knav_qmss_queue: Make knav_gp_range_ops static (git-fixes).\n- drm/amd/display: add basic atomic check for cursor plane (git-fixes).\n- drm/amd/display: drop cursor position check in atomic test (git-fixes).\n- drm: amd/display: fix Kconfig help text (bsc#1152489) \t* context changes\n- drm/amd/display: Only revalidate bandwidth on medium and fast updates (git-fixes).\n- drm/amd/display: Prevent dpcd reads with passive dongles (git-fixes).\n- drm/amd/display: Revalidate bandwidth before commiting DC updates (git-fixes).\n- drm/amd/display: Use kfree() to free rgb_user in calculate_user_regamma_ramp() (git-fixes).\n- drm/amd: fix potential memleak in err branch (git-fixes).\n- drm/amdgpu: add fw release for sdma v5_0 (git-fixes).\n- drm/amdgpu/atomfirmware: fix vram_info fetching for renoir (git-fixes).\n- drm/amdgpu: do not do soft recovery if gpu_recovery=0 (git-fixes).\n- drm/amdgpu: drop redundant cg/pg ungate on runpm enter (git-fixes).\n- drm/amdgpu: fix gfx hang during suspend with video playback (v2) (git-fixes).\n- drm/amdgpu: fix the hw hang during perform system reboot and reset (git-fixes).\n- drm/amdgpu: force fbdev into vram (bsc#1152472) \t* context changes\n- drm/amdgpu: Init data to avoid oops while reading pp_num_states (git-fixes).\n- drm/amdgpu: invalidate L2 before SDMA IBs (v2) (git-fixes).\n- drm/amdgpu: move kfd suspend after ip_suspend_phase1 (git-fixes).\n- drm/amdgpu: Replace invalid device ID with a valid device ID (bsc#1152472)\n- drm/amdgpu/sdma5: fix wptr overwritten in -\u003eget_wptr() (git-fixes).\n- drm/amdgpu: simplify padding calculations (v2) (git-fixes).\n- drm/amdgpu: use %u rather than %d for sclk/mclk (git-fixes).\n- drm/amd/powerpay: Disable gfxoff when setting manual mode on picasso and raven (git-fixes).\n- drm/amd/powerplay: avoid using pm_en before it is initialized revised (git-fixes).\n- drm/amd/powerplay: perform PG ungate prior to CG ungate (git-fixes).\n- drm: bridge: adv7511: Extend list of audio sample rates (git-fixes).\n- drm/connector: notify userspace on hotplug after register complete (bsc#1152489) \t* context changes\n- drm/dp_mst: Increase ACT retry timeout to 3s (bsc#1152472) \t* context changes\n- drm/dp_mst: Reformat drm_dp_check_act_status() a bit (git-fixes).\n- drm/edid: Add Oculus Rift S to non-desktop list (git-fixes).\n- drm: encoder_slave: fix refcouting error for modules (git-fixes).\n- drm/etnaviv: fix perfmon domain interation (git-fixes).\n- drm/etnaviv: rework perfmon query infrastructure (git-fixes).\n- drm/exynos: fix ref count leak in mic_pre_enable (git-fixes).\n- drm/exynos: Properly propagate return value in drm_iommu_attach_device() (git-fixes).\n- drm/i915: Do not enable WaIncreaseLatencyIPCEnabled when IPC is (bsc#1152489)\n- drm/i915: Do not enable WaIncreaseLatencyIPCEnabled when IPC is disabled (git-fixes).\n- drm/i915: extend audio CDCLK\u003e=2*BCLK constraint to more platforms (git-fixes).\n- drm/i915: Extend WaDisableDARBFClkGating to icl,ehl,tgl (bsc#1152489)\n- drm/i915: fix port checks for MST support on gen \u003e= 11 (git-fixes).\n- drm/i915/gem: Avoid iterating an empty list (git-fixes).\n- drm/i915/gt: Do not schedule normal requests immediately along (bsc#1152489)\n- drm/i915/gt: Ignore irq enabling on the virtual engines (git-fixes).\n- drm/i915/gvt: Fix kernel oops for 3-level ppgtt guest (bsc#1152489)\n- drm/i915/gvt: Fix kernel oops for 3-level ppgtt guest (git-fixes).\n- drm/i915/gvt: Fix two CFL MMIO handling caused by regression. (bsc#1152489)\n- drm/i915/gvt: Fix two CFL MMIO handling caused by regression (git-fixes).\n- drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of (bsc#1152489)\n- drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of inheritance (git-fixes).\n- drm/i915: HDCP: fix Ri prime check done during link check (bsc#1152489) \t* context changes\n- drm/i915: HDCP: fix Ri prime check done during link check (git-fixes).\n- drm/i915/icl+: Fix hotplug interrupt disabling after storm detection (bsc#1152489)\n- drm/i915: Limit audio CDCLK\u003e=2*BCLK constraint back to GLK only (git-fixes).\n- drm/i915: Propagate error from completed fences (git-fixes).\n- drm/i915: Whitelist context-local timestamp in the gen9 cmdparser (git-fixes).\n- drm/i915: work around false-positive maybe-uninitialized warning (git-fixes).\n- drm/mcde: dsi: Fix return value check in mcde_dsi_bind() (git-fixes).\n- drm: mcde: Fix display initialization problem (git-fixes).\n- drm/mediatek: Check plane visibility in atomic_update (git-fixes).\n- drm/msm: Check for powered down HW in the devfreq callbacks (bsc#1152489)\n- drm/msm/dpu: allow initialization of encoder locks during encoder init (git-fixes).\n- drm/msm/dpu: fix error return code in dpu_encoder_init (bsc#1152489)\n- drm/msm/dpu: fix error return code in dpu_encoder_init (git-fixes).\n- drm/msm: fix potential memleak in error branch (git-fixes).\n- drm/msm/mdp5: Fix mdp5_init error path for failed mdp5_kms allocation (git-fixes).\n- drm/nouveau/disp/gm200-: fix NV_PDISP_SOR_HDMI2_CTRL(n) selection (git-fixes).\n- drm: panel-orientation-quirks: Add quirk for Asus T101HA panel (git-fixes).\n- drm: panel-orientation-quirks: Use generic orientation-data for Acer S1003 (git-fixes).\n- drm/qxl: lost qxl_bo_kunmap_atomic_page in qxl_image_init_helper() (git-fixes).\n- drm/qxl: Use correct notify port address when creating cursor ring (bsc#1152472)\n- drm/radeon: fix double free (git-fixes).\n- drm/radeon: fix fb_div check in ni_init_smc_spll_table() (bsc#1152472)\n- drm: rcar-du: Fix build error (bsc#1152472)\n- drm/sun4i: hdmi ddc clk: Fix size of m divider (git-fixes).\n- drm: sun4i: hdmi: Remove extra HPD polling (bsc#1152489)\n- drm: sun4i: hdmi: Remove extra HPD polling (git-fixes).\n- drm/sun4i: tcon: Separate quirks for tcon0 and tcon1 on A20 (git-fixes).\n- drm/tegra: hub: Do not enable orphaned window group (git-fixes).\n- drm/vkms: Hold gem object while still in-use (git-fixes).\n- Drop a couple of block layer git-fixes (bsc#1170891 bsc#1173139) Upstream changed the partition usage counter check back and forth and ended up reverting all changes. Let\u0027s drop our the partial backport. (cherry picked from commit 70ad1b2fa5955d91e1a09a8027daf210e28fee30)\n- Drop a couple of block layer git-fixes Upstream changed the partition usage counter check back and forth and ended up reverting all changes. Let\u0027s drop our the partial backport.\n- dwc3: Remove check for HWO flag in dwc3_gadget_ep_reclaim_trb_sg() (git-fixes).\n- e1000: Distribute switch variables for initialization (git-fixes).\n- e1000e: Disable TSO for buffer overrun workaround (git-fixes).\n- e1000e: Do not wake up the system via WOL if device wakeup is disabled (git-fixes).\n- e1000e: Relax condition to trigger reset for ME workaround (git-fixes).\n- EDAC/amd64: Add PCI device IDs for family 17h, model 70h (bsc#1165975).\n- EDAC/ghes: Setup DIMM label from DMI and use it in error reports (bsc#1168779).\n- EDAC/skx: Use the mcmtr register to retrieve close_pg/bank_xor_enable (bsc#1152489).\n- EDAC/synopsys: Do not dump uninitialized pinf-\u003ecol (bsc#1152489).\n- efi/efivars: Add missing kobject_put() in sysfs entry creation error path (git-fixes).\n- efi/random: Treat EFI_RNG_PROTOCOL output as bootloader randomness (jsc#SLE-12424).\n- efi: READ_ONCE rng seed size before munmap (jsc#SLE-12424).\n- efi/tpm: Verify event log header before parsing (bsc#1173461).\n- eventpoll: fix missing wakeup for ovflist in ep_poll_callback (bsc#1159867).\n- evm: Check also if *tfm is an error pointer in init_desc() (git-fixes).\n- evm: Fix a small race in init_desc() (git-fixes).\n- evm: Fix possible memory leak in evm_calc_hmac_or_hash() (git-fixes).\n- evm: Fix RCU list related warnings (git-fixes).\n- exfat: add missing brelse() calls on error paths (git-fixes).\n- exfat: fix incorrect update of stream entry in __exfat_truncate() (git-fixes).\n- exfat: fix memory leak in exfat_parse_param() (git-fixes).\n- exfat: move setting VOL_DIRTY over exfat_remove_entries() (git-fixes).\n- ext4: avoid utf8_strncasecmp() with unstable name (bsc#1173843).\n- ext4: fix error pointer dereference (bsc#1173837).\n- ext4: fix EXT_MAX_EXTENT/INDEX to check for zeroed eh_max (bsc#1173836).\n- ext4: fix partial cluster initialization when splitting extent (bsc#1173839).\n- ext4: fix race between ext4_sync_parent() and rename() (bsc#1173838).\n- ext4, jbd2: ensure panic by fix a race between jbd2 abort and ext4 error handlers (bsc#1173833).\n- ext4: stop overwrite the errcode in ext4_setup_super (bsc#1173841).\n- extcon: adc-jack: Fix an error handling path in \u0027adc_jack_probe()\u0027 (git-fixes).\n- fanotify: fix ignore mask logic for events on child and on dir (bsc#1172719).\n- fat: do not allow to mount if the FAT length == 0 (bsc#1173831).\n- fdt: add support for rng-seed (jsc#SLE-12424).\n- fdt: Update CRC check for rng-seed (jsc#SLE-12424).\n- firmware: imx: scu: Fix corruption of header (git-fixes).\n- firmware: imx: scu: Fix possible memory leak in imx_scu_probe() (git-fixes).\n- firmware: imx-scu: Support one TX and one RX (git-fixes).\n- firmware: imx: warn on unexpected RX (git-fixes).\n- firmware: qcom_scm: fix bogous abuse of dma-direct internals (git-fixes).\n- firmware: xilinx: Fix an error handling path in \u0027zynqmp_firmware_probe()\u0027 (git-fixes).\n- Fix a regression of AF_ALG crypto interface hang with aes_s390 (bsc#1167651)\n- fix multiplication overflow in copy_fdtable() (bsc#1173825).\n- fork: prevent accidental access to clone3 features (bsc#1174018).\n- fpga: dfl: afu: Corrected error handling levels (git-fixes).\n- fq_codel: fix TCA_FQ_CODEL_DROP_BATCH_SIZE sanity checks (networking-stable-20_05_12).\n- fs: Do not check if there is a fsnotify watcher on pseudo inodes (bsc#1158765).\n- fsl/fman: detect FMan erratum A050385 (bsc#1174396) Update arm64 config file\n- fsnotify: Rearrange fast path to minimise overhead when there is no watcher (bsc#1158765).\n- fuse: copy_file_range should truncate cache (git-fixes).\n- fuse: fix copy_file_range cache issues (git-fixes).\n- genetlink: clean up family attributes allocations (git-fixes).\n- genetlink: fix memory leaks in genl_family_rcv_msg_dumpit() (bsc#1154353).\n- geneve: allow changing DF behavior after creation (git-fixes).\n- geneve: change from tx_error to tx_dropped on missing metadata (git-fixes).\n- gfs2: fix glock reference problem in gfs2_trans_remove_revoke (bsc#1173823).\n- gfs2: Multi-block allocations in gfs2_page_mkwrite (bsc#1173822).\n- gpio: bcm-kona: Fix return value of bcm_kona_gpio_probe() (git-fixes).\n- gpio: dwapb: Append MODULE_ALIAS for platform driver (git-fixes).\n- gpio: dwapb: Call acpi_gpiochip_free_interrupts() on GPIO chip de-registration (git-fixes).\n- gpio: exar: Fix bad handling for ida_simple_get error path (git-fixes).\n- gpiolib: Document that GPIO line names are not globally unique (git-fixes).\n- gpio: pca953x: disable regmap locking for automatic address incrementing (git-fixes).\n- gpio: pca953x: Fix GPIO resource leak on Intel Galileo Gen 2 (git-fixes).\n- gpio: pca953x: fix handling of automatic address incrementing (git-fixes).\n- gpio: pca953x: Fix pca953x_gpio_set_config (git-fixes).\n- gpio: pca953x: Override IRQ for one of the expanders on Galileo Gen 2 (git-fixes).\n- gpio: pxa: Fix return value of pxa_gpio_probe() (git-fixes).\n- gpio: tegra: mask GPIO IRQs during IRQ shutdown (git-fixes).\n- gpu/drm: Ingenic: Fix opaque pointer casted to wrong type (git-fixes).\n- gpu: host1x: Detach driver on unregister (git-fixes).\n- habanalabs: Align protection bits configuration of all TPCs (git-fixes).\n- HID: Add quirks for Trust Panora Graphic Tablet (git-fixes).\n- HID: alps: Add AUI1657 device ID (git-fixes).\n- HID: alps: ALPS_1657 is too specific; use U1_UNICORN_LEGACY instead (git-fixes).\n- HID: i2c-hid: add Schneider SCL142ALM to descriptor override (git-fixes).\n- HID: i2c-hid: reset Synaptics SYNA2393 on resume (git-fixes).\n- HID: intel-ish-hid: avoid bogus uninitialized-variable warning (git-fixes).\n- HID: logitech-hidpp: avoid repeated \u0027multiplier = \u0027 log messages (git-fixes).\n- HID: magicmouse: do not set up autorepeat (git-fixes).\n- HID: multitouch: add eGalaxTouch P80H84 support (git-fixes).\n- HID: multitouch: enable multi-input as a quirk for some devices (git-fixes).\n- HID: quirks: Add HID_QUIRK_NO_INIT_REPORTS quirk for Dell K12A keyboard-dock (git-fixes).\n- HID: quirks: Always poll Obins Anne Pro 2 keyboard (git-fixes).\n- HID: quirks: Ignore Simply Automated UPB PIM (git-fixes).\n- HID: quirks: Remove ITE 8595 entry from hid_have_special_driver (git-fixes).\n- HID: sony: Fix for broken buttons on DS3 USB dongles (git-fixes).\n- hinic: fix a bug of ndo_stop (networking-stable-20_05_16).\n- hinic: fix wrong para of wait_for_completion_timeout (networking-stable-20_05_16).\n- hsr: check protocol version in hsr_newlink() (networking-stable-20_04_17).\n- hv_netvsc: Fix netvsc_start_xmit\u0027s return type (git-fixes).\n- hwmon: (acpi_power_meter) Fix potential memory leak in acpi_power_meter_add() (git-fixes).\n- hwmon: (emc2103) fix unable to change fan pwm1_enable attribute (git-fixes).\n- hwmon: (k10temp) Add AMD family 17h model 60h PCI match (git-fixes).\n- hwmon: (max6697) Make sure the OVERT mask is set correctly (git-fixes).\n- hwmon: (pmbus) fix a typo in Kconfig SENSORS_IR35221 option (git-fixes).\n- hwrng: ks-sa - Fix runtime PM imbalance on error (git-fixes).\n- i2c: acpi: put device when verifying client fails (git-fixes).\n- i2c: algo-pca: Add 0x78 as SCL stuck low status for PCA9665 (git-fixes).\n- i2c: altera: Fix race between xfer_msg and isr thread (git-fixes).\n- i2c: core: check returned size of emulated smbus block read (git-fixes).\n- i2c: designware-pci: Add support for Elkhart Lake PSE I2C (jsc#SLE-12734).\n- i2c: designware-pci: Fix BUG_ON during device removal (jsc#SLE-12734).\n- i2c: designware-pci: Switch over to MSI interrupts (jsc#SLE-12734).\n- i2c: dev: Fix the race between the release of i2c_dev and cdev (git-fixes).\n- i2c: eg20t: Load module automatically if ID matches (git-fixes).\n- i2c: fix missing pm_runtime_put_sync in i2c_device_probe (git-fixes).\n- i2c: fsi: Fix the port number field in status register (git-fixes).\n- i2c: mlxcpld: check correct size of maximum RECV_LEN packet (git-fixes).\n- i2c: mux: demux-pinctrl: Fix an error handling path in \u0027i2c_demux_pinctrl_probe()\u0027 (git-fixes).\n- i2c: piix4: Detect secondary SMBus controller on AMD AM4 chipsets (git-fixes).\n- i2c: pxa: clear all master action bits in i2c_pxa_stop_message() (git-fixes).\n- i2c: pxa: fix i2c_pxa_scream_blue_murder() debug output (git-fixes).\n- IB/hfi1: Do not destroy hfi1_wq when the device is shut down (bsc#1174409).\n- IB/hfi1: Do not destroy link_wq when the device is shut down (bsc#1174409).\n- IB/hfi1: Fix another case where pq is left on waitlist (bsc#1174411).\n- IB/hfi1: Fix module use count flaw due to leftover module put calls (bsc#1174407).\n- ibmveth: Fix max MTU limit (bsc#1173428 ltc#186397).\n- ibmvnic: continue to init in CRQ reset returns H_CLOSED (bsc#1173280 ltc#185369).\n- ibmvnic: Flush existing work items before device removal (bsc#1065729).\n- ibmvnic: Harden device login requests (bsc#1170011 ltc#183538).\n- IB/rdmavt: Free kernel completion queue when done (bsc#1173625).\n- ice: Fix error return code in ice_add_prof() (jsc#SLE-7926).\n- ice: Fix inability to set channels when down (jsc#SLE-7926).\n- ieee80211: Fix incorrect mask for default PE duration (git-fixes).\n- iio: adc: ad7780: Fix a resource handling path in \u0027ad7780_probe()\u0027 (git-fixes).\n- iio: adc: stm32-adc: fix device used to request dma (git-fixes).\n- iio: adc: stm32-adc: Use dma_request_chan() instead dma_request_slave_channel() (git-fixes).\n- iio: adc: stm32-dfsdm: fix device used to request dma (git-fixes).\n- iio: adc: stm32-dfsdm: Use dma_request_chan() instead dma_request_slave_channel() (git-fixes).\n- iio: adc: ti-ads8344: Fix channel selection (git-fixes).\n- iio: bmp280: fix compensation of humidity (git-fixes).\n- iio: buffer: Do not allow buffers without any channels enabled to be activated (git-fixes).\n- iio:chemical:pms7003: Fix timestamp alignment and prevent data leak (git-fixes).\n- iio:chemical:sps30: Fix timestamp alignment (git-fixes).\n- iio: core: add missing IIO_MOD_H2/ETHANOL string identifiers (git-fixes).\n- iio: dac: vf610: Fix an error handling path in \u0027vf610_dac_probe()\u0027 (git-fixes).\n- iio:health:afe4404 Fix timestamp alignment and prevent data leak (git-fixes).\n- iio:humidity:hdc100x Fix alignment and data leak issues (git-fixes).\n- iio:humidity:hts221 Fix alignment and data leak issues (git-fixes).\n- iio:magnetometer:ak8974: Fix alignment and data leak issues (git-fixes).\n- iio: magnetometer: ak8974: Fix runtime PM imbalance on error (git-fixes).\n- iio: mma8452: Add missed iio_device_unregister() call in mma8452_probe() (git-fixes).\n- iio: pressure: bmp280: Tolerate IRQ before registering (git-fixes).\n- iio:pressure:ms5611 Fix buffer element alignment (git-fixes).\n- iio: pressure: zpa2326: handle pm_runtime_get_sync failure (git-fixes).\n- iio: sca3000: Remove an erroneous \u0027get_device()\u0027 (git-fixes).\n- iio: vcnl4000: Fix i2c swapped word reading (git-fixes).\n- ima: Call ima_calc_boot_aggregate() in ima_eventdigest_init() (bsc#1172223).\n- ima: Directly assign the ima_default_policy pointer to ima_rules (bsc#1172223) \n- ima: Directly free *entry in ima_alloc_init_template() if digests is NULL (bsc#1172223).\n- ima: Remove __init annotation from ima_pcrread() (git-fixes).\n- include/asm-generic/topology.h: guard cpumask_of_node() macro argument (bsc#1148868).\n- Input: dlink-dir685-touchkeys - fix a typo in driver name (git-fixes).\n- Input: edt-ft5x06 - fix get_default register write access (git-fixes).\n- Input: elan_i2c - add more hardware ID for Lenovo laptops (git-fixes).\n- Input: evdev - call input_flush_device() on release(), not flush() (git-fixes).\n- Input: goodix - fix touch coordinates on Cube I15-TC (git-fixes).\n- Input: i8042 - add Lenovo XiaoXin Air 12 to i8042 nomux list (git-fixes).\n- Input: i8042 - add ThinkPad S230u to i8042 reset list (git-fixes).\n- input: i8042 - Remove special PowerPC handling (git-fixes).\n- Input: mms114 - add extra compatible for mms345l (git-fixes).\n- Input: mms114 - fix handling of mms345l (git-fixes).\n- Input: synaptics - add a second working PNP_ID for Lenovo T470s (git-fixes).\n- Input: synaptics-rmi4 - fix error return code in rmi_driver_probe() (git-fixes).\n- Input: synaptics-rmi4 - really fix attn_data use-after-free (git-fixes).\n- Input: usbtouchscreen - add support for BonXeon TP (git-fixes).\n- Input: xpad - add custom init packet for Xbox One S controllers (git-fixes).\n- intel_th: Fix a NULL dereference when hub driver is not loaded (git-fixes).\n- intel_th: pci: Add Emmitsburg PCH support (git-fixes).\n- intel_th: pci: Add Jasper Lake CPU support (git-fixes).\n- intel_th: pci: Add Tiger Lake PCH-H support (git-fixes).\n- iocost: check active_list of all the ancestors in iocg_activate() (bsc#1173206).\n- iocost: over-budget forced IOs should schedule async delay (bsc#1173206).\n- iommu/amd: Call domain_flush_complete() in update_domain() (bsc#1172061).\n- iommu/amd: Do not flush Device Table in iommu_map_page() (bsc#1172062).\n- iommu/amd: Do not loop forever when trying to increase address space (bsc#1172063).\n- iommu/amd: Fix legacy interrupt remapping for x2APIC-enabled system (bsc#1172393).\n- iommu/amd: Fix over-read of ACPI UID from IVRS table (bsc#1172064).\n- iommu/amd: Fix race in increase_address_space()/fetch_pte() (bsc#1172065).\n- iommu/amd: Update Device Table in increase_address_space() (bsc#1172066).\n- iommu/arm-smmu-v3: Do not reserve implementation defined register space (bsc#1174126).\n- iommu: Fix reference count leak in iommu_group_alloc (bsc#1172394).\n- iommu/qcom: Fix local_base status check (bsc#1172067).\n- iommu/virtio: Reverse arguments to list_add (bsc#1172068).\n- iommu/vt-d: Enable PCI ACS for platform opt in hint (bsc#1174127).\n- iommu/vt-d: Update scalable mode paging structure coherency (bsc#1174128).\n- ionic: add pcie_print_link_status (bsc#1167773).\n- ionic: centralize queue reset code (bsc#1167773).\n- ionic: export features for vlans to use (bsc#1167773).\n- ionic: no link check while resetting queues (bsc#1167773).\n- ionic: remove support for mgmt device (bsc#1167773).\n- ionic: tame the watchdog timer on reconfig (bsc#1167773).\n- ionic: update the queue count on open (bsc#1167773).\n- ionic: wait on queue start until after IFF_UP (bsc#1167773).\n- io_uring: use kvfree() in io_sqe_buffer_register() (bsc#1173832).\n- ipmi: use vzalloc instead of kmalloc for user creation (git-fixes).\n- ipv4: Update fib_select_default to handle nexthop objects (networking-stable-20_04_27).\n- ipv6: fix IPV6_ADDRFORM operation logic (bsc#1171662).\n- ipvs: Improve robustness to the ipvs sysctl (git-fixes).\n- irqchip/al-fic: Add support for irq retrigger (jsc#SLE-10505).\n- irqchip/ti-sci-inta: Fix processing of masked irqs (git-fixes).\n- irqchip/versatile-fpga: Apply clear-mask earlier (git-fixes).\n- irqchip/versatile-fpga: Handle chained IRQs properly (git-fixes).\n- iwlwifi: avoid debug max amsdu config overwriting itself (git-fixes).\n- iwlwifi: mvm: fix aux station leak (git-fixes).\n- iwlwifi: mvm: limit maximum queue appropriately (git-fixes).\n- iwlwifi: pcie: handle QuZ configs with killer NICs as well (bsc#1172374).\n- ixgbe: do not check firmware errors (bsc#1170284).\n- jbd2: avoid leaking transaction credits when unreserving handle (bsc#1173845).\n- jbd2: fix data races at struct journal_head (bsc#1173438).\n- jbd2: Preserve kABI when adding j_abort_mutex (bsc#1173833).\n- kabi fix for SUNRPC-dont-update-timeout-value-on-connection-reset.patch (bsc1174263).\n- kABI fixup mtk-vpu: avoid unaligned access to DTCM buffer (git-fixes).\n- kabi: hv: prevent struct device_node to become defined (bsc#1172871).\n- kabi: ppc64le: prevent struct dma_map_ops to become defined (jsc#SLE-12424).\n- kABI: protect struct fib_dump_filter (kabi).\n- kABI: protect struct mlx5_cmd_work_ent (kabi).\n- kABI: reintroduce inet_hashtables.h include to l2tp_ip (kabi).\n- kabi/severities: Ingnore get_dev_data() The function is internal to the AMD IOMMU driver and must not be called by any third party.\n- kABI workaround for struct hdac_bus changes (git-fixes).\n- keys: asymmetric: fix error return code in software_key_query() (git-fixes).\n- ktest: Add timeout for ssh sync testing (git-fixes).\n- KVM: Check validity of resolved slot when searching memslots (bsc#1172069).\n- KVM: nVMX: always update CR3 in VMCS (git-fixes).\n- KVM: x86/mmu: Set mmio_value to \u00270\u0027 if reserved #PF can\u0027t be generated (bsc#1171904).\n- KVM: x86: only do L1TF workaround on affected processors (bsc#1171904).\n- l2tp: add sk_family checks to l2tp_validate_socket (networking-stable-20_06_07).\n- l2tp: Allow management of tunnels and session in user namespace (networking-stable-20_04_17).\n- l2tp: do not use inet_hash()/inet_unhash() (networking-stable-20_06_07).\n- libbpf: Fix perf_buffer__free() API for sparse allocs (bsc#1155518).\n- libceph: do not omit recovery_deletes in target_copy() (git-fixes).\n- libceph: ignore pool overlay and cache logic on redirects (bsc#1172938).\n- lib: devres: add a helper function for ioremap_uc (git-fixes).\n- libertas_tf: avoid a null dereference in pointer priv (git-fixes).\n- lib/lzo: fix ambiguous encoding bug in lzo-rle (git-fixes).\n- libnvdimm/btt: fix variable \u0027rc\u0027 set but not used (bsc#1162400).\n- libnvdimm: cover up nd_pfn_sb changes (bsc#1171759).\n- libnvdimm: cover up nd_region changes (bsc#1162400).\n- libnvdimm/dax: Pick the right alignment default when creating dax devices (bsc#1171759).\n- libnvdimm/label: Remove the dpa align check (bsc#1171759).\n- libnvdimm/namespace: Enforce memremap_compat_align() (bsc#1162400).\n- libnvdimm/namsepace: Do not set claim_class on error (bsc#1162400).\n- libnvdimm/of_pmem: Provide a unique name for bus provider (bsc#1171739).\n- libnvdimm: Out of bounds read in __nd_ioctl() (bsc#1065729).\n- libnvdimm/pfn_dev: Add a build check to make sure we notice when struct page size change (bsc#1171743).\n- libnvdimm/pfn_dev: Add page size and struct page size to pfn superblock (bsc#1171759).\n- libnvdimm/pfn: Prevent raw mode fallback if pfn-infoblock valid (bsc#1171743).\n- libnvdimm/pmem: Advance namespace seed for specific probe errors (bsc#1171743).\n- libnvdimm/region: Fix build error (bsc#1162400).\n- libnvdimm/region: Introduce an \u0027align\u0027 attribute (bsc#1162400).\n- libnvdimm/region: Introduce NDD_LABELING (bsc#1162400).\n- libnvdimm/region: Rewrite _probe_success() to _advance_seeds() (bsc#1171743).\n- libnvdimm: Use PAGE_SIZE instead of SZ_4K for align check (bsc#1171759).\n- lib: Reduce user_access_begin() boundaries in strncpy_from_user() and strnlen_user() (bsc#1174331).\n- lib: Uplevel the pmem \u0027region\u0027 ida to a global allocator (bc#1162400).\n- list: Add hlist_unhashed_lockless() (bsc#1173438).\n- livepatch: Apply vmlinux-specific KLP relocations early (bsc#1071995).\n- livepatch: Disallow vmlinux.ko (bsc#1071995).\n- livepatch: Make klp_apply_object_relocs static (bsc#1071995).\n- livepatch: Prevent module-specific KLP rela sections from referencing vmlinux symbols (bsc#1071995).\n- livepatch: Remove .klp.arch (bsc#1071995).\n- locktorture: Allow CPU-hotplug to be disabled via --bootargs (bsc#1173068).\n- loop: replace kill_bdev with invalidate_bdev (bsc#1173820).\n- lpfc_debugfs: get rid of pointless access_ok() (bsc#1171530).\n- lpfc: fix axchg pointer reference after free and double frees (bsc#1171530).\n- lpfc: Fix pointer checks and comments in LS receive refactoring (bsc#1171530).\n- lpfc: Fix return value in __lpfc_nvme_ls_abort (bsc#1171530).\n- lpfc: Synchronize NVME transport and lpfc driver devloss_tmo (bcs#1173060).\n- mac80211: mesh: fix discovery timer re-arming issue / crash (git-fixes).\n- mailbox: zynqmp-ipi: Fix NULL vs IS_ERR() check in zynqmp_ipi_mbox_probe() (git-fixes).\n- Make the \u0027Reducing compressed framebufer size\u0027 message be DRM_INFO_ONCE() (git-fixes).\n- mdraid: fix read/write bytes accounting (bsc#1172537).\n- media: cec: silence shift wrapping warning in __cec_s_log_addrs() (git-fixes).\n- media: cedrus: Program output format during each run (git-fixes).\n- media: dvbdev: Fix tuner-\u003edemod media controller link (git-fixes).\n- media: dvb: return -EREMOTEIO on i2c transfer failure (git-fixes).\n- media: dvbsky: add support for eyeTV Geniatech T2 lite (bsc#1173776).\n- media: dvbsky: add support for Mygica T230C v2 (bsc#1173776).\n- media: imx: imx7-mipi-csis: Cleanup and fix subdev pad format handling (git-fixes).\n- media: mtk-vpu: avoid unaligned access to DTCM buffer (git-fixes).\n- media: ov5640: fix use of destroyed mutex (git-fixes).\n- media: platform: fcp: Set appropriate DMA parameters (git-fixes).\n- media: Revert \u0027staging: imgu: Address a compiler warning on alignment\u0027 (git-fixes).\n- media: si2157: Better check for running tuner in init (git-fixes).\n- media: si2168: add support for Mygica T230C v2 (bsc#1173776).\n- media: staging: imgu: do not hold spinlock during freeing mmu page table (git-fixes).\n- media: staging/intel-ipu3: Implement lock for stream on/off operations (git-fixes).\n- media: staging: ipu3: Fix stale list entries on parameter queue failure (git-fixes).\n- media: staging: ipu3-imgu: Move alignment attribute to field (git-fixes).\n- media: vicodec: Fix error codes in probe function (git-fixes).\n- mei: bus: do not clean driver pointer (git-fixes).\n- mei: release me_cl object reference (git-fixes).\n- mfd: intel-lpss: Add Intel Jasper Lake PCI IDs (jsc#SLE-12602).\n- mfd: intel-lpss: Add Intel Tiger Lake PCI IDs (jsc#SLE-12737).\n- mfd: intel-lpss: Use devm_ioremap_uc for MMIO (git-fixes).\n- mfd: stmfx: Fix stmfx_irq_init error path (git-fixes).\n- mfd: stmfx: Reset chip on resume as supply was disabled (git-fixes).\n- mfd: wm8994: Fix driver operation if loaded as modules (git-fixes).\n- misc: fastrpc: fix potential fastrpc_invoke_ctx leak (git-fixes).\n- misc: rtsx: Add short delay after exit from ASPM (git-fixes).\n- mlxsw: core: Use different get_trend() callbacks for different thermal zones (networking-stable-20_06_10).\n- mlxsw: Fix some IS_ERR() vs NULL bugs (networking-stable-20_04_27).\n- mlxsw: spectrum_acl_tcam: Position vchunk in a vregion list properly (networking-stable-20_05_12).\n- mm: adjust vm_committed_as_batch according to vm overcommit policy (bnc#1173271).\n- mmc: block: Fix use-after-free issue for rpmb (git-fixes).\n- mmc: core: Use DEFINE_DEBUGFS_ATTRIBUTE instead of DEFINE_SIMPLE_ATTRIBUTE (git-fixes).\n- mmc: fix compilation of user API (git-fixes).\n- mmc: meson-gx: limit segments to 1 when dram-access-quirk is needed (git-fixes).\n- mmc: meson-mx-sdio: trigger a soft reset after a timeout or CRC error (git-fixes).\n- mmc: mmci_sdmmc: fix DMA API warning overlapping mappings (git-fixes).\n- mmc: sdhci: do not enable card detect interrupt for gpio cd type (git-fixes).\n- mmc: sdhci-esdhc-imx: fix the mask for tuning start point (git-fixes).\n- mmc: sdhci-msm: Clear tuning done flag while hs400 tuning (git-fixes).\n- mmc: sdhci-msm: Set SDHCI_QUIRK_MULTIBLOCK_READ_ACMD12 quirk (git-fixes).\n- mmc: sdio: Fix potential NULL pointer error in mmc_sdio_init_card() (git-fixes).\n- mmc: sdio: Fix several potential memory leaks in mmc_sdio_init_card() (git-fixes).\n- mmc: tmio: Further fixup runtime PM management at remove (git-fixes).\n- mmc: uniphier-sd: call devm_request_irq() after tmio_mmc_host_probe() (git-fixes).\n- mmc: via-sdmmc: Respect the cmd-\u003ebusy_timeout from the mmc core (git-fixes).\n- mm: do not prepare anon_vma if vma has VM_WIPEONFORK (bsc#1169681).\n- mm: fix NUMA node file count error in replace_page_cache() (bsc#1173844).\n- mm: memcontrol: fix memory.low proportional distribution (bsc#1168230).\n- mm/memory_hotplug: refrain from adding memory into an impossible node (bsc#1173552).\n- mm/memremap: drop unused SECTION_SIZE and SECTION_MASK (bsc#1162400 bsc#1170895 ltc#184375 ltc#185686).\n- mm/memremap_pages: Introduce memremap_compat_align() (bsc#1162400).\n- mm/memremap_pages: Kill unused __devm_memremap_pages() (bsc#1162400).\n- mm/mmap.c: close race between munmap() and expand_upwards()/downwards() (bsc#1174527).\n- mm/util.c: make vm_memory_committed() more accurate (bnc#1173271).\n- move unsortable patch out of sorted section patches.suse/revert-zram-convert-remaining-class_attr-to-class_attr_ro\n- mt76: mt76x02u: Add support for newer versions of the XBox One wifi adapter (git-fixes).\n- mtd: Fix mtd not registered due to nvmem name collision (git-fixes).\n- mtd: rawnand: brcmnand: correctly verify erased pages (git-fixes).\n- mtd: rawnand: brcmnand: fix CS0 layout (git-fixes).\n- mtd: rawnand: brcmnand: fix hamming oob layout (git-fixes).\n- mtd: rawnand: diskonchip: Fix the probe error path (git-fixes).\n- mtd: rawnand: Fix nand_gpio_waitrdy() (git-fixes).\n- mtd: rawnand: ingenic: Fix the probe error path (git-fixes).\n- mtd: rawnand: marvell: Fix probe error path (git-fixes).\n- mtd: rawnand: marvell: Fix the condition on a return code (git-fixes).\n- mtd: rawnand: marvell: Use nand_cleanup() when the device is not yet registered (git-fixes).\n- mtd: rawnand: mtk: Fix the probe error path (git-fixes).\n- mtd: rawnand: onfi: Fix redundancy detection check (git-fixes).\n- mtd: rawnand: orion: Fix the probe error path (git-fixes).\n- mtd: rawnand: oxnas: Keep track of registered devices (git-fixes).\n- mtd: rawnand: oxnas: Release all devices in the _remove() path (git-fixes).\n- mtd: rawnand: pasemi: Fix the probe error path (git-fixes).\n- mtd: rawnand: plat_nand: Fix the probe error path (git-fixes).\n- mtd: rawnand: sharpsl: Fix the probe error path (git-fixes).\n- mtd: rawnand: socrates: Fix the probe error path (git-fixes).\n- mtd: rawnand: sunxi: Fix the probe error path (git-fixes).\n- mtd: rawnand: timings: Fix default tR_max and tCCS_min timings (git-fixes).\n- mtd: rawnand: tmio: Fix the probe error path (git-fixes).\n- mtd: rawnand: xway: Fix the probe error path (git-fixes).\n- mtd: spinand: Propagate ECC information to the MTD structure (git-fixes).\n- mtd: spi-nor: intel-spi: Add support for Intel Tiger Lake SPI serial flash (jsc#SLE-12737).\n- mvpp2: remove module bugfix (bsc#1154353).\n- mwifiex: avoid -Wstringop-overflow warning (git-fixes).\n- mwifiex: Fix memory corruption in dump_station (git-fixes).\n- namei: only return -ECHILD from follow_dotdot_rcu() (bsc#1173824).\n- nbd: Fix memory leak in nbd_add_socket (git-fixes).\n- neigh: send protocol value in neighbor create notification (networking-stable-20_05_12).\n- net: bcmgenet: correct per TX/RX ring statistics (networking-stable-20_04_27).\n- net: be more gentle about silly gso requests coming from user (networking-stable-20_06_07).\n- net: check untrusted gso_size at kernel entry (networking-stable-20_06_07).\n- net: core: device_rename: Use rwsem instead of a seqcount (bsc#1162702).\n- net: do not return invalid table id error when we fall back to PF_UNSPEC (networking-stable-20_05_27).\n- net: dsa: b53: b53_arl_rw_op() needs to select IVL or SVL (networking-stable-20_04_27).\n- net: dsa: b53: Fix ARL register definitions (networking-stable-20_04_27).\n- net: dsa: b53: Lookup VID in ARL searches when VLAN is enabled (networking-stable-20_04_27).\n- net: dsa: b53: Rework ARL bin logic (networking-stable-20_04_27).\n- net: dsa: bcm_sf2: Fix node reference count (git-fixes).\n- net: dsa: declare lockless TX feature for slave ports (bsc#1154353).\n- net: dsa: Do not leave DSA master with NULL netdev_ops (networking-stable-20_05_12).\n- net: dsa: loop: Add module soft dependency (networking-stable-20_05_16).\n- net: dsa: mt7530: fix roaming from DSA user ports (networking-stable-20_05_27).\n- net: dsa: mt7530: fix tagged frames pass-through in VLAN-unaware mode (networking-stable-20_04_17).\n- net: ena: xdp: update napi budget for DROP and ABORTED (bsc#1154492).\n- net: ena: xdp: XDP_TX: fix memory leak (bsc#1154492).\n- net: ethernet: ti: cpsw: fix ASSERT_RTNL() warning during suspend (networking-stable-20_05_27).\n- net_failover: fixed rollback in net_failover_open() (networking-stable-20_06_10).\n- netfilter: connlabels: prefer static lock initialiser (git-fixes).\n- netfilter: ip6tables: Add a .pre_exit hook in all ip6table_foo.c (bsc#1171857).\n- netfilter: ip6tables: Split ip6t_unregister_table() into pre_exit and exit helpers (bsc#1171857).\n- netfilter: iptables: Add a .pre_exit hook in all iptable_foo.c (bsc#1171857).\n- netfilter: iptables: Split ipt_unregister_table() into pre_exit and exit helpers (bsc#1171857).\n- netfilter: nf_queue: enqueue skbs with NULL dst (git-fixes).\n- netfilter: nf_tables_offload: return EOPNOTSUPP if rule specifies no actions (git-fixes).\n- netfilter: nft_tproxy: Fix port selector on Big Endian (git-fixes).\n- netfilter: nft_tunnel: add the missing ERSPAN_VERSION nla_policy (git-fixes).\n- netfilter: not mark a spinlock as __read_mostly (git-fixes).\n- net: fix a potential recursive NETDEV_FEAT_CHANGE (networking-stable-20_05_16).\n- net: fsl/fman: treat all RGMII modes in memac_adjust_link() (bsc#1174398).\n- net: hns3: check reset pending after FLR prepare (bsc#1154353).\n- __netif_receive_skb_core: pass skb by reference (networking-stable-20_05_27).\n- net: inet_csk: Fix so_reuseport bind-address cache in tb-\u003efast* (networking-stable-20_05_27).\n- net: ipip: fix wrong address family in init error path (networking-stable-20_05_27).\n- net: ipv4: devinet: Fix crash when add/del multicast IP with autojoin (networking-stable-20_04_17).\n- net: ipv4: Fix wrong type conversion from hint to rt in ip_route_use_hint() (bsc#1154353).\n- net: ipv6: do not consider routes via gateways for anycast address check (networking-stable-20_04_17).\n- net: macb: call pm_runtime_put_sync on failure path (git-fixes).\n- net: macb: fix an issue about leak related system resources (networking-stable-20_05_12).\n- net: macsec: preserve ingress frame ordering (networking-stable-20_05_12).\n- net/mlx4_core: Fix use of ENOSPC around mlx4_counter_alloc() (networking-stable-20_05_12).\n- net/mlx4_en: avoid indirect call in TX completion (networking-stable-20_04_27).\n- net/mlx5: Add command entry handling completion (networking-stable-20_05_27).\n- net/mlx5: Disable reload while removing the device (jsc#SLE-8464).\n- net/mlx5: drain health workqueue in case of driver load error (networking-stable-20_06_16).\n- net/mlx5: DR, Fix freeing in dr_create_rc_qp() (jsc#SLE-8464).\n- net/mlx5e: Add missing release firmware call (networking-stable-20_04_17).\n- net/mlx5e: Fix CPU mapping after function reload to avoid aRFS RX crash (jsc#SLE-8464).\n- net/mlx5e: Fix inner tirs handling (networking-stable-20_05_27).\n- net/mlx5e: Fix pfnum in devlink port attribute (networking-stable-20_04_17).\n- net/mlx5e: Fix repeated XSK usage on one channel (networking-stable-20_06_16).\n- net/mlx5e: Fix stats update for matchall classifier (jsc#SLE-8464).\n- net/mlx5e: Fix VXLAN configuration restore after function reload (jsc#SLE-8464).\n- net/mlx5e: kTLS, Destroy key object after destroying the TIS (networking-stable-20_05_27).\n- net/mlx5e: replace EINVAL in mlx5e_flower_parse_meta() (jsc#SLE-8464).\n- net/mlx5e: Update netdev txq on completions during closure (networking-stable-20_05_27).\n- net/mlx5: Fix cleaning unmanaged flow tables (jsc#SLE-8464).\n- net/mlx5: Fix command entry leak in Internal Error State (networking-stable-20_05_12).\n- net/mlx5: Fix crash upon suspend/resume (bsc#1172365).\n- net/mlx5: Fix error flow in case of function_setup failure (networking-stable-20_05_27).\n- net/mlx5: Fix fatal error handling during device load (networking-stable-20_06_16).\n- net/mlx5: Fix forced completion access non initialized command entry (networking-stable-20_05_12).\n- net/mlx5: Fix frequent ioread PCI access during recovery (networking-stable-20_04_17).\n- net/mlx5: Fix memory leak in mlx5_events_init (networking-stable-20_05_27).\n- net: mvpp2: cls: Prevent buffer overflow in mvpp2_ethtool_cls_rule_del() (networking-stable-20_05_12).\n- net: mvpp2: fix RX hashing for non-10G ports (networking-stable-20_05_27).\n- net: mvpp2: prevent buffer overflow in mvpp22_rss_ctx() (networking-stable-20_05_12).\n- net: netrom: Fix potential nr_neigh refcnt leak in nr_add_node (networking-stable-20_04_27).\n- net: nlmsg_cancel() if put fails for nhmsg (networking-stable-20_05_27).\n- net: openvswitch: ovs_ct_exit to be done under ovs_lock (networking-stable-20_04_27).\n- net: phy: fix aneg restart in phy_ethtool_set_eee (networking-stable-20_05_16).\n- net: phy: propagate an error back to the callers of phy_sfp_probe (bsc#1154353).\n- net: phy: realtek: add support for configuring the RX delay on RTL8211F (bsc#1174398).\n- netprio_cgroup: Fix unlimited memory leak of v2 cgroups (networking-stable-20_05_16).\n- net: qrtr: Fix passing invalid reference to qrtr_local_enqueue() (networking-stable-20_05_27).\n- net: qrtr: send msgs from local of same id as broadcast (networking-stable-20_04_17).\n- net: revert default NAPI poll timeout to 2 jiffies (networking-stable-20_04_17).\n- net: revert \u0027net: get rid of an signed integer overflow in ip_idents_reserve()\u0027 (bnc#1158748 (network regression)).\n- net sched: fix reporting the first-time use timestamp (networking-stable-20_05_27).\n- net_sched: sch_skbprio: add message validation to skbprio_change() (networking-stable-20_05_12).\n- net/smc: fix restoring of fallback changes (git-fixes).\n- net/smc: tolerate future SMCD versions (bsc#1172543 LTC#186069).\n- net: stmmac: do not attach interface until resume finishes (bsc#1174072).\n- net: stmmac: dwc-qos: avoid clk and reset for acpi device (bsc#1174072).\n- net: stmmac: dwc-qos: use generic device api (bsc#1174072).\n- net: stmmac: enable timestamp snapshot for required PTP packets in dwmac v5.10a (networking-stable-20_06_07).\n- net: stmmac: fix num_por initialization (networking-stable-20_05_16).\n- net: stmmac: platform: fix probe for ACPI devices (bsc#1174072).\n- net: stricter validation of untrusted gso packets (networking-stable-20_05_12).\n- net: tc35815: Fix phydev supported/advertising mask (networking-stable-20_05_12).\n- net: tcp: fix rx timestamp behavior for tcp_recvmsg (networking-stable-20_05_16).\n- net/tls: fix encryption error checking (git-fixes).\n- net/tls: fix race condition causing kernel panic (networking-stable-20_05_27).\n- net/tls: Fix sk_psock refcnt leak in bpf_exec_tx_verdict() (networking-stable-20_05_12).\n- net/tls: Fix sk_psock refcnt leak when in tls_data_ready() (networking-stable-20_05_12).\n- net/tls: free record only on encryption error (git-fixes).\n- net: tun: record RX queue in skb before do_xdp_generic() (networking-stable-20_04_17).\n- net: usb: qmi_wwan: add support for DW5816e (networking-stable-20_05_12).\n- net: usb: qmi_wwan: add Telit LE910C1-EUX composition (networking-stable-20_06_07).\n- net: vmxnet3: fix possible buffer overflow caused by bad DMA value in vmxnet3_get_rss() (bsc#1172484).\n- net/x25: Fix x25_neigh refcnt leak when receiving frame (networking-stable-20_04_27).\n- nexthop: Fix attribute checking for groups (networking-stable-20_05_27).\n- NFC: st21nfca: add missed kfree_skb() in an error path (git-fixes).\n- nfp: abm: fix a memory leak bug (networking-stable-20_05_12).\n- nfp: abm: fix error return code in nfp_abm_vnic_alloc() (networking-stable-20_05_16).\n- nfp: flower: fix used time of merge flow statistics (networking-stable-20_06_07).\n- nfs: add minor version to nfs_server_key for fscache (bsc#1172467).\n- nfsd4: fix nfsdfs reference count loop (git-fixes).\n- nfsd4: make drc_slab global, not per-net (git-fixes).\n- nfsd: always check return value of find_any_file (bsc#1172208).\n- nfsd: apply umask on fs without ACL support (git-fixes).\n- nfsd: fix nfsdfs inode reference count leak (git-fixes).\n- NFS: Fix fscache super_cookie index_key from changing after umount (git-fixes).\n- NFS: Fix interrupted slots by sending a solo SEQUENCE operation (bsc#1174264).\n- nfs: fix NULL deference in nfs4_get_valid_delegation.\n- nfs: fscache: use timespec64 in inode auxdata (git-fixes).\n- nfs: set invalid blocks after NFSv4 writes (git-fixes).\n- NFSv4.1 fix rpc_call_done assignment for BIND_CONN_TO_SESSION (git-fixes).\n- NFSv4 fix CLOSE not waiting for direct IO compeletion (git-fixes).\n- NFSv4: Fix fscache cookie aux_data to ensure change_attr is included (git-fixes).\n- ntb: intel: add hw workaround for NTB BAR alignment (jsc#SLE-12710).\n- ntb: intel: Add Icelake (gen4) support for Intel NTB (jsc#SLE-12710).\n- ntb: intel: fix static declaration (jsc#SLE-12710).\n- nvdimm: Avoid race between probe and reading device attributes (bsc#1170442).\n- nvme-fc: avoid gcc-10 zero-length-bounds warning (bsc#1173206).\n- nvme-fc: do not call nvme_cleanup_cmd() for AENs (bsc#1171688).\n- nvme-fc: print proper nvme-fc devloss_tmo value (bsc#1172391).\n- objtool: Allow no-op CFI ops in alternatives (bsc#1169514).\n- objtool: Clean instruction state before each function validation (bsc#1169514).\n- objtool: Fix !CFI insn_state propagation (bsc#1169514).\n- objtool: Fix ORC vs alternatives (bsc#1169514).\n- objtool: Ignore empty alternatives (bsc#1169514).\n- objtool: Remove check preventing branches within alternative (bsc#1169514).\n- objtool: Rename struct cfi_state (bsc#1169514).\n- objtool: Uniquely identify alternative instruction groups (bsc#1169514).\n- ovl: inode reference leak in ovl_is_inuse true case (git-fixes).\n- p54usb: add AirVasT USB stick device-id (git-fixes).\n- padata: add separate cpuhp node for CPUHP_PADATA_DEAD (git-fixes).\n- padata: kABI fixup for struct padata_instance splitting nodes (git-fixes).\n- panic: do not print uninitialized taint_flags (bsc#1172814).\n- PCI: aardvark: Do not blindly enable ASPM L0s and do not write to read-only register (git-fixes).\n- PCI: Add ACS quirk for Intel Root Complex Integrated Endpoints (git-fixes).\n- PCI: Add Loongson vendor ID (git-fixes).\n- PCI/AER: Remove HEST/FIRMWARE_FIRST parsing for AER ownership (bsc#1174356).\n- PCI/AER: Use only _OSC to determine AER ownership (bsc#1174356).\n- PCI: Allow pci_resize_resource() for devices on root bus (git-fixes).\n- PCI: amlogic: meson: Do not use FAST_LINK_MODE to set up link (git-fixes).\n- PCI/ASPM: Allow ASPM on links to PCIe-to-PCI/PCI-X Bridges (git-fixes).\n- PCI: Avoid FLR for AMD Matisse HD Audio \u0026 USB 3.0 (git-fixes).\n- PCI: Avoid FLR for AMD Starship USB 3.0 (git-fixes).\n- PCI: brcmstb: Assert fundamental reset on initialization (git-fixes).\n- PCI: brcmstb: Assert fundamental reset on initialization (git-fixes).\n- PCI: brcmstb: Fix window register offset from 4 to 8 (git-fixes).\n- PCI: brcmstb: Fix window register offset from 4 to 8 (git-fixes).\n- PCI: Do not disable decoding when mmio_always_on is set (git-fixes).\n- PCI: dwc: Fix inner MSI IRQ domain registration (git-fixes).\n- PCI/EDR: Log only ACPI_NOTIFY_DISCONNECT_RECOVER events (bsc#1174513).\n- pcie: mobiveil: remove patchset v9 Prepare to backport upstream version.\n- PCI: Fix pci_register_host_bridge() device_register() error handling (git-fixes).\n- PCI: hv: Add support for protocol 1.3 and support PCI_BUS_RELATIONS2 (bsc#1172201).\n- PCI: hv: Change pci_protocol_version to per-hbus (bsc#1172871).\n- PCI: hv: Decouple the func definition in hv_dr_state from VSP message (bsc#1172871).\n- PCI: hv: Fix the PCI HyperV probe failure path to release resource properly (bsc#1172871).\n- PCI: hv: Introduce hv_msi_entry (bsc#1172871).\n- PCI: hv: Move hypercall related definitions into tlfs header (bsc#1172871).\n- PCI: hv: Move retarget related structures into tlfs header (bsc#1172871).\n- PCI: hv: Reorganize the code in preparation of hibernation (bsc#1172871).\n- PCI: hv: Retry PCI bus D0 entry on invalid device state (bsc#1172871).\n- PCI: mobiveil: Add 8-bit and 16-bit CSR register accessors (bsc#1161495).\n- PCI: mobiveil: Add callback function for interrupt initialization (bsc#1161495).\n- PCI: mobiveil: Add callback function for link up check (bsc#1161495).\n- PCI: mobiveil: Add Header Type field check (bsc#1161495).\n- PCI: mobiveil: Add PCIe Gen4 RC driver for Layerscape SoCs (bsc#1161495).\n- PCI: mobiveil: Allow mobiveil_host_init() to be used to re-init host (bsc#1161495).\n- PCI: mobiveil: Collect the interrupt related operations into a function (bsc#1161495).\n- PCI: mobiveil: Fix sparse different address space warnings (bsc#1161495).\n- PCI: mobiveil: Fix unmet dependency warning for PCIE_MOBIVEIL_PLAT (bsc#1161495).\n- PCI: mobiveil: Introduce a new structure mobiveil_root_port (bsc#1161495).\n- PCI: mobiveil: ls_pcie_g4: add Workaround for A-011451 (bsc#1161495).\n- PCI: mobiveil: ls_pcie_g4: add Workaround for A-011577 (bsc#1161495).\n- PCI: mobiveil: ls_pcie_g4: fix SError when accessing config space (bsc#1161495).\n- PCI: mobiveil: Modularize the Mobiveil PCIe Host Bridge IP driver (bsc#1161495).\n- PCI: mobiveil: Move the host initialization into a function (bsc#1161495).\n- PCI: pci-bridge-emul: Fix PCIe bit conflicts (git-fixes).\n- PCI/PM: Adjust pcie_wait_for_link_delay() for caller delay (git-fixes).\n- PCI/PM: Call .bridge_d3() hook only if non-NULL (git-fixes).\n- PCI: Program MPS for RCiEP devices (git-fixes).\n- PCI/PTM: Inherit Switch Downstream Port PTM settings from Upstream Port (git-fixes).\n- PCI: rcar: Fix incorrect programming of OB windows (git-fixes).\n- pci: Revive pci_dev __aer_firmware_first* fields for kABI (bsc#1174356).\n- PCI: v3-semi: Fix a memory leak in v3_pci_probe() error handling paths (git-fixes).\n- PCI: vmd: Add device id for VMD device 8086:9A0B (git-fixes).\n- PCI: vmd: Filter resource type bits from shadow register (git-fixes).\n- pcm_native: result of put_user() needs to be checked (git-fixes).\n- percpu: Separate decrypted varaibles anytime encryption can be enabled (bsc#1174332).\n- perf/core: Fix endless multiplex timer (git-fixes).\n- perf/core: fix parent pid/tid in task exit events (git-fixes).\n- pinctrl: freescale: imx: Fix an error handling path in \u0027imx_pinctrl_probe()\u0027 (git-fixes).\n- pinctrl: freescale: imx: Use \u0027devm_of_iomap()\u0027 to avoid a resource leak in case of error in \u0027imx_pinctrl_probe()\u0027 (git-fixes).\n- pinctrl: imxl: Fix an error handling path in \u0027imx1_pinctrl_core_probe()\u0027 (git-fixes).\n- pinctrl: intel: Add Intel Tiger Lake pin controller support (jsc#SLE-12737).\n- pinctrl: ocelot: Fix GPIO interrupt decoding on Jaguar2 (git-fixes).\n- pinctrl: rockchip: fix memleak in rockchip_dt_node_to_map (git-fixes).\n- pinctrl: rza1: Fix wrong array assignment of rza1l_swio_entries (git-fixes).\n- pinctrl: samsung: Correct setting of eint wakeup mask on s5pv210 (git-fixes).\n- pinctrl: samsung: Save/restore eint_mask over suspend for EINT_TYPE GPIOs (git-fixes).\n- pinctrl: sprd: Fix the incorrect pull-up definition (git-fixes).\n- pinctrl: stmfx: stmfx_pinconf_set does not require to get direction anymore (git-fixes).\n- pinctrl: tegra: Use noirq suspend/resume callbacks (git-fixes).\n- pinctrl: tigerlake: Tiger Lake uses _HID enumeration (jsc#SLE-12737).\n- platform/x86: asus-nb-wmi: Do not load on Asus T100TA and T200TA (git-fixes).\n- platform/x86: asus_wmi: Reserve more space for struct bias_args (git-fixes).\n- platform/x86: dell-laptop: do not register micmute LED if there is no token (git-fixes).\n- platform/x86: hp-wmi: Convert simple_strtoul() to kstrtou32() (git-fixes).\n- platform/x86: intel-hid: Add a quirk to support HP Spectre X2 (2015) (git-fixes).\n- platform/x86: intel-vbtn: Also handle tablet-mode switch on \u0027Detachable\u0027 and \u0027Portable\u0027 chassis-types (git-fixes).\n- platform/x86: intel-vbtn: Do not advertise switches to userspace if they are not there (git-fixes).\n- platform/x86: intel-vbtn: Only blacklist SW_TABLET_MODE on the 9 / \u0027Laptop\u0027 chasis-type (git-fixes).\n- platform/x86: intel-vbtn: Split keymap into buttons and switches parts (git-fixes).\n- platform/x86: intel-vbtn: Use acpi_evaluate_integer() (git-fixes).\n- platform/x86: ISST: Increase timeout (bsc#1174185).\n- PM: runtime: clk: Fix clk_pm_runtime_get() error path (git-fixes).\n- pNFS/flexfiles: Fix list corruption if the mirror count changes (git-fixes).\n- pnp: Use list_for_each_entry() instead of open coding (git-fixes).\n- powerpc/64s: Do not let DT CPU features set FSCR_DSCR (bsc#1065729).\n- powerpc/64s/exception: Fix machine check no-loss idle wakeup (bsc#1156395).\n- powerpc/64s/kuap: Restore AMR in system reset exception (bsc#1156395).\n- powerpc/64s: Save FSCR to init_task.thread.fscr after feature init (bsc#1065729).\n- powerpc/book3s64: Export has_transparent_hugepage() related functions (bsc#1171759).\n- powerpc/book3s64/pkeys: Fix pkey_access_permitted() for execute disable pkey (bsc#1065729).\n- powerpc/bpf: Enable bpf_probe_read{, str}() on powerpc again (bsc#1172344).\n- powerpc/fadump: Account for memory_limit while reserving memory (jsc#SLE-9099 git-fixes).\n- powerpc/fadump: consider reserved ranges while reserving memory (jsc#SLE-9099 git-fixes).\n- powerpc/fadump: fix race between pstore write and fadump crash trigger (bsc#1168959 ltc#185010).\n- powerpc/fadump: use static allocation for reserved memory ranges (jsc#SLE-9099 git-fixes).\n- powerpc/kasan: Fix issues by lowering KASAN_SHADOW_END (git-fixes).\n- powerpc/kuap: PPC_KUAP_DEBUG should depend on PPC_KUAP (bsc#1156395).\n- powerpc/powernv: Fix a warning message (bsc#1156395).\n- powerpc/setup_64: Set cache-line-size based on cache-block-size (bsc#1065729).\n- powerpc/xive: Clear the page tables for the ESB IO mapping (bsc#1085030).\n- powerpc/xmon: Reset RCU and soft lockup watchdogs (bsc#1065729).\n- power: reset: qcom-pon: reg write mask depends on pon generation (git-fixes).\n- power: supply: bq24257_charger: Replace depends on REGMAP_I2C with select (git-fixes).\n- power: supply: core: fix HWMON temperature labels (git-fixes).\n- power: supply: core: fix memory leak in HWMON error path (git-fixes).\n- power: supply: lp8788: Fix an error handling path in \u0027lp8788_charger_probe()\u0027 (git-fixes).\n- power: supply: smb347-charger: IRQSTAT_D is volatile (git-fixes).\n- pppoe: only process PADT targeted at local interfaces (networking-stable-20_05_16).\n- printk: queue wake_up_klogd irq_work only if per-CPU areas are ready (bsc#1172095).\n- proc/meminfo: avoid open coded reading of vm_committed_as (bnc#1173271).\n- proc: Use new_inode not new_inode_pseudo (bsc#1173830).\n- pwm: img: Call pm_runtime_put() in pm_runtime_get_sync() failed case (git-fixes).\n- pwm: sun4i: Move pwm_calculate() out of spin_lock() (git-fixes).\n- r8152: support additional Microsoft Surface Ethernet Adapter variant (git-fixes).\n- r8169: Revive default chip version for r8168 (bsc#1173085).\n- raid5: remove gfp flags from scribble_alloc() (bsc#1166985).\n- random: fix data races at timer_rand_state (bsc#1173438).\n- rcu: Avoid data-race in rcu_gp_fqs_check_wake() (bsc#1171828).\n- rcu: Fix data-race due to atomic_t copy-by-value (bsc#1171828).\n- rcu: Make rcu_read_unlock_special() checks match raise_softirq_irqoff() (bsc#1172046).\n- rcu: Simplify rcu_read_unlock_special() deferred wakeups (bsc#1172046).\n- rcutorture: Add 100-CPU configuration (bsc#1173068).\n- rcutorture: Add worst-case call_rcu() forward-progress results (bsc#1173068).\n- rcutorture: Dispense with Dracut for initrd creation (bsc#1173068).\n- rcutorture: Make kvm-find-errors.sh abort on bad directory (bsc#1173068).\n- rcutorture: Remove CONFIG_HOTPLUG_CPU=n from scenarios (bsc#1173068).\n- rcutorture: Summarize summary of build and run results (bsc#1173068).\n- rcutorture: Test TREE03 with the threadirqs kernel boot parameter (bsc#1173068).\n- rcu: Use *_ONCE() to protect lockless -\u003eexpmask accesses (bsc#1171828).\n- rcu: Use WRITE_ONCE() for assignments to -\u003epprev for hlist_nulls (bsc#1173438).\n- RDMA/bnxt_re: Remove dead code from rcfw (bsc#1170774).\n- RDMA/core: Check that type_attrs is not NULL prior access (jsc#SLE-8449).\n- RDMA/core: Move and rename trace_cm_id_create() (jsc#SLE-8449).\n- RDMA/mlx5: Fix NULL pointer dereference in destroy_prefetch_work (jsc#SLE-8446).\n- RDMA/nl: Do not permit empty devices names during RDMA_NLDEV_CMD_NEWLINK/SET (bsc#1172841).\n- RDMA/srpt: Fix disabling device management (jsc#SLE-8449).\n- RDMA/uverbs: Make the event_queue fds return POLLERR when disassociated (jsc#SLE-8449).\n- regmap: debugfs: Do not sleep while atomic for fast_io regmaps (git-fixes).\n- regmap: fix alignment issue (git-fixes).\n- regmap: Fix memory leak from regmap_register_patch (git-fixes).\n- regualtor: pfuze100: correct sw1a/sw2 on pfuze3000 (git-fixes).\n- remoteproc: Add missing \u0027\\n\u0027 in log messages (git-fixes).\n- remoteproc: Fall back to using parent memory pool if no dedicated available (git-fixes).\n- remoteproc: Fix and restore the parenting hierarchy for vdev (git-fixes).\n- remoteproc: Fix IDR initialisation in rproc_alloc() (git-fixes).\n- remoteproc: qcom_q6v5_mss: map/unmap mpss segments before/after use (git-fixes).\n- Revert commit e918e570415c (\u0027tpm_tis: Remove the HID IFX0102\u0027) (git-fixes).\n- Revert \u0027drm/amd/display: disable dcn20 abm feature for bring up\u0027 (git-fixes).\n- Revert \u0027i2c: tegra: Fix suspending in active runtime PM state\u0027 (git-fixes).\n- Revert \u0027pinctrl: freescale: imx: Use \u0027devm_of_iomap()\u0027 to avoid a resource leak in case of error in \u0027imx_pinctrl_probe()\u0027\u0027 (git-fixes).\n- Revert \u0027thermal: mediatek: fix register index error\u0027 (git-fixes).\n- ring-buffer: Zero out time extend if it is nested and not absolute (git-fixes).\n- rpm: drop execute permissions on source files Sometimes a source file with execute permission appears in upstream repository and makes it into our kernel-source packages. This is caught by OBS build checks and may even result in build failures. Sanitize the source tree by removing execute permissions from all C source and header files.\n- rpm/modules.fips: add aes-ce-ccm, des3_ede-x86_64, aes_ti and aes_neon_bs \n- rtc: mc13xxx: fix a double-unlock issue (git-fixes).\n- rtc: rv3028: Add missed check for devm_regmap_init_i2c() (git-fixes).\n- rtlwifi: Fix a double free in _rtl_usb_tx_urb_setup() (git-fixes).\n- rtw88: fix an issue about leak system resources (git-fixes).\n- rxrpc: Fix call RCU cleanup using non-bh-safe locks (git-fixes).\n- s390/bpf: Maintain 8-byte stack alignment (bsc#1169194, LTC#185911).\n- s390: fix syscall_get_error for compat processes (git-fixes).\n- s390/ism: fix error return code in ism_probe() (git-fixes).\n- s390/kaslr: add support for R_390_JMP_SLOT relocation type (git-fixes).\n- s390/pci: Fix s390_mmio_read/write with MIO (git-fixes).\n- s390/pci: Log new handle in clp_disable_fh() (git-fixes).\n- s390/qdio: consistently restore the IRQ handler (git-fixes).\n- s390/qdio: put thinint indicator after early error (git-fixes).\n- s390/qdio: tear down thinint indicator after early error (git-fixes).\n- s390/qeth: fix error handling for isolation mode cmds (git-fixes).\n- sata_rcar: handle pm_runtime_get_sync failure cases (git-fixes).\n- sch_choke: avoid potential panic in choke_reset() (networking-stable-20_05_12).\n- sched/cfs: change initial value of runnable_avg (bsc#1158765).\n- sched/core: Check cpus_mask, not cpus_ptr in __set_cpus_allowed_ptr(), to fix mask corruption (bnc#1155798 (CPU scheduler functional and performance backports)).\n- sched/core: Fix PI boosting between RT and DEADLINE tasks (bsc#1172823).\n- sched/core: Fix PI boosting between RT and DEADLINE tasks (git fixes (sched)).\n- sched/core: Fix ttwu() race (bnc#1155798 (CPU scheduler functional and performance backports)).\n- sched/core: s/WF_ON_RQ/WQ_ON_CPU/ (bnc#1155798 (CPU scheduler functional and performance backports)).\n- sched/cpuacct: Fix charge cpuacct.usage_sys (bnc#1155798 (CPU scheduler functional and performance backports)).\n- sched/deadline: Initialize -\u003edl_boosted (bsc#1172823).\n- sched/deadline: Initialize -\u003edl_boosted (git fixes (sched)).\n- sched: etf: do not assume all sockets are full blown (networking-stable-20_04_27).\n- sched/fair: find_idlest_group(): Remove unused sd_flag parameter (bnc#1155798 (CPU scheduler functional and performance backports)).\n- sched/fair: Fix enqueue_task_fair() warning some more (bnc#1155798 (CPU scheduler functional and performance backports)).\n- sched/fair: fix nohz next idle balance (bnc#1155798 (CPU scheduler functional and performance backports)).\n- sched/fair: handle case of task_h_load() returning 0 (bnc#1155798 (CPU scheduler functional and performance backports)).\n- sched/fair: Optimize dequeue_task_fair() (bnc#1155798 (CPU scheduler functional and performance backports)).\n- sched/fair: Optimize enqueue_task_fair() (bnc#1155798 (CPU scheduler functional and performance backports)).\n- sched/fair: Simplify the code of should_we_balance() (bnc#1155798 (CPU scheduler functional and performance backports)).\n- sched: Fix loadavg accounting race (bnc#1155798 (CPU scheduler functional and performance backports)).\n- sched: Fix race against ptrace_freeze_trace() (bsc#1174345).\n- sched: Make newidle_balance() static again (bnc#1155798 (CPU scheduler functional and performance backports)).\n- sched: Offload wakee task activation if it the wakee is descheduling (bnc#1158748, bnc#1159781).\n- sched: Optimize ttwu() spinning on p-\u003eon_cpu (bnc#1158748, bnc#1159781).\n- sched/pelt: Sync util/runnable_sum with PELT window when propagating (bnc#1155798 (CPU scheduler functional and performance backports)).\n- sch_sfq: validate silly quantum values (networking-stable-20_05_12).\n- scripts/decodecode: fix trapping instruction formatting (bsc#1065729).\n- scsi: ibmvscsi: Do not send host info in adapter info MAD after LPM (bsc#1172759 ltc#184814).\n- scsi: libfc: free response frame from GPN_ID (bsc#1173849).\n- scsi: libfc: Handling of extra kref (bsc#1173849).\n- scsi: libfc: If PRLI rejected, move rport to PLOGI state (bsc#1173849).\n- scsi: libfc: rport state move to PLOGI if all PRLI retry exhausted (bsc#1173849).\n- scsi: libfc: Skip additional kref updating work event (bsc#1173849).\n- scsi: lpfc: Add an internal trace log buffer (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Add blk_io_poll support for latency improvment (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Add support to display if adapter dumps are available (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Allow applications to issue Common Set Features mailbox command (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Change default queue allocation for reduced memory consumption (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n- scsi: lpfc: fix build failure with DEBUGFS disabled (bsc#1171530).\n- scsi: lpfc: Fix incomplete NVME discovery when target (bsc#1171530).\n- scsi: lpfc: Fix inconsistent indenting (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix interrupt assignments when multiple vectors are supported on same CPU (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix kdump hang on PPC (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix language in 0373 message to reflect non-error message (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix less-than-zero comparison of unsigned value (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix lpfc_nodelist leak when processing unsolicited event (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n- scsi: lpfc: Fix MDS Diagnostic Enablement definition (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n- scsi: lpfc: Fix memory leak on lpfc_bsg_write_ebuf_set func (bsc#1171530).\n- scsi: lpfc: Fix missing MDS functionality (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix negation of else clause in lpfc_prep_node_fc4type (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n- scsi: lpfc: Fix noderef and address space warnings (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n- scsi: lpfc: Fix NVMe rport deregister and registration during ADISC (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix oops due to overrun when reading SLI3 data (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix shost refcount mismatch when deleting vport (bsc#1172687 bsc#1171530).\n- scsi: lpfc: fix spelling mistakes of asynchronous (bsc#1171530).\n- scsi: lpfc: Fix stack trace seen while setting rrq active (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix unused assignment in lpfc_sli4_bsg_link_diag_test (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Maintain atomic consistency of queue_claimed flag (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n- scsi: lpfc: Make lpfc_defer_acc_rsp static (bsc#1171530).\n- scsi: lpfc: remove duplicate unloading checks (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n- scsi: lpfc: Remove re-binding of nvme rport during registration (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n- scsi: lpfc: Remove redundant initialization to variable rc (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n- scsi: lpfc: Remove unnecessary lockdep_assert_held calls (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n- scsi: lpfc: Update lpfc version to 12.8.0.1 (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n- scsi: lpfc: Update lpfc version to 12.8.0.2 (bsc#1172687 bsc#1171530).\n- scsi: megaraid_sas: Replace undefined MFI_BIG_ENDIAN macro with __BIG_ENDIAN_BITFIELD macro (bsc#1173206).\n- scsi: qla2xxx: Delete all sessions before unregister local nvme port (jsc#SLE-9714 jsc#SLE-10327 jsc#SLE-10334 bsc#1157169).\n- scsi: qla2xxx: Do not log message when reading port speed via sysfs (jsc#SLE-9714 jsc#SLE-10327 jsc#SLE-10334 bsc#1157169).\n- scsi: qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV (jsc#SLE-9714 jsc#SLE-10327 jsc#SLE-10334 bsc#1157169).\n- scsi: qla2xxx: Set NVMe status code for failed NVMe FCP request (bsc#1158983).\n- scsi: sd_zbc: Fix sd_zbc_complete() (bsc#1173206).\n- scsi: smartpqi: Update attribute name to `driver_version` (bsc#1173206).\n- scsi: ufs-bsg: Fix runtime PM imbalance on error (git-fixes).\n- scsi: zfcp: add diagnostics buffer for exchange config data (bsc#1158050).\n- scsi: zfcp: auto variables for dereferenced structs in open port handler (bsc#1158050).\n- scsi: zfcp: diagnostics buffer caching and use for exchange port data (bsc#1158050).\n- scsi: zfcp: enhance handling of FC Endpoint Security errors (bsc#1158050).\n- scsi: zfcp: expose fabric name as common fc_host sysfs attribute (bsc#1158050).\n- scsi: zfcp: Fence adapter status propagation for common statuses (bsc#1158050).\n- scsi: zfcp: Fence early sysfs interfaces for accesses of shost objects (bsc#1158050).\n- scsi: zfcp: Fence fc_host updates during link-down handling (bsc#1158050).\n- scsi: zfcp: fix fc_host attributes that should be unknown on local link down (bsc#1158050).\n- scsi: zfcp: Fix panic on ERP timeout for previously dismissed ERP action (git-fixes).\n- scsi: zfcp: fix wrong data and display format of SFP+ temperature (bsc#1158050).\n- scsi: zfcp: implicitly refresh config-data diagnostics when reading sysfs (bsc#1158050).\n- scsi: zfcp: implicitly refresh port-data diagnostics when reading sysfs (bsc#1158050).\n- scsi: zfcp: introduce sysfs interface for diagnostics of local SFP transceiver (bsc#1158050).\n- scsi: zfcp: introduce sysfs interface to read the local B2B-Credit (bsc#1158050).\n- scsi: zfcp: log FC Endpoint Security errors (bsc#1158050).\n- scsi: zfcp: log FC Endpoint Security of connections (bsc#1158050).\n- scsi: zfcp: Move allocation of the shost object to after xconf- and xport-data (bsc#1158050).\n- scsi: zfcp: Move fc_host updates during xport data handling into fenced function (bsc#1158050).\n- scsi: zfcp: move maximum age of diagnostic buffers into a per-adapter variable (bsc#1158050).\n- scsi: zfcp: Move p-t-p port allocation to after xport data (bsc#1158050).\n- scsi: zfcp: Move shost modification after QDIO (re-)open into fenced function (bsc#1158050).\n- scsi: zfcp: Move shost updates during xconfig data handling into fenced function (bsc#1158050).\n- scsi: zfcp: proper indentation to reduce confusion in zfcp_erp_required_act (bsc#1158050).\n- scsi: zfcp: report FC Endpoint Security in sysfs (bsc#1158050).\n- scsi: zfcp: signal incomplete or error for sync exchange config/port data (bsc#1158050).\n- scsi: zfcp: support retrieval of SFP Data via Exchange Port Data (bsc#1158050).\n- scsi: zfcp: trace FC Endpoint Security of FCP devices and connections (bsc#1158050).\n- scsi: zfcp: wire previously driver-specific sysfs attributes also to fc_host (bsc#1158050).\n- sctp: Do not add the shutdown timer if its already been added (networking-stable-20_05_27).\n- sctp: Start shutdown on association restart if in SHUTDOWN-SENT state and socket is closed (networking-stable-20_05_27).\n- selftests/bpf: CONFIG_IPV6_SEG6_BPF required for test_seg6_loop.o (bsc#1155518).\n- selftests/bpf: CONFIG_LIRC required for test_lirc_mode2.sh (bsc#1155518).\n- selftests/bpf: Fix invalid memory reads in core_relo selftest (bsc#1155518).\n- selftests/bpf: Fix memory leak in extract_build_id() (bsc#1155518).\n- selftests/bpf, flow_dissector: Close TAP device FD after the test (bsc#1155518).\n- selftests/bpf: Make sure optvals \u003e PAGE_SIZE are bypassed (bsc#1155518).\n- selftests/net: in rxtimestamp getopt_long needs terminating null entry (networking-stable-20_06_16).\n- selftests/timens: handle a case when alarm clocks are not supported (bsc#1164648,jsc#SLE-11493).\n- selinux: fall back to ref-walk if audit is required (bsc#1174333).\n- selinux: revert \u0027stop passing MAY_NOT_BLOCK to the AVC upon follow_link\u0027 (bsc#1174333).\n- serial: 8250: Fix max baud limit in generic 8250 port (git-fixes).\n- serial: 8250_tegra: Create Tegra specific 8250 driver (bsc#1173941).\n- signal: Avoid corrupting si_pid and si_uid in do_notify_parent (bsc#1171529).\n- slimbus: core: Fix mismatch in of_node_get/put (git-fixes).\n- slimbus: ngd: get drvdata from correct device (git-fixes).\n- SMB3: Honor lease disabling for multiuser mounts (git-fixes).\n- socionext: account for napi_gro_receive never returning GRO_DROP (bsc#1154353).\n- soc: mediatek: cmdq: return send msg error code (git-fixes).\n- soc: qcom: rpmh: Dirt can only make you dirtier, not cleaner (git-fixes).\n- soc: qcom: rpmh: Invalidate SLEEP and WAKE TCSes before flushing new data (git-fixes).\n- soc: qcom: rpmh-rsc: Allow using free WAKE TCS for active request (git-fixes).\n- soc: qcom: rpmh-rsc: Clear active mode configuration for wake TCS (git-fixes).\n- soc: qcom: rpmh: Update dirty flag only when data changes (git-fixes).\n- soc/tegra: pmc: Select GENERIC_PINCONF (git-fixes).\n- soundwire: intel: fix memory leak with devm_kasprintf (git-fixes).\n- spi: bcm2835aux: Fix controller unregister order (git-fixes).\n- spi: bcm2835: Fix controller unregister order (git-fixes).\n- spi: bcm-qspi: Handle clock probe deferral (git-fixes).\n- spi: bcm-qspi: when tx/rx buffer is NULL set to 0 (git-fixes).\n- SPI: designware: pci: Switch over to MSI interrupts (jsc#SLE-12735).\n- spi: dt-bindings: spi-controller: Fix #address-cells for slave mode (git-fixes).\n- spi: dw: Add SPI Rx-done wait method to DMA-based transfer (git-fixes).\n- spi: dw: Add SPI Tx-done wait method to DMA-based transfer (git-fixes).\n- spi: dw: Enable interrupts in accordance with DMA xfer mode (git-fixes).\n- spi: dw: Fix controller unregister order (git-fixes).\n- spi: dw: Fix native CS being unset (git-fixes).\n- spi: dw: Fix Rx-only DMA transfers (git-fixes).\n- spi: dw-pci: Add MODULE_DEVICE_TABLE (jsc#SLE-12735).\n- spi: dw-pci: Add runtime power management support (jsc#SLE-12735).\n- spi: dw-pci: Add support for Intel Elkhart Lake PSE SPI (jsc#SLE-12735).\n- spi: dw-pci: Fix Chip Select amount on Intel Elkhart Lake PSE SPI (jsc#SLE-12735).\n- spi: dw: Return any value retrieved from the dma_transfer callback (git-fixes).\n- spi: dw: use \u0027smp_mb()\u0027 to avoid sending spi data error (git-fixes).\n- spi: dw: Zero DMA Tx and Rx configurations on stack (git-fixes).\n- spi: Fix controller unregister order (git-fixes).\n- spi: fsl: do not map irq during probe (git-fixes).\n- spi: fsl: use platform_get_irq() instead of of_irq_to_resource() (git-fixes).\n- spi: pxa2xx: Apply CS clk quirk to BXT (git-fixes).\n- spi: pxa2xx: Fix controller unregister order (git-fixes).\n- spi: pxa2xx: Fix runtime PM ref imbalance on probe error (git-fixes).\n- spi: Respect DataBitLength field of SpiSerialBusV2() ACPI resource (git-fixes).\n- spi: spidev: fix a potential use-after-free in spidev_release() (git-fixes).\n- spi: spidev: fix a race between spidev_release and spidev_remove (git-fixes).\n- spi: spi-fsl-dspi: Change usage pattern of SPI_MCR_* and SPI_CTAR_* macros (git-fixes).\n- spi: spi-fsl-dspi: Do not access reserved fields in SPI_MCR (git-fixes).\n- spi: spi-fsl-dspi: Fix 16-bit word order in 32-bit XSPI mode (git-fixes).\n- spi: spi-fsl-dspi: Replace interruptible wait queue with a simple completion (git-fixes).\n- spi: spi-mem: Fix Dual/Quad modes on Octal-capable devices (git-fixes).\n- spi: spi-sun6i: sun6i_spi_transfer_one(): fix setting of clock rate (git-fixes).\n- spi: sprd: switch the sequence of setting WDG_LOAD_LOW and _HIGH (git-fixes).\n- staging: comedi: verify array index is correct before using it (git-fixes).\n- staging: iio: ad2s1210: Fix SPI reading (git-fixes).\n- staging: kpc2000: fix error return code in kp2000_pcie_probe() (git-fixes).\n- staging: rtl8712: Fix IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK (git-fixes).\n- Staging: rtl8723bs: prevent buffer overflow in update_sta_support_rate() (git-fixes).\n- staging: sm750fb: add missing case while setting FB_VISUAL (git-fixes).\n- sun6i: dsi: fix gcc-4.8 (bsc#1152489)\n- SUNRPC dont update timeout value on connection reset (bsc#1174263).\n- sunrpc: fixed rollback in rpc_gssd_dummy_populate() (git-fixes).\n- sunrpc: Fix gss_unwrap_resp_integ() again (bsc#1174116).\n- SUNRPC: Properly set the @subbuf parameter of xdr_buf_subsegment() (git-fixes).\n- SUNRPC: Signalled ASYNC tasks need to exit (git-fixes).\n- supported.conf: Add pinctrl-tigerlake as supported\n- supported.conf: Mark two hwtracing helper modules as externally supported (bsc#1170879)\n- svcrdma: Fix leak of svc_rdma_recv_ctxt objects (git-fixes).\n- tcp: cache line align MAX_TCP_HEADER (networking-stable-20_04_27).\n- tcp: fix error recovery in tcp_zerocopy_receive() (networking-stable-20_05_16).\n- tcp: fix SO_RCVLOWAT hangs with fat skbs (networking-stable-20_05_16).\n- tcp: md5: allow changing MD5 keys in all socket states (git-fixes).\n- team: fix hang in team_mode_get() (networking-stable-20_04_27).\n- tg3: driver sleeps indefinitely when EEH errors exceed eeh_max_freezes (bsc#1173284).\n- thermal/drivers: imx: Fix missing of_node_put() at probe time (git-fixes).\n- thermal/drivers/mediatek: Fix bank number settings on mt8183 (git-fixes).\n- thermal/drivers/rcar_gen3: Fix undefined temperature if negative (git-fixes).\n- thermal/drivers/ti-soc-thermal: Avoid dereferencing ERR_PTR (git-fixes).\n- thermal: int3403_thermal: Downgrade error message (git-fixes).\n- thermal: intel: intel_pch_thermal: Add Comet Lake (CML) platform support (jsc#SLE-12668).\n- tick/sched: Annotate lockless access to last_jiffies_update (bsc#1173438).\n- timer: Use hlist_unhashed_lockless() in timer_pending() (bsc#1173438).\n- tipc: block BH before using dst_cache (networking-stable-20_05_27).\n- tipc: fix partial topology connection closure (networking-stable-20_05_12).\n- torture: Allow \u0027CFLIST\u0027 to specify default list of scenarios (bsc#1173068).\n- torture: Expand last_ts variable in kvm-test-1-run.sh (bsc#1173068).\n- torture: Handle jitter for CPUs that cannot be offlined (bsc#1173068).\n- torture: Handle systems lacking the mpstat command (bsc#1173068).\n- torture: Hoist calls to lscpu to higher-level kvm.sh script (bsc#1173068).\n- torture: Make results-directory date format completion-friendly (bsc#1173068).\n- torture: Use gawk instead of awk for systime() function (bsc#1173068).\n- tpm: Fix TIS locality timeout problems (git-fixes).\n- tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send() (bsc#1065729).\n- tpm_tis: extra chip-\u003eops check on error path in tpm_tis_core_init (git-fixes).\n- tpm_tis: Remove the HID IFX0102 (git-fixes).\n- tracing: Fix event trigger to accept redundant spaces (git-fixes).\n- tty: hvc_console, fix crashes on parallel open/close (git-fixes).\n- tty: n_gsm: Fix bogus i++ in gsm_data_kick (git-fixes).\n- tty: n_gsm: Fix SOF skipping (git-fixes).\n- tty: n_gsm: Fix waking up upper tty layer when room available (git-fixes).\n- tty: serial: add missing spin_lock_init for SiFive serial console (git-fixes).\n- tun: correct header offsets in napi frags mode (git-fixes).\n- tunnel: Propagate ECT(1) when decapsulating as recommended by RFC6040 (networking-stable-20_05_12).\n- ubifs: fix wrong use of crypto_shash_descsize() (bsc#1173827).\n- ubifs: remove broken lazytime support (bsc#1173826).\n- udp: Copy has_conns in reuseport_grow() (git-fixes).\n- udp: Improve load balancing for SO_REUSEPORT (git-fixes).\n- usb: add USB_QUIRK_DELAY_INIT for Logitech C922 (git-fixes).\n- USB: c67x00: fix use after free in c67x00_giveback_urb (git-fixes).\n- usb: chipidea: core: add wakeup support for extcon (git-fixes).\n- USB: core: Fix misleading driver bug report (git-fixes).\n- usb: core: hub: limit HUB_QUIRK_DISABLE_AUTOSUSPEND to USB5534B (git-fixes).\n- usb: dwc2: Fix shutdown callback in platform (git-fixes).\n- usb: dwc2: gadget: move gadget resume after the core is in L0 state (git-fixes).\n- usb: dwc3: gadget: Properly handle ClearFeature(halt) (git-fixes).\n- usb: dwc3: gadget: Properly handle failed kick_transfer (git-fixes).\n- usb: dwc3: pci: Enable extcon driver for Intel Merrifield (git-fixes).\n- usb: dwc3: pci: Fix reference count leak in dwc3_pci_resume_work (git-fixes).\n- usb/ehci-platform: Set PM runtime as active on resume (git-fixes).\n- USB: ehci: reopen solution for Synopsys HC bug (git-fixes).\n- usb: gadget: audio: Fix a missing error return value in audio_bind() (git-fixes).\n- USB: gadget: fix illegal array access in binding with UDC (git-fixes).\n- usb: gadget: Fix issue with config_ep_by_speed function (git-fixes).\n- usb: gadget: fix potential double-free in m66592_probe (git-fixes).\n- usb: gadget: function: fix missing spinlock in f_uac1_legacy (git-fixes).\n- usb: gadget: legacy: fix error return code in cdc_bind() (git-fixes).\n- usb: gadget: legacy: fix error return code in gncm_bind() (git-fixes).\n- usb: gadget: legacy: fix redundant initialization warnings (git-fixes).\n- usb: gadget: lpc32xx_udc: do not dereference ep pointer before null check (git-fixes).\n- usb: gadget: net2272: Fix a memory leak in an error handling path in \u0027net2272_plat_probe()\u0027 (git-fixes).\n- usb: gadget: udc: atmel: fix uninitialized read in debug printk (git-fixes).\n- usb: gadget: udc: atmel: Make some symbols static (git-fixes).\n- usb: gadget: udc: atmel: remove outdated comment in usba_ep_disable() (git-fixes).\n- usb: gadget: udc: Potential Oops in error handling code (git-fixes).\n- USB: gadget: udc: s3c2410_udc: Remove pointless NULL check in s3c2410_udc_nuke (git-fixes).\n- usb: host: ehci-exynos: Fix error check in exynos_ehci_probe() (git-fixes).\n- USB: host: ehci-mxc: Add error handling in ehci_mxc_drv_probe() (git-fixes).\n- usb: host: ehci-platform: add a quirk to avoid stuck (git-fixes).\n- usb: host: xhci-mtk: avoid runtime suspend when removing hcd (git-fixes).\n- usb: host: xhci-plat: keep runtime active when removing host (git-fixes).\n- usblp: poison URBs upon disconnect (git-fixes).\n- usb: musb: Fix runtime PM imbalance on error (git-fixes).\n- usb: musb: start session in resume for host port (git-fixes).\n- usbnet: smsc95xx: Fix use-after-free after removal (git-fixes).\n- usb/ohci-platform: Fix a warning when hibernating (git-fixes).\n- USB: ohci-sm501: Add missed iounmap() in remove (git-fixes).\n- USB: ohci-sm501: fix error return code in ohci_hcd_sm501_drv_probe() (git-fixes).\n- usb: renesas_usbhs: getting residue from callback_result (git-fixes).\n- USB: serial: ch341: add basis for quirk detection (git-fixes).\n- USB: serial: ch341: add new Product ID for CH340 (git-fixes).\n- USB: serial: cypress_m8: enable Simply Automated UPB PIM (git-fixes).\n- USB: serial: iuu_phoenix: fix memory corruption (git-fixes).\n- USB: serial: option: add GosunCn GM500 series (git-fixes).\n- USB: serial: option: add Quectel EG95 LTE modem (git-fixes).\n- USB: serial: option: add Telit LE910C1-EUX compositions (git-fixes).\n- USB: serial: qcserial: add DW5816e QDL support (git-fixes).\n- USB: serial: usb_wwan: do not resubmit rx urb on fatal errors (git-fixes).\n- usb: typec: tcpci_rt1711h: avoid screaming irq causing boot hangs (git-fixes).\n- usb: usbfs: correct kernel-\u003euser page attribute mismatch (git-fixes).\n- USB: usbfs: fix mmap dma mismatch (git-fixes).\n- usb/xhci-plat: Set PM runtime as active on resume (git-fixes).\n- vfio: avoid possible overflow in vfio_iommu_type1_pin_pages (git-fixes).\n- vfio: Ignore -ENODEV when getting MSI cookie (git-fixes).\n- vfio/mdev: Fix reference count leak in add_mdev_supported_type (git-fixes).\n- vfio/pci: fix memory leaks in alloc_perm_bits() (git-fixes).\n- vfio/pci: Fix SR-IOV VF handling with MMIO blocking (bsc#1174129).\n- vfio/type1: Fix VA-\u003ePA translation for PFNMAP VMAs in vaddr_get_pfn() (git-fixes).\n- video: fbdev: w100fb: Fix a potential double free (git-fixes).\n- video: vt8500lcdfb: fix fallthrough warning (bsc#1152489)\n- virtio-blk: handle block_device_operations callbacks after hot unplug (git fixes (block drivers)).\n- virtio_net: fix lockdep warning on 32 bit (networking-stable-20_05_16).\n- virtio: virtio_console: add missing MODULE_DEVICE_TABLE() for rproc serial (git-fixes).\n- virt: vbox: Fix guest capabilities mask check (git-fixes).\n- virt: vbox: Fix VBGL_IOCTL_VMMDEV_REQUEST_BIG and _LOG req numbers to match upstream (git-fixes).\n- vmxnet3: add geneve and vxlan tunnel offload support (bsc#1172484).\n- vmxnet3: add support to get/set rx flow hash (bsc#1172484).\n- vmxnet3: allow rx flow hash ops only when rss is enabled (bsc#1172484).\n- vmxnet3: prepare for version 4 changes (bsc#1172484).\n- vmxnet3: update to version 4 (bsc#1172484).\n- vmxnet3: use correct hdr reference when packet is encapsulated (bsc#1172484).\n- vrf: Check skb for XFRM_TRANSFORMED flag (networking-stable-20_04_27).\n- vrf: Fix IPv6 with qdisc and xfrm (networking-stable-20_04_27).\n- vsock: fix timeout in vsock_accept() (networking-stable-20_06_07).\n- vsprintf: do not obfuscate NULL and error pointers (bsc#1172086).\n- vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console (git-fixes).\n- vt: vt_ioctl: remove unnecessary console allocation checks (git-fixes).\n- vxlan: Avoid infinite loop when suppressing NS messages with invalid options (networking-stable-20_06_10).\n- vxlan: use the correct nlattr array in NL_SET_ERR_MSG_ATTR (networking-stable-20_04_27).\n- w1: omap-hdq: cleanup to add missing newline for some dev_dbg (git-fixes).\n- watchdog: da9062: No need to ping manually before setting timeout (git-fixes).\n- watchdog: imx_sc_wdt: Fix reboot on crash (git-fixes).\n- watchdog: iTCO: Add support for Cannon Lake PCH iTCO (jsc#SLE-13202).\n- wcn36xx: Fix error handling path in \u0027wcn36xx_probe()\u0027 (git-fixes).\n- wil6210: account for napi_gro_receive never returning GRO_DROP (bsc#1154353).\n- wil6210: add wil_netif_rx() helper function (bsc#1154353).\n- wil6210: use after free in wil_netif_rx_any() (bsc#1154353).\n- wireguard: device: avoid circular netns references (git-fixes).\n- wireguard: noise: do not assign initiation time in if condition (git-fixes).\n- wireguard: noise: read preshared key while taking lock (bsc#1169021 jsc#SLE-12250).\n- wireguard: noise: separate receive counter from send counter (bsc#1169021 jsc#SLE-12250).\n- wireguard: queueing: preserve flow hash across packet scrubbing (bsc#1169021 jsc#SLE-12250).\n- wireguard: receive: account for napi_gro_receive never returning GRO_DROP (git-fixes).\n- wireguard: selftests: initalize ipv6 members to NULL to squelch clang warning (git-fixes).\n- wireguard: selftests: use newer iproute2 for gcc-10 (bsc#1169021 jsc#SLE-12250).\n- work around mvfs bug (bsc#1162063).\n- workqueue: do not use wq_select_unbound_cpu() for bound works (git-fixes).\n- workqueue: Remove the warning in wq_worker_sleeping() (git-fixes).\n- x86/amd_nb: Add AMD family 17h model 60h PCI IDs (git-fixes).\n- x86/cpu/amd: Make erratum #1054 a legacy erratum (bsc#1152489).\n- x86: Fix early boot crash on gcc-10, third try (bsc#1152489).\n- x86/mm/cpa: Flush direct map alias during cpa (bsc#1152489).\n- x86/PCI: Mark Intel C620 MROMs as having non-compliant BARs (git-fixes).\n- x86/reboot/quirks: Add MacBook6,1 reboot quirk (git-fixes).\n- x86/resctrl: Fix invalid attempt at removing the default resource group (bsc#1152489).\n- x86/resctrl: Preserve CDP enable over CPU hotplug (bsc#1152489).\n- x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks (bsc#1058115).\n- xfrm: Always set XFRM_TRANSFORMED in xfrm{4,6}_output_finish (networking-stable-20_04_27).\n- xfrm: fix error in comment (git fixes (block drivers)).\n- xfs: clean up the error handling in xfs_swap_extents (git-fixes).\n- xfs: do not commit sunit/swidth updates to disk if that would cause repair failures (bsc#1172169).\n- xfs: do not fail unwritten extent conversion on writeback due to edquot (bsc#1158242).\n- xfs: fix duplicate verification from xfs_qm_dqflush() (git-fixes).\n- xfs: force writes to delalloc regions to unwritten (bsc#1158242).\n- xfs: measure all contiguous previous extents for prealloc size (bsc#1158242).\n- xfs: preserve default grace interval during quotacheck (bsc#1172170).\n- xfs: refactor agfl length computation function (bsc#1172169).\n- xfs: split the sunit parameter update into two parts (bsc#1172169).\n- xhci: Fix enumeration issue when setting max packet size for FS devices (git-fixes).\n- xhci: Fix incorrect EP_STATE_MASK (git-fixes).\n- xhci: Poll for U0 after disabling USB2 LPM (git-fixes).\n- xhci: Return if xHCI does not support LPM (git-fixes).\n- xprtrdma: Fix handling of RDMA_ERROR replies (git-fixes).\n- workqueue: Remove unnecessary kfree() call in rcu_free_wq() (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-2105,SUSE-SLE-Module-Basesystem-15-SP2-2020-2105,SUSE-SLE-Module-Development-Tools-15-SP2-2020-2105,SUSE-SLE-Module-Legacy-15-SP2-2020-2105,SUSE-SLE-Module-Live-Patching-15-SP2-2020-2105,SUSE-SLE-Product-HA-15-SP2-2020-2105,SUSE-SLE-Product-WE-15-SP2-2020-2105", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2105-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:2105-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20202105-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:2105-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" }, { "category": "self", "summary": "SUSE Bug 1058115", "url": "https://bugzilla.suse.com/1058115" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1085030", "url": "https://bugzilla.suse.com/1085030" }, { "category": "self", "summary": "SUSE Bug 1148868", "url": "https://bugzilla.suse.com/1148868" }, { "category": "self", "summary": "SUSE Bug 1152472", "url": "https://bugzilla.suse.com/1152472" }, { "category": "self", "summary": "SUSE Bug 1152489", "url": "https://bugzilla.suse.com/1152489" }, { "category": "self", "summary": "SUSE Bug 1153274", "url": "https://bugzilla.suse.com/1153274" }, { "category": "self", "summary": "SUSE Bug 1154353", "url": "https://bugzilla.suse.com/1154353" }, { "category": "self", "summary": "SUSE Bug 1154492", "url": "https://bugzilla.suse.com/1154492" }, { "category": "self", "summary": "SUSE Bug 1155518", "url": "https://bugzilla.suse.com/1155518" }, { "category": "self", "summary": "SUSE Bug 1155798", "url": "https://bugzilla.suse.com/1155798" }, { "category": "self", "summary": "SUSE Bug 1156395", "url": "https://bugzilla.suse.com/1156395" }, { "category": "self", "summary": "SUSE Bug 1157169", "url": "https://bugzilla.suse.com/1157169" }, { "category": "self", "summary": "SUSE Bug 1158050", "url": "https://bugzilla.suse.com/1158050" }, { "category": "self", "summary": "SUSE Bug 1158242", "url": "https://bugzilla.suse.com/1158242" }, { "category": "self", "summary": "SUSE Bug 1158265", "url": "https://bugzilla.suse.com/1158265" }, { "category": "self", "summary": "SUSE Bug 1158748", "url": "https://bugzilla.suse.com/1158748" }, { "category": "self", "summary": "SUSE Bug 1158765", "url": "https://bugzilla.suse.com/1158765" }, { "category": "self", "summary": "SUSE Bug 1158983", "url": "https://bugzilla.suse.com/1158983" }, { "category": "self", "summary": "SUSE Bug 1159781", "url": "https://bugzilla.suse.com/1159781" }, { "category": "self", "summary": "SUSE Bug 1159867", "url": "https://bugzilla.suse.com/1159867" }, { "category": "self", "summary": "SUSE Bug 1160947", "url": "https://bugzilla.suse.com/1160947" }, { "category": "self", "summary": "SUSE Bug 1161495", "url": "https://bugzilla.suse.com/1161495" }, { "category": "self", "summary": "SUSE Bug 1162002", "url": "https://bugzilla.suse.com/1162002" }, { "category": "self", "summary": "SUSE Bug 1162063", "url": "https://bugzilla.suse.com/1162063" }, { "category": "self", "summary": "SUSE Bug 1162400", "url": "https://bugzilla.suse.com/1162400" }, { "category": "self", "summary": "SUSE Bug 1162702", "url": "https://bugzilla.suse.com/1162702" }, { "category": "self", "summary": "SUSE Bug 1164648", "url": "https://bugzilla.suse.com/1164648" }, { "category": "self", "summary": "SUSE Bug 1164777", "url": "https://bugzilla.suse.com/1164777" }, { "category": "self", "summary": "SUSE Bug 1164780", "url": "https://bugzilla.suse.com/1164780" }, { "category": "self", "summary": "SUSE Bug 1165211", "url": "https://bugzilla.suse.com/1165211" }, { "category": "self", "summary": "SUSE Bug 1165933", "url": "https://bugzilla.suse.com/1165933" }, { "category": "self", "summary": "SUSE Bug 1165975", "url": "https://bugzilla.suse.com/1165975" }, { "category": "self", "summary": "SUSE Bug 1166985", "url": "https://bugzilla.suse.com/1166985" }, { "category": "self", "summary": "SUSE Bug 1167104", "url": "https://bugzilla.suse.com/1167104" }, { "category": "self", "summary": "SUSE Bug 1167651", "url": "https://bugzilla.suse.com/1167651" }, { "category": "self", "summary": "SUSE Bug 1167773", "url": "https://bugzilla.suse.com/1167773" }, { "category": "self", "summary": "SUSE Bug 1168230", "url": "https://bugzilla.suse.com/1168230" }, { "category": "self", "summary": "SUSE Bug 1168779", "url": "https://bugzilla.suse.com/1168779" }, { "category": "self", "summary": "SUSE Bug 1168838", "url": "https://bugzilla.suse.com/1168838" }, { "category": "self", "summary": "SUSE Bug 1168959", "url": "https://bugzilla.suse.com/1168959" }, { "category": "self", "summary": "SUSE Bug 1169021", "url": "https://bugzilla.suse.com/1169021" }, { "category": "self", "summary": "SUSE Bug 1169094", "url": "https://bugzilla.suse.com/1169094" }, { "category": "self", "summary": "SUSE Bug 1169194", "url": "https://bugzilla.suse.com/1169194" }, { "category": "self", "summary": "SUSE Bug 1169514", "url": "https://bugzilla.suse.com/1169514" }, { "category": "self", "summary": "SUSE Bug 1169681", "url": "https://bugzilla.suse.com/1169681" }, { "category": "self", "summary": "SUSE Bug 1169771", "url": "https://bugzilla.suse.com/1169771" }, { "category": "self", "summary": "SUSE Bug 1170011", "url": "https://bugzilla.suse.com/1170011" }, { "category": "self", "summary": "SUSE Bug 1170284", "url": "https://bugzilla.suse.com/1170284" }, { "category": "self", "summary": "SUSE Bug 1170442", "url": "https://bugzilla.suse.com/1170442" }, { "category": "self", "summary": "SUSE Bug 1170617", "url": "https://bugzilla.suse.com/1170617" }, { "category": "self", "summary": "SUSE Bug 1170774", "url": "https://bugzilla.suse.com/1170774" }, { "category": "self", "summary": "SUSE Bug 1170879", "url": "https://bugzilla.suse.com/1170879" }, { "category": "self", "summary": "SUSE Bug 1170891", "url": "https://bugzilla.suse.com/1170891" }, { "category": "self", "summary": "SUSE Bug 1170895", "url": "https://bugzilla.suse.com/1170895" }, { "category": "self", "summary": "SUSE Bug 1171150", "url": "https://bugzilla.suse.com/1171150" }, { "category": "self", "summary": "SUSE Bug 1171189", "url": "https://bugzilla.suse.com/1171189" }, { "category": "self", "summary": "SUSE Bug 1171191", "url": "https://bugzilla.suse.com/1171191" }, { "category": "self", "summary": "SUSE Bug 1171219", "url": "https://bugzilla.suse.com/1171219" }, { "category": "self", "summary": "SUSE Bug 1171220", "url": "https://bugzilla.suse.com/1171220" }, { "category": "self", "summary": "SUSE Bug 1171246", "url": "https://bugzilla.suse.com/1171246" }, { "category": "self", "summary": "SUSE Bug 1171417", "url": "https://bugzilla.suse.com/1171417" }, { "category": "self", "summary": "SUSE Bug 1171513", "url": "https://bugzilla.suse.com/1171513" }, { "category": "self", "summary": "SUSE Bug 1171529", "url": "https://bugzilla.suse.com/1171529" }, { "category": "self", "summary": "SUSE Bug 1171530", "url": "https://bugzilla.suse.com/1171530" }, { "category": "self", "summary": "SUSE Bug 1171662", "url": "https://bugzilla.suse.com/1171662" }, { "category": "self", "summary": "SUSE Bug 1171688", "url": "https://bugzilla.suse.com/1171688" }, { "category": "self", "summary": "SUSE Bug 1171699", "url": "https://bugzilla.suse.com/1171699" }, { "category": "self", "summary": "SUSE Bug 1171732", "url": "https://bugzilla.suse.com/1171732" }, { "category": "self", "summary": "SUSE Bug 1171739", "url": "https://bugzilla.suse.com/1171739" }, { "category": "self", "summary": "SUSE Bug 1171743", "url": "https://bugzilla.suse.com/1171743" }, { "category": "self", "summary": "SUSE Bug 1171759", "url": "https://bugzilla.suse.com/1171759" }, { "category": "self", "summary": "SUSE Bug 1171828", "url": "https://bugzilla.suse.com/1171828" }, { "category": "self", "summary": "SUSE Bug 1171857", "url": "https://bugzilla.suse.com/1171857" }, { "category": "self", "summary": "SUSE Bug 1171868", "url": "https://bugzilla.suse.com/1171868" }, { "category": "self", "summary": "SUSE Bug 1171904", "url": "https://bugzilla.suse.com/1171904" }, { "category": "self", "summary": "SUSE Bug 1171915", "url": "https://bugzilla.suse.com/1171915" }, { "category": "self", "summary": "SUSE Bug 1171982", "url": "https://bugzilla.suse.com/1171982" }, { "category": "self", "summary": "SUSE Bug 1171983", "url": "https://bugzilla.suse.com/1171983" }, { "category": "self", "summary": "SUSE Bug 1171988", "url": "https://bugzilla.suse.com/1171988" }, { "category": "self", "summary": "SUSE Bug 1172017", "url": "https://bugzilla.suse.com/1172017" }, { "category": "self", "summary": "SUSE Bug 1172046", "url": "https://bugzilla.suse.com/1172046" }, { "category": "self", "summary": "SUSE Bug 1172061", "url": "https://bugzilla.suse.com/1172061" }, { "category": "self", "summary": "SUSE Bug 1172062", "url": "https://bugzilla.suse.com/1172062" }, { "category": "self", "summary": "SUSE Bug 1172063", "url": "https://bugzilla.suse.com/1172063" }, { "category": "self", "summary": "SUSE Bug 1172064", "url": "https://bugzilla.suse.com/1172064" }, { "category": "self", "summary": "SUSE Bug 1172065", "url": "https://bugzilla.suse.com/1172065" }, { "category": "self", "summary": "SUSE Bug 1172066", "url": "https://bugzilla.suse.com/1172066" }, { "category": "self", "summary": "SUSE Bug 1172067", "url": "https://bugzilla.suse.com/1172067" }, { "category": "self", "summary": "SUSE Bug 1172068", "url": "https://bugzilla.suse.com/1172068" }, { "category": "self", "summary": "SUSE Bug 1172069", "url": "https://bugzilla.suse.com/1172069" }, { "category": "self", "summary": "SUSE Bug 1172073", "url": "https://bugzilla.suse.com/1172073" }, { "category": "self", "summary": "SUSE Bug 1172086", "url": "https://bugzilla.suse.com/1172086" }, { "category": "self", "summary": "SUSE Bug 1172095", "url": "https://bugzilla.suse.com/1172095" }, { "category": "self", "summary": "SUSE Bug 1172169", "url": "https://bugzilla.suse.com/1172169" }, { "category": "self", "summary": "SUSE Bug 1172170", "url": "https://bugzilla.suse.com/1172170" }, { "category": "self", "summary": "SUSE Bug 1172201", "url": "https://bugzilla.suse.com/1172201" }, { "category": "self", "summary": "SUSE Bug 1172208", "url": "https://bugzilla.suse.com/1172208" }, { "category": "self", "summary": "SUSE Bug 1172223", "url": "https://bugzilla.suse.com/1172223" }, { "category": "self", "summary": "SUSE Bug 1172342", "url": "https://bugzilla.suse.com/1172342" }, { "category": "self", "summary": "SUSE Bug 1172343", "url": "https://bugzilla.suse.com/1172343" }, { "category": "self", "summary": "SUSE Bug 1172344", "url": "https://bugzilla.suse.com/1172344" }, { "category": "self", "summary": "SUSE Bug 1172365", "url": "https://bugzilla.suse.com/1172365" }, { "category": "self", "summary": "SUSE Bug 1172366", "url": "https://bugzilla.suse.com/1172366" }, { "category": "self", "summary": "SUSE Bug 1172374", "url": "https://bugzilla.suse.com/1172374" }, { "category": "self", "summary": "SUSE Bug 1172391", "url": "https://bugzilla.suse.com/1172391" }, { "category": "self", "summary": "SUSE Bug 1172393", "url": "https://bugzilla.suse.com/1172393" }, { "category": "self", "summary": "SUSE Bug 1172394", "url": "https://bugzilla.suse.com/1172394" }, { "category": "self", "summary": "SUSE Bug 1172453", "url": "https://bugzilla.suse.com/1172453" }, { "category": "self", "summary": "SUSE Bug 1172458", "url": "https://bugzilla.suse.com/1172458" }, { "category": "self", "summary": "SUSE Bug 1172467", "url": "https://bugzilla.suse.com/1172467" }, { "category": "self", "summary": "SUSE Bug 1172484", "url": "https://bugzilla.suse.com/1172484" }, { "category": "self", "summary": "SUSE Bug 1172537", "url": "https://bugzilla.suse.com/1172537" }, { "category": "self", "summary": "SUSE Bug 1172543", "url": "https://bugzilla.suse.com/1172543" }, { "category": "self", "summary": "SUSE Bug 1172687", "url": "https://bugzilla.suse.com/1172687" }, { "category": "self", "summary": "SUSE Bug 1172719", "url": "https://bugzilla.suse.com/1172719" }, { "category": "self", "summary": "SUSE Bug 1172739", "url": "https://bugzilla.suse.com/1172739" }, { "category": "self", "summary": "SUSE Bug 1172751", "url": "https://bugzilla.suse.com/1172751" }, { "category": "self", "summary": "SUSE Bug 1172759", "url": "https://bugzilla.suse.com/1172759" }, { "category": "self", "summary": "SUSE Bug 1172775", "url": "https://bugzilla.suse.com/1172775" }, { "category": "self", "summary": "SUSE Bug 1172781", "url": "https://bugzilla.suse.com/1172781" }, { "category": "self", "summary": "SUSE Bug 1172782", "url": "https://bugzilla.suse.com/1172782" }, { "category": "self", "summary": "SUSE Bug 1172783", "url": "https://bugzilla.suse.com/1172783" }, { "category": "self", "summary": "SUSE Bug 1172814", "url": "https://bugzilla.suse.com/1172814" }, { "category": "self", "summary": "SUSE Bug 1172823", "url": "https://bugzilla.suse.com/1172823" }, { "category": "self", "summary": "SUSE Bug 1172841", "url": "https://bugzilla.suse.com/1172841" }, { "category": "self", "summary": "SUSE Bug 1172871", "url": "https://bugzilla.suse.com/1172871" }, { "category": "self", "summary": "SUSE Bug 1172938", "url": "https://bugzilla.suse.com/1172938" }, { "category": "self", "summary": "SUSE Bug 1172939", "url": "https://bugzilla.suse.com/1172939" }, { "category": "self", "summary": "SUSE Bug 1172940", "url": "https://bugzilla.suse.com/1172940" }, { "category": "self", "summary": "SUSE Bug 1172956", "url": "https://bugzilla.suse.com/1172956" }, { "category": "self", "summary": "SUSE Bug 1172983", "url": "https://bugzilla.suse.com/1172983" }, { "category": "self", "summary": "SUSE Bug 1172984", "url": "https://bugzilla.suse.com/1172984" }, { "category": "self", "summary": "SUSE Bug 1172985", "url": "https://bugzilla.suse.com/1172985" }, { "category": "self", "summary": "SUSE Bug 1172986", "url": "https://bugzilla.suse.com/1172986" }, { "category": "self", "summary": "SUSE Bug 1172987", "url": "https://bugzilla.suse.com/1172987" }, { "category": "self", "summary": "SUSE Bug 1172988", "url": "https://bugzilla.suse.com/1172988" }, { "category": "self", "summary": "SUSE Bug 1172989", "url": "https://bugzilla.suse.com/1172989" }, { "category": "self", "summary": "SUSE Bug 1172990", "url": "https://bugzilla.suse.com/1172990" }, { "category": "self", "summary": "SUSE Bug 1172999", "url": "https://bugzilla.suse.com/1172999" }, { "category": "self", "summary": "SUSE Bug 1173060", "url": "https://bugzilla.suse.com/1173060" }, { "category": "self", "summary": "SUSE Bug 1173068", "url": "https://bugzilla.suse.com/1173068" }, { "category": "self", "summary": "SUSE Bug 1173074", "url": "https://bugzilla.suse.com/1173074" }, { "category": "self", "summary": "SUSE Bug 1173085", "url": "https://bugzilla.suse.com/1173085" }, { "category": "self", "summary": "SUSE Bug 1173139", "url": "https://bugzilla.suse.com/1173139" }, { "category": "self", "summary": "SUSE Bug 1173206", "url": "https://bugzilla.suse.com/1173206" }, { "category": "self", "summary": "SUSE Bug 1173271", "url": "https://bugzilla.suse.com/1173271" }, { "category": "self", "summary": "SUSE Bug 1173280", "url": "https://bugzilla.suse.com/1173280" }, { "category": "self", "summary": "SUSE Bug 1173284", "url": "https://bugzilla.suse.com/1173284" }, { "category": "self", "summary": "SUSE Bug 1173428", "url": "https://bugzilla.suse.com/1173428" }, { "category": "self", "summary": "SUSE Bug 1173438", "url": "https://bugzilla.suse.com/1173438" }, { "category": "self", "summary": "SUSE Bug 1173461", "url": "https://bugzilla.suse.com/1173461" }, { "category": "self", "summary": "SUSE Bug 1173514", "url": "https://bugzilla.suse.com/1173514" }, { "category": "self", "summary": "SUSE Bug 1173552", "url": "https://bugzilla.suse.com/1173552" }, { "category": "self", "summary": "SUSE Bug 1173573", "url": "https://bugzilla.suse.com/1173573" }, { "category": "self", "summary": "SUSE Bug 1173625", "url": "https://bugzilla.suse.com/1173625" }, { "category": "self", "summary": "SUSE Bug 1173746", "url": "https://bugzilla.suse.com/1173746" }, { "category": "self", "summary": "SUSE Bug 1173776", "url": "https://bugzilla.suse.com/1173776" }, { "category": "self", "summary": "SUSE Bug 1173817", "url": "https://bugzilla.suse.com/1173817" }, { "category": "self", "summary": "SUSE Bug 1173818", "url": "https://bugzilla.suse.com/1173818" }, { "category": "self", "summary": "SUSE Bug 1173820", "url": "https://bugzilla.suse.com/1173820" }, { "category": "self", "summary": "SUSE Bug 1173822", "url": "https://bugzilla.suse.com/1173822" }, { "category": "self", "summary": "SUSE Bug 1173823", "url": "https://bugzilla.suse.com/1173823" }, { "category": "self", "summary": "SUSE Bug 1173824", "url": "https://bugzilla.suse.com/1173824" }, { "category": "self", "summary": "SUSE Bug 1173825", "url": "https://bugzilla.suse.com/1173825" }, { "category": "self", "summary": "SUSE Bug 1173826", "url": "https://bugzilla.suse.com/1173826" }, { "category": "self", "summary": "SUSE Bug 1173827", "url": "https://bugzilla.suse.com/1173827" }, { "category": "self", "summary": "SUSE Bug 1173828", "url": "https://bugzilla.suse.com/1173828" }, { "category": "self", "summary": "SUSE Bug 1173830", "url": "https://bugzilla.suse.com/1173830" }, { "category": "self", "summary": "SUSE Bug 1173831", "url": "https://bugzilla.suse.com/1173831" }, { "category": "self", "summary": "SUSE Bug 1173832", "url": "https://bugzilla.suse.com/1173832" }, { "category": "self", "summary": "SUSE Bug 1173833", "url": "https://bugzilla.suse.com/1173833" }, { "category": "self", "summary": "SUSE Bug 1173834", "url": "https://bugzilla.suse.com/1173834" }, { "category": "self", "summary": "SUSE Bug 1173836", "url": "https://bugzilla.suse.com/1173836" }, { "category": "self", "summary": "SUSE Bug 1173837", "url": "https://bugzilla.suse.com/1173837" }, { "category": "self", "summary": "SUSE Bug 1173838", "url": "https://bugzilla.suse.com/1173838" }, { "category": "self", "summary": "SUSE Bug 1173839", "url": "https://bugzilla.suse.com/1173839" }, { "category": "self", "summary": "SUSE Bug 1173841", "url": "https://bugzilla.suse.com/1173841" }, { "category": "self", "summary": "SUSE Bug 1173843", "url": "https://bugzilla.suse.com/1173843" }, { "category": "self", "summary": "SUSE Bug 1173844", "url": "https://bugzilla.suse.com/1173844" }, { "category": "self", "summary": "SUSE Bug 1173845", "url": "https://bugzilla.suse.com/1173845" }, { "category": "self", "summary": "SUSE Bug 1173847", "url": "https://bugzilla.suse.com/1173847" }, { "category": "self", "summary": "SUSE Bug 1173849", "url": "https://bugzilla.suse.com/1173849" }, { "category": "self", "summary": "SUSE Bug 1173860", "url": "https://bugzilla.suse.com/1173860" }, { "category": "self", "summary": "SUSE Bug 1173894", "url": "https://bugzilla.suse.com/1173894" }, { "category": "self", "summary": "SUSE Bug 1173941", "url": "https://bugzilla.suse.com/1173941" }, { "category": "self", "summary": "SUSE Bug 1174018", "url": "https://bugzilla.suse.com/1174018" }, { "category": "self", "summary": "SUSE Bug 1174072", "url": "https://bugzilla.suse.com/1174072" }, { "category": "self", "summary": "SUSE Bug 1174116", "url": "https://bugzilla.suse.com/1174116" }, { "category": "self", "summary": "SUSE Bug 1174126", "url": "https://bugzilla.suse.com/1174126" }, { "category": "self", "summary": "SUSE Bug 1174127", "url": "https://bugzilla.suse.com/1174127" }, { "category": "self", "summary": "SUSE Bug 1174128", "url": "https://bugzilla.suse.com/1174128" }, { "category": "self", "summary": "SUSE Bug 1174129", "url": "https://bugzilla.suse.com/1174129" }, { "category": "self", "summary": "SUSE Bug 1174185", "url": "https://bugzilla.suse.com/1174185" }, { "category": "self", "summary": "SUSE Bug 1174244", "url": "https://bugzilla.suse.com/1174244" }, { "category": "self", "summary": "SUSE Bug 1174263", "url": "https://bugzilla.suse.com/1174263" }, { "category": "self", "summary": "SUSE Bug 1174264", "url": "https://bugzilla.suse.com/1174264" }, { "category": "self", "summary": "SUSE Bug 1174331", "url": "https://bugzilla.suse.com/1174331" }, { "category": "self", "summary": "SUSE Bug 1174332", "url": "https://bugzilla.suse.com/1174332" }, { "category": "self", "summary": "SUSE Bug 1174333", "url": "https://bugzilla.suse.com/1174333" }, { "category": "self", "summary": "SUSE Bug 1174345", "url": "https://bugzilla.suse.com/1174345" }, { "category": "self", "summary": "SUSE Bug 1174356", "url": "https://bugzilla.suse.com/1174356" }, { "category": "self", "summary": "SUSE Bug 1174396", "url": "https://bugzilla.suse.com/1174396" }, { "category": "self", "summary": "SUSE Bug 1174398", "url": "https://bugzilla.suse.com/1174398" }, { "category": "self", "summary": "SUSE Bug 1174407", "url": "https://bugzilla.suse.com/1174407" }, { "category": "self", "summary": "SUSE Bug 1174409", "url": "https://bugzilla.suse.com/1174409" }, { "category": "self", "summary": "SUSE Bug 1174411", "url": "https://bugzilla.suse.com/1174411" }, { "category": "self", "summary": "SUSE Bug 1174438", "url": "https://bugzilla.suse.com/1174438" }, { "category": "self", "summary": "SUSE Bug 1174462", "url": "https://bugzilla.suse.com/1174462" }, { "category": "self", "summary": "SUSE Bug 1174513", "url": "https://bugzilla.suse.com/1174513" }, { "category": "self", "summary": "SUSE Bug 1174527", "url": "https://bugzilla.suse.com/1174527" }, { "category": "self", "summary": "SUSE Bug 1174543", "url": "https://bugzilla.suse.com/1174543" }, { "category": "self", "summary": "SUSE Bug 1174627", "url": "https://bugzilla.suse.com/1174627" }, { "category": "self", "summary": "SUSE Bug 962849", "url": "https://bugzilla.suse.com/962849" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19462 page", "url": "https://www.suse.com/security/cve/CVE-2019-19462/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20810 page", "url": "https://www.suse.com/security/cve/CVE-2019-20810/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20812 page", "url": "https://www.suse.com/security/cve/CVE-2019-20812/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0305 page", "url": "https://www.suse.com/security/cve/CVE-2020-0305/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10135 page", "url": "https://www.suse.com/security/cve/CVE-2020-10135/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10711 page", "url": "https://www.suse.com/security/cve/CVE-2020-10711/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10732 page", "url": "https://www.suse.com/security/cve/CVE-2020-10732/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10751 page", "url": "https://www.suse.com/security/cve/CVE-2020-10751/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10766 page", "url": "https://www.suse.com/security/cve/CVE-2020-10766/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10767 page", "url": "https://www.suse.com/security/cve/CVE-2020-10767/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10768 page", "url": "https://www.suse.com/security/cve/CVE-2020-10768/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10773 page", "url": "https://www.suse.com/security/cve/CVE-2020-10773/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10781 page", "url": "https://www.suse.com/security/cve/CVE-2020-10781/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12656 page", "url": "https://www.suse.com/security/cve/CVE-2020-12656/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12769 page", "url": "https://www.suse.com/security/cve/CVE-2020-12769/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12771 page", "url": "https://www.suse.com/security/cve/CVE-2020-12771/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12888 page", "url": "https://www.suse.com/security/cve/CVE-2020-12888/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-13143 page", "url": "https://www.suse.com/security/cve/CVE-2020-13143/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-13974 page", "url": "https://www.suse.com/security/cve/CVE-2020-13974/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14416 page", "url": "https://www.suse.com/security/cve/CVE-2020-14416/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15393 page", "url": "https://www.suse.com/security/cve/CVE-2020-15393/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15780 page", "url": "https://www.suse.com/security/cve/CVE-2020-15780/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-08-03T14:42:51Z", "generator": { "date": "2020-08-03T14:42:51Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:2105-1", "initial_release_date": "2020-08-03T14:42:51Z", "revision_history": [ { "date": "2020-08-03T14:42:51Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "product": { "name": "cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "product_id": "cluster-md-kmp-default-5.3.18-24.9.1.aarch64" } }, { "category": "product_version", "name": "cluster-md-kmp-preempt-5.3.18-24.9.1.aarch64", "product": { "name": "cluster-md-kmp-preempt-5.3.18-24.9.1.aarch64", "product_id": "cluster-md-kmp-preempt-5.3.18-24.9.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-5.3.18-24.9.1.aarch64", "product": { "name": "dlm-kmp-default-5.3.18-24.9.1.aarch64", "product_id": "dlm-kmp-default-5.3.18-24.9.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-preempt-5.3.18-24.9.1.aarch64", "product": { "name": "dlm-kmp-preempt-5.3.18-24.9.1.aarch64", "product_id": "dlm-kmp-preempt-5.3.18-24.9.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.3.18-24.9.1.aarch64", "product": { "name": "gfs2-kmp-default-5.3.18-24.9.1.aarch64", "product_id": "gfs2-kmp-default-5.3.18-24.9.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-preempt-5.3.18-24.9.1.aarch64", "product": { "name": "gfs2-kmp-preempt-5.3.18-24.9.1.aarch64", "product_id": "gfs2-kmp-preempt-5.3.18-24.9.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-5.3.18-24.9.1.aarch64", "product": { "name": "kernel-default-5.3.18-24.9.1.aarch64", "product_id": "kernel-default-5.3.18-24.9.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "product": { "name": "kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "product_id": "kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-24.9.1.9.2.6.aarch64", "product": { "name": "kernel-default-base-rebuild-5.3.18-24.9.1.9.2.6.aarch64", "product_id": "kernel-default-base-rebuild-5.3.18-24.9.1.9.2.6.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-24.9.1.aarch64", "product": { "name": "kernel-default-devel-5.3.18-24.9.1.aarch64", "product_id": "kernel-default-devel-5.3.18-24.9.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-5.3.18-24.9.1.aarch64", "product": { "name": "kernel-default-extra-5.3.18-24.9.1.aarch64", "product_id": "kernel-default-extra-5.3.18-24.9.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.3.18-24.9.1.aarch64", "product": { "name": "kernel-default-livepatch-5.3.18-24.9.1.aarch64", "product_id": "kernel-default-livepatch-5.3.18-24.9.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.3.18-24.9.1.aarch64", "product": { "name": "kernel-default-livepatch-devel-5.3.18-24.9.1.aarch64", "product_id": "kernel-default-livepatch-devel-5.3.18-24.9.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-24.9.1.aarch64", "product": { "name": "kernel-obs-build-5.3.18-24.9.1.aarch64", "product_id": "kernel-obs-build-5.3.18-24.9.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-24.9.1.aarch64", "product": { "name": "kernel-obs-qa-5.3.18-24.9.1.aarch64", "product_id": "kernel-obs-qa-5.3.18-24.9.1.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-5.3.18-24.9.1.aarch64", "product": { "name": "kernel-preempt-5.3.18-24.9.1.aarch64", "product_id": "kernel-preempt-5.3.18-24.9.1.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-devel-5.3.18-24.9.1.aarch64", "product": { "name": "kernel-preempt-devel-5.3.18-24.9.1.aarch64", "product_id": "kernel-preempt-devel-5.3.18-24.9.1.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-extra-5.3.18-24.9.1.aarch64", "product": { "name": "kernel-preempt-extra-5.3.18-24.9.1.aarch64", "product_id": "kernel-preempt-extra-5.3.18-24.9.1.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-livepatch-5.3.18-24.9.1.aarch64", "product": { "name": "kernel-preempt-livepatch-5.3.18-24.9.1.aarch64", "product_id": "kernel-preempt-livepatch-5.3.18-24.9.1.aarch64" } }, { "category": "product_version", "name": "kernel-preempt-livepatch-devel-5.3.18-24.9.1.aarch64", "product": { "name": "kernel-preempt-livepatch-devel-5.3.18-24.9.1.aarch64", "product_id": "kernel-preempt-livepatch-devel-5.3.18-24.9.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-24.9.1.aarch64", "product": { "name": "kernel-syms-5.3.18-24.9.1.aarch64", "product_id": "kernel-syms-5.3.18-24.9.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.3.18-24.9.1.aarch64", "product": { "name": "kselftests-kmp-default-5.3.18-24.9.1.aarch64", "product_id": "kselftests-kmp-default-5.3.18-24.9.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-preempt-5.3.18-24.9.1.aarch64", "product": { "name": "kselftests-kmp-preempt-5.3.18-24.9.1.aarch64", "product_id": "kselftests-kmp-preempt-5.3.18-24.9.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "product": { "name": "ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "product_id": "ocfs2-kmp-default-5.3.18-24.9.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-preempt-5.3.18-24.9.1.aarch64", "product": { "name": "ocfs2-kmp-preempt-5.3.18-24.9.1.aarch64", "product_id": "ocfs2-kmp-preempt-5.3.18-24.9.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "product": { "name": "reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "product_id": "reiserfs-kmp-default-5.3.18-24.9.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-preempt-5.3.18-24.9.1.aarch64", "product": { "name": "reiserfs-kmp-preempt-5.3.18-24.9.1.aarch64", "product_id": "reiserfs-kmp-preempt-5.3.18-24.9.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-5.3.18-24.9.1.noarch", "product": { "name": "kernel-devel-5.3.18-24.9.1.noarch", "product_id": "kernel-devel-5.3.18-24.9.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-5.3.18-24.9.2.noarch", "product": { "name": "kernel-docs-5.3.18-24.9.2.noarch", "product_id": "kernel-docs-5.3.18-24.9.2.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-5.3.18-24.9.2.noarch", "product": { "name": "kernel-docs-html-5.3.18-24.9.2.noarch", "product_id": "kernel-docs-html-5.3.18-24.9.2.noarch" } }, { "category": "product_version", "name": "kernel-macros-5.3.18-24.9.1.noarch", "product": { "name": "kernel-macros-5.3.18-24.9.1.noarch", "product_id": "kernel-macros-5.3.18-24.9.1.noarch" } }, { "category": "product_version", "name": "kernel-source-5.3.18-24.9.1.noarch", "product": { "name": "kernel-source-5.3.18-24.9.1.noarch", "product_id": "kernel-source-5.3.18-24.9.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-5.3.18-24.9.1.noarch", "product": { "name": "kernel-source-vanilla-5.3.18-24.9.1.noarch", "product_id": "kernel-source-vanilla-5.3.18-24.9.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "product": { "name": "cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "product_id": "cluster-md-kmp-default-5.3.18-24.9.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-5.3.18-24.9.1.ppc64le", "product": { "name": "dlm-kmp-default-5.3.18-24.9.1.ppc64le", "product_id": "dlm-kmp-default-5.3.18-24.9.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "product": { "name": "gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "product_id": "gfs2-kmp-default-5.3.18-24.9.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-5.3.18-24.9.1.ppc64le", "product": { "name": "kernel-debug-5.3.18-24.9.1.ppc64le", "product_id": "kernel-debug-5.3.18-24.9.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-5.3.18-24.9.1.ppc64le", "product": { "name": "kernel-debug-devel-5.3.18-24.9.1.ppc64le", "product_id": "kernel-debug-devel-5.3.18-24.9.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-5.3.18-24.9.1.ppc64le", "product": { "name": "kernel-debug-livepatch-devel-5.3.18-24.9.1.ppc64le", "product_id": "kernel-debug-livepatch-devel-5.3.18-24.9.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-5.3.18-24.9.1.ppc64le", "product": { "name": "kernel-default-5.3.18-24.9.1.ppc64le", "product_id": "kernel-default-5.3.18-24.9.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "product": { "name": "kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "product_id": "kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-24.9.1.9.2.6.ppc64le", "product": { "name": "kernel-default-base-rebuild-5.3.18-24.9.1.9.2.6.ppc64le", "product_id": "kernel-default-base-rebuild-5.3.18-24.9.1.9.2.6.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-24.9.1.ppc64le", "product": { "name": "kernel-default-devel-5.3.18-24.9.1.ppc64le", "product_id": "kernel-default-devel-5.3.18-24.9.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-5.3.18-24.9.1.ppc64le", "product": { "name": "kernel-default-extra-5.3.18-24.9.1.ppc64le", "product_id": "kernel-default-extra-5.3.18-24.9.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "product": { "name": "kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "product_id": "kernel-default-livepatch-5.3.18-24.9.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "product": { "name": "kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "product_id": "kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le" } }, { "category": "product_version", "name": "kernel-kvmsmall-5.3.18-24.9.1.ppc64le", "product": { "name": "kernel-kvmsmall-5.3.18-24.9.1.ppc64le", "product_id": "kernel-kvmsmall-5.3.18-24.9.1.ppc64le" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-5.3.18-24.9.1.ppc64le", "product": { "name": "kernel-kvmsmall-devel-5.3.18-24.9.1.ppc64le", "product_id": "kernel-kvmsmall-devel-5.3.18-24.9.1.ppc64le" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-5.3.18-24.9.1.ppc64le", "product": { "name": "kernel-kvmsmall-livepatch-devel-5.3.18-24.9.1.ppc64le", "product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-24.9.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "product": { "name": "kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "product_id": "kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-24.9.1.ppc64le", "product": { "name": "kernel-obs-build-5.3.18-24.9.1.ppc64le", "product_id": "kernel-obs-build-5.3.18-24.9.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-24.9.1.ppc64le", "product": { "name": "kernel-obs-qa-5.3.18-24.9.1.ppc64le", "product_id": "kernel-obs-qa-5.3.18-24.9.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-24.9.1.ppc64le", "product": { "name": "kernel-syms-5.3.18-24.9.1.ppc64le", "product_id": "kernel-syms-5.3.18-24.9.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.3.18-24.9.1.ppc64le", "product": { "name": "kselftests-kmp-default-5.3.18-24.9.1.ppc64le", "product_id": "kselftests-kmp-default-5.3.18-24.9.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "product": { "name": "ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "product_id": "ocfs2-kmp-default-5.3.18-24.9.1.ppc64le" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "product": { "name": "reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "product_id": "reiserfs-kmp-default-5.3.18-24.9.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.3.18-24.9.1.s390x", "product": { "name": "cluster-md-kmp-default-5.3.18-24.9.1.s390x", "product_id": "cluster-md-kmp-default-5.3.18-24.9.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-5.3.18-24.9.1.s390x", "product": { "name": "dlm-kmp-default-5.3.18-24.9.1.s390x", "product_id": "dlm-kmp-default-5.3.18-24.9.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.3.18-24.9.1.s390x", "product": { "name": "gfs2-kmp-default-5.3.18-24.9.1.s390x", "product_id": "gfs2-kmp-default-5.3.18-24.9.1.s390x" } }, { "category": "product_version", "name": "kernel-default-5.3.18-24.9.1.s390x", "product": { "name": "kernel-default-5.3.18-24.9.1.s390x", "product_id": "kernel-default-5.3.18-24.9.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "product": { "name": "kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "product_id": "kernel-default-base-5.3.18-24.9.1.9.2.6.s390x" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-24.9.1.9.2.6.s390x", "product": { "name": "kernel-default-base-rebuild-5.3.18-24.9.1.9.2.6.s390x", "product_id": "kernel-default-base-rebuild-5.3.18-24.9.1.9.2.6.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-24.9.1.s390x", "product": { "name": "kernel-default-devel-5.3.18-24.9.1.s390x", "product_id": "kernel-default-devel-5.3.18-24.9.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-5.3.18-24.9.1.s390x", "product": { "name": "kernel-default-extra-5.3.18-24.9.1.s390x", "product_id": "kernel-default-extra-5.3.18-24.9.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.3.18-24.9.1.s390x", "product": { "name": "kernel-default-livepatch-5.3.18-24.9.1.s390x", "product_id": "kernel-default-livepatch-5.3.18-24.9.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "product": { "name": "kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "product_id": "kernel-default-livepatch-devel-5.3.18-24.9.1.s390x" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "product": { "name": "kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "product_id": "kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-24.9.1.s390x", "product": { "name": "kernel-obs-build-5.3.18-24.9.1.s390x", "product_id": "kernel-obs-build-5.3.18-24.9.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-24.9.1.s390x", "product": { "name": "kernel-obs-qa-5.3.18-24.9.1.s390x", "product_id": "kernel-obs-qa-5.3.18-24.9.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-24.9.1.s390x", "product": { "name": "kernel-syms-5.3.18-24.9.1.s390x", "product_id": "kernel-syms-5.3.18-24.9.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-5.3.18-24.9.1.s390x", "product": { "name": "kernel-zfcpdump-5.3.18-24.9.1.s390x", "product_id": "kernel-zfcpdump-5.3.18-24.9.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.3.18-24.9.1.s390x", "product": { "name": "kselftests-kmp-default-5.3.18-24.9.1.s390x", "product_id": "kselftests-kmp-default-5.3.18-24.9.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.3.18-24.9.1.s390x", "product": { "name": "ocfs2-kmp-default-5.3.18-24.9.1.s390x", "product_id": "ocfs2-kmp-default-5.3.18-24.9.1.s390x" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.3.18-24.9.1.s390x", "product": { "name": "reiserfs-kmp-default-5.3.18-24.9.1.s390x", "product_id": "reiserfs-kmp-default-5.3.18-24.9.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "product": { "name": "cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "product_id": "cluster-md-kmp-default-5.3.18-24.9.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-preempt-5.3.18-24.9.1.x86_64", "product": { "name": "cluster-md-kmp-preempt-5.3.18-24.9.1.x86_64", "product_id": "cluster-md-kmp-preempt-5.3.18-24.9.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-5.3.18-24.9.1.x86_64", "product": { "name": "dlm-kmp-default-5.3.18-24.9.1.x86_64", "product_id": "dlm-kmp-default-5.3.18-24.9.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-preempt-5.3.18-24.9.1.x86_64", "product": { "name": "dlm-kmp-preempt-5.3.18-24.9.1.x86_64", "product_id": "dlm-kmp-preempt-5.3.18-24.9.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-5.3.18-24.9.1.x86_64", "product": { "name": "gfs2-kmp-default-5.3.18-24.9.1.x86_64", "product_id": "gfs2-kmp-default-5.3.18-24.9.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-preempt-5.3.18-24.9.1.x86_64", "product": { "name": "gfs2-kmp-preempt-5.3.18-24.9.1.x86_64", "product_id": "gfs2-kmp-preempt-5.3.18-24.9.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-5.3.18-24.9.1.x86_64", "product": { "name": "kernel-debug-5.3.18-24.9.1.x86_64", "product_id": "kernel-debug-5.3.18-24.9.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-5.3.18-24.9.1.x86_64", "product": { "name": "kernel-debug-devel-5.3.18-24.9.1.x86_64", "product_id": "kernel-debug-devel-5.3.18-24.9.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-5.3.18-24.9.1.x86_64", "product": { "name": "kernel-debug-livepatch-devel-5.3.18-24.9.1.x86_64", "product_id": "kernel-debug-livepatch-devel-5.3.18-24.9.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-5.3.18-24.9.1.x86_64", "product": { "name": "kernel-default-5.3.18-24.9.1.x86_64", "product_id": "kernel-default-5.3.18-24.9.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "product": { "name": "kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "product_id": "kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-rebuild-5.3.18-24.9.1.9.2.6.x86_64", "product": { "name": "kernel-default-base-rebuild-5.3.18-24.9.1.9.2.6.x86_64", "product_id": "kernel-default-base-rebuild-5.3.18-24.9.1.9.2.6.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-5.3.18-24.9.1.x86_64", "product": { "name": "kernel-default-devel-5.3.18-24.9.1.x86_64", "product_id": "kernel-default-devel-5.3.18-24.9.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-5.3.18-24.9.1.x86_64", "product": { "name": "kernel-default-extra-5.3.18-24.9.1.x86_64", "product_id": "kernel-default-extra-5.3.18-24.9.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-5.3.18-24.9.1.x86_64", "product": { "name": "kernel-default-livepatch-5.3.18-24.9.1.x86_64", "product_id": "kernel-default-livepatch-5.3.18-24.9.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "product": { "name": "kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "product_id": "kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-5.3.18-24.9.1.x86_64", "product": { "name": "kernel-kvmsmall-5.3.18-24.9.1.x86_64", "product_id": "kernel-kvmsmall-5.3.18-24.9.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-5.3.18-24.9.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-5.3.18-24.9.1.x86_64", "product_id": "kernel-kvmsmall-devel-5.3.18-24.9.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-5.3.18-24.9.1.x86_64", "product": { "name": "kernel-kvmsmall-livepatch-devel-5.3.18-24.9.1.x86_64", "product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-24.9.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "product": { "name": "kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "product_id": "kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-5_3_18-24_9-preempt-1-5.3.6.x86_64", "product": { "name": "kernel-livepatch-5_3_18-24_9-preempt-1-5.3.6.x86_64", "product_id": "kernel-livepatch-5_3_18-24_9-preempt-1-5.3.6.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-5.3.18-24.9.1.x86_64", "product": { "name": "kernel-obs-build-5.3.18-24.9.1.x86_64", "product_id": "kernel-obs-build-5.3.18-24.9.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-5.3.18-24.9.1.x86_64", "product": { "name": "kernel-obs-qa-5.3.18-24.9.1.x86_64", "product_id": "kernel-obs-qa-5.3.18-24.9.1.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-5.3.18-24.9.1.x86_64", "product": { "name": "kernel-preempt-5.3.18-24.9.1.x86_64", "product_id": "kernel-preempt-5.3.18-24.9.1.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-devel-5.3.18-24.9.1.x86_64", "product": { "name": "kernel-preempt-devel-5.3.18-24.9.1.x86_64", "product_id": "kernel-preempt-devel-5.3.18-24.9.1.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-extra-5.3.18-24.9.1.x86_64", "product": { "name": "kernel-preempt-extra-5.3.18-24.9.1.x86_64", "product_id": "kernel-preempt-extra-5.3.18-24.9.1.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-livepatch-5.3.18-24.9.1.x86_64", "product": { "name": "kernel-preempt-livepatch-5.3.18-24.9.1.x86_64", "product_id": "kernel-preempt-livepatch-5.3.18-24.9.1.x86_64" } }, { "category": "product_version", "name": "kernel-preempt-livepatch-devel-5.3.18-24.9.1.x86_64", "product": { "name": "kernel-preempt-livepatch-devel-5.3.18-24.9.1.x86_64", "product_id": "kernel-preempt-livepatch-devel-5.3.18-24.9.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-5.3.18-24.9.1.x86_64", "product": { "name": "kernel-syms-5.3.18-24.9.1.x86_64", "product_id": "kernel-syms-5.3.18-24.9.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-5.3.18-24.9.1.x86_64", "product": { "name": "kselftests-kmp-default-5.3.18-24.9.1.x86_64", "product_id": "kselftests-kmp-default-5.3.18-24.9.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-preempt-5.3.18-24.9.1.x86_64", "product": { "name": "kselftests-kmp-preempt-5.3.18-24.9.1.x86_64", "product_id": "kselftests-kmp-preempt-5.3.18-24.9.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "product": { "name": "ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "product_id": "ocfs2-kmp-default-5.3.18-24.9.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-preempt-5.3.18-24.9.1.x86_64", "product": { "name": "ocfs2-kmp-preempt-5.3.18-24.9.1.x86_64", "product_id": "ocfs2-kmp-preempt-5.3.18-24.9.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "product": { "name": "reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "product_id": "reiserfs-kmp-default-5.3.18-24.9.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-preempt-5.3.18-24.9.1.x86_64", "product": { "name": "reiserfs-kmp-preempt-5.3.18-24.9.1.x86_64", "product_id": "reiserfs-kmp-preempt-5.3.18-24.9.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP2", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Development Tools 15 SP2", "product": { "name": "SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-development-tools:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Legacy 15 SP2", "product": { "name": "SUSE Linux Enterprise Module for Legacy 15 SP2", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-legacy:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 15 SP2", "product": { "name": "SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:15:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 15 SP2", "product": { "name": "SUSE Linux Enterprise Workstation Extension 15 SP2", "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:15:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-24.9.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64" }, "product_reference": "kernel-default-5.3.18-24.9.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-24.9.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le" }, "product_reference": "kernel-default-5.3.18-24.9.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-24.9.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x" }, "product_reference": "kernel-default-5.3.18-24.9.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-5.3.18-24.9.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64" }, "product_reference": "kernel-default-5.3.18-24.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64" }, "product_reference": "kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le" }, "product_reference": "kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-24.9.1.9.2.6.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x" }, "product_reference": "kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64" }, "product_reference": "kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-24.9.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64" }, "product_reference": "kernel-default-devel-5.3.18-24.9.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-24.9.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le" }, "product_reference": "kernel-default-devel-5.3.18-24.9.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-24.9.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x" }, "product_reference": "kernel-default-devel-5.3.18-24.9.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-5.3.18-24.9.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64" }, "product_reference": "kernel-default-devel-5.3.18-24.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-5.3.18-24.9.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch" }, "product_reference": "kernel-devel-5.3.18-24.9.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-5.3.18-24.9.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch" }, "product_reference": "kernel-macros-5.3.18-24.9.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-24.9.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64" }, "product_reference": "kernel-preempt-5.3.18-24.9.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-5.3.18-24.9.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64" }, "product_reference": "kernel-preempt-5.3.18-24.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-5.3.18-24.9.2.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch" }, "product_reference": "kernel-docs-5.3.18-24.9.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-24.9.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64" }, "product_reference": "kernel-obs-build-5.3.18-24.9.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-24.9.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le" }, "product_reference": "kernel-obs-build-5.3.18-24.9.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-24.9.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x" }, "product_reference": "kernel-obs-build-5.3.18-24.9.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-5.3.18-24.9.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64" }, "product_reference": "kernel-obs-build-5.3.18-24.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-24.9.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64" }, "product_reference": "kernel-preempt-devel-5.3.18-24.9.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-preempt-devel-5.3.18-24.9.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64" }, "product_reference": "kernel-preempt-devel-5.3.18-24.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-5.3.18-24.9.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch" }, "product_reference": "kernel-source-5.3.18-24.9.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-24.9.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64" }, "product_reference": "kernel-syms-5.3.18-24.9.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-24.9.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le" }, "product_reference": "kernel-syms-5.3.18-24.9.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-24.9.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x" }, "product_reference": "kernel-syms-5.3.18-24.9.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-5.3.18-24.9.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64" }, "product_reference": "kernel-syms-5.3.18-24.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-24.9.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP2", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64" }, "product_reference": "reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-24.9.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP2", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-24.9.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP2", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x" }, "product_reference": "reiserfs-kmp-default-5.3.18-24.9.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-5.3.18-24.9.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP2", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64" }, "product_reference": "reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.3.18-24.9.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le" }, "product_reference": "kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.3.18-24.9.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x" }, "product_reference": "kernel-default-livepatch-5.3.18-24.9.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-5.3.18-24.9.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64" }, "product_reference": "kernel-default-livepatch-5.3.18-24.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le" }, "product_reference": "kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.3.18-24.9.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x" }, "product_reference": "kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64" }, "product_reference": "kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le" }, "product_reference": "kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x" }, "product_reference": "kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", "product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64" }, "product_reference": "kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-24.9.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64" }, "product_reference": "cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-24.9.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-24.9.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x" }, "product_reference": "cluster-md-kmp-default-5.3.18-24.9.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-5.3.18-24.9.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64" }, "product_reference": "cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-24.9.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64" }, "product_reference": "dlm-kmp-default-5.3.18-24.9.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-24.9.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le" }, "product_reference": "dlm-kmp-default-5.3.18-24.9.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-24.9.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x" }, "product_reference": "dlm-kmp-default-5.3.18-24.9.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-5.3.18-24.9.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64" }, "product_reference": "dlm-kmp-default-5.3.18-24.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-24.9.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64" }, "product_reference": "gfs2-kmp-default-5.3.18-24.9.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-24.9.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le" }, "product_reference": "gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-24.9.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x" }, "product_reference": "gfs2-kmp-default-5.3.18-24.9.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-5.3.18-24.9.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64" }, "product_reference": "gfs2-kmp-default-5.3.18-24.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-24.9.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64" }, "product_reference": "ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-24.9.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-24.9.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x" }, "product_reference": "ocfs2-kmp-default-5.3.18-24.9.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-5.3.18-24.9.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64" }, "product_reference": "ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-5.3.18-24.9.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP2", "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" }, "product_reference": "kernel-default-extra-5.3.18-24.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP2" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-19462", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19462" } ], "notes": [ { "category": "general", "text": "relay_open in kernel/relay.c in the Linux kernel through 5.4.1 allows local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19462", "url": "https://www.suse.com/security/cve/CVE-2019-19462" }, { "category": "external", "summary": "SUSE Bug 1158265 for CVE-2019-19462", "url": "https://bugzilla.suse.com/1158265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T14:42:51Z", "details": "low" } ], "title": "CVE-2019-19462" }, { "cve": "CVE-2019-20810", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20810" } ], "notes": [ { "category": "general", "text": "go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel before 5.6 does not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20810", "url": "https://www.suse.com/security/cve/CVE-2019-20810" }, { "category": "external", "summary": "SUSE Bug 1172458 for CVE-2019-20810", "url": "https://bugzilla.suse.com/1172458" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T14:42:51Z", "details": "low" } ], "title": "CVE-2019-20810" }, { "cve": "CVE-2019-20812", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20812" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.4.7. The prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20812", "url": "https://www.suse.com/security/cve/CVE-2019-20812" }, { "category": "external", "summary": "SUSE Bug 1172453 for CVE-2019-20812", "url": "https://bugzilla.suse.com/1172453" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T14:42:51Z", "details": "moderate" } ], "title": "CVE-2019-20812" }, { "cve": "CVE-2020-0305", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0305" } ], "notes": [ { "category": "general", "text": "In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-153467744", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0305", "url": "https://www.suse.com/security/cve/CVE-2020-0305" }, { "category": "external", "summary": "SUSE Bug 1174462 for CVE-2020-0305", "url": "https://bugzilla.suse.com/1174462" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T14:42:51Z", "details": "moderate" } ], "title": "CVE-2020-0305" }, { "cve": "CVE-2020-10135", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10135" } ], "notes": [ { "category": "general", "text": "Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10135", "url": "https://www.suse.com/security/cve/CVE-2020-10135" }, { "category": "external", "summary": "SUSE Bug 1171988 for CVE-2020-10135", "url": "https://bugzilla.suse.com/1171988" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T14:42:51Z", "details": "moderate" } ], "title": "CVE-2020-10135" }, { "cve": "CVE-2020-10711", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10711" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s SELinux subsystem in versions before 5.7. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol\u0027s category bitmap into the SELinux extensible bitmap via the\u0027 ebitmap_netlbl_import\u0027 routine. While processing the CIPSO restricted bitmap tag in the \u0027cipso_v4_parsetag_rbm\u0027 routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allows a remote network user to crash the system kernel, resulting in a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10711", "url": "https://www.suse.com/security/cve/CVE-2020-10711" }, { "category": "external", "summary": "SUSE Bug 1171191 for CVE-2020-10711", "url": "https://bugzilla.suse.com/1171191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T14:42:51Z", "details": "moderate" } ], "title": "CVE-2020-10711" }, { "cve": "CVE-2020-10732", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10732" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10732", "url": "https://www.suse.com/security/cve/CVE-2020-10732" }, { "category": "external", "summary": "SUSE Bug 1171220 for CVE-2020-10732", "url": "https://bugzilla.suse.com/1171220" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T14:42:51Z", "details": "low" } ], "title": "CVE-2020-10732" }, { "cve": "CVE-2020-10751", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10751" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10751", "url": "https://www.suse.com/security/cve/CVE-2020-10751" }, { "category": "external", "summary": "SUSE Bug 1171189 for CVE-2020-10751", "url": "https://bugzilla.suse.com/1171189" }, { "category": "external", "summary": "SUSE Bug 1174963 for CVE-2020-10751", "url": "https://bugzilla.suse.com/1174963" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T14:42:51Z", "details": "moderate" } ], "title": "CVE-2020-10751" }, { "cve": "CVE-2020-10766", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10766" } ], "notes": [ { "category": "general", "text": "A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10766", "url": "https://www.suse.com/security/cve/CVE-2020-10766" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172781 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1172781" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T14:42:51Z", "details": "moderate" } ], "title": "CVE-2020-10766" }, { "cve": "CVE-2020-10767", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10767" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10767", "url": "https://www.suse.com/security/cve/CVE-2020-10767" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172782 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1172782" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T14:42:51Z", "details": "moderate" } ], "title": "CVE-2020-10767" }, { "cve": "CVE-2020-10768", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10768" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10768", "url": "https://www.suse.com/security/cve/CVE-2020-10768" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172783 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1172783" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T14:42:51Z", "details": "moderate" } ], "title": "CVE-2020-10768" }, { "cve": "CVE-2020-10773", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10773" } ], "notes": [ { "category": "general", "text": "A stack information leak flaw was found in s390/s390x in the Linux kernel\u0027s memory manager functionality, where it incorrectly writes to the /proc/sys/vm/cmm_timeout file. This flaw allows a local user to see the kernel data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10773", "url": "https://www.suse.com/security/cve/CVE-2020-10773" }, { "category": "external", "summary": "SUSE Bug 1172999 for CVE-2020-10773", "url": "https://bugzilla.suse.com/1172999" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T14:42:51Z", "details": "low" } ], "title": "CVE-2020-10773" }, { "cve": "CVE-2020-10781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10781" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel before 5.8-rc6 in the ZRAM kernel module, where a user with a local account and the ability to read the /sys/class/zram-control/hot_add file can create ZRAM device nodes in the /dev/ directory. This read allocates kernel memory and is not accounted for a user that triggers the creation of that ZRAM device. With this vulnerability, continually reading the device may consume a large amount of system memory and cause the Out-of-Memory (OOM) killer to activate and terminate random userspace processes, possibly making the system inoperable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10781", "url": "https://www.suse.com/security/cve/CVE-2020-10781" }, { "category": "external", "summary": "SUSE Bug 1173074 for CVE-2020-10781", "url": "https://bugzilla.suse.com/1173074" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T14:42:51Z", "details": "moderate" } ], "title": "CVE-2020-10781" }, { "cve": "CVE-2020-12656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12656" } ], "notes": [ { "category": "general", "text": "gss_mech_free in net/sunrpc/auth_gss/gss_mech_switch.c in the rpcsec_gss_krb5 implementation in the Linux kernel through 5.6.10 lacks certain domain_release calls, leading to a memory leak. Note: This was disputed with the assertion that the issue does not grant any access not already available. It is a problem that on unloading a specific kernel module some memory is leaked, but loading kernel modules is a privileged operation. A user could also write a kernel module to consume any amount of memory they like and load that replicating the effect of this bug", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12656", "url": "https://www.suse.com/security/cve/CVE-2020-12656" }, { "category": "external", "summary": "SUSE Bug 1171219 for CVE-2020-12656", "url": "https://bugzilla.suse.com/1171219" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T14:42:51Z", "details": "low" } ], "title": "CVE-2020-12656" }, { "cve": "CVE-2020-12769", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12769" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.4.17. drivers/spi/spi-dw.c allows attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one, aka CID-19b61392c5a8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12769", "url": "https://www.suse.com/security/cve/CVE-2020-12769" }, { "category": "external", "summary": "SUSE Bug 1171983 for CVE-2020-12769", "url": "https://bugzilla.suse.com/1171983" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T14:42:51Z", "details": "moderate" } ], "title": "CVE-2020-12769" }, { "cve": "CVE-2020-12771", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12771" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.6.11. btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12771", "url": "https://www.suse.com/security/cve/CVE-2020-12771" }, { "category": "external", "summary": "SUSE Bug 1171732 for CVE-2020-12771", "url": "https://bugzilla.suse.com/1171732" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T14:42:51Z", "details": "moderate" } ], "title": "CVE-2020-12771" }, { "cve": "CVE-2020-12888", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12888" } ], "notes": [ { "category": "general", "text": "The VFIO PCI driver in the Linux kernel through 5.6.13 mishandles attempts to access disabled memory space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12888", "url": "https://www.suse.com/security/cve/CVE-2020-12888" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1171868 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1171868" }, { "category": "external", "summary": "SUSE Bug 1176979 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1176979" }, { "category": "external", "summary": "SUSE Bug 1179612 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1179612" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T14:42:51Z", "details": "moderate" } ], "title": "CVE-2020-12888" }, { "cve": "CVE-2020-13143", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-13143" } ], "notes": [ { "category": "general", "text": "gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c in the Linux kernel 3.16 through 5.6.13 relies on kstrdup without considering the possibility of an internal \u0027\\0\u0027 value, which allows attackers to trigger an out-of-bounds read, aka CID-15753588bcd4.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-13143", "url": "https://www.suse.com/security/cve/CVE-2020-13143" }, { "category": "external", "summary": "SUSE Bug 1171982 for CVE-2020-13143", "url": "https://bugzilla.suse.com/1171982" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T14:42:51Z", "details": "moderate" } ], "title": "CVE-2020-13143" }, { "cve": "CVE-2020-13974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-13974" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel 4.4 through 5.7.1. drivers/tty/vt/keyboard.c has an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. NOTE: Members in the community argue that the integer overflow does not lead to a security issue in this case.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-13974", "url": "https://www.suse.com/security/cve/CVE-2020-13974" }, { "category": "external", "summary": "SUSE Bug 1172775 for CVE-2020-13974", "url": "https://bugzilla.suse.com/1172775" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T14:42:51Z", "details": "moderate" } ], "title": "CVE-2020-13974" }, { "cve": "CVE-2020-14416", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14416" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.4.16, a race condition in tty-\u003edisc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14416", "url": "https://www.suse.com/security/cve/CVE-2020-14416" }, { "category": "external", "summary": "SUSE Bug 1162002 for CVE-2020-14416", "url": "https://bugzilla.suse.com/1162002" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T14:42:51Z", "details": "moderate" } ], "title": "CVE-2020-14416" }, { "cve": "CVE-2020-15393", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15393" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.4 through 5.7.6, usbtest_disconnect in drivers/usb/misc/usbtest.c has a memory leak, aka CID-28ebeb8db770.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15393", "url": "https://www.suse.com/security/cve/CVE-2020-15393" }, { "category": "external", "summary": "SUSE Bug 1173514 for CVE-2020-15393", "url": "https://bugzilla.suse.com/1173514" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T14:42:51Z", "details": "moderate" } ], "title": "CVE-2020-15393" }, { "cve": "CVE-2020-15780", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15780" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15780", "url": "https://www.suse.com/security/cve/CVE-2020-15780" }, { "category": "external", "summary": "SUSE Bug 1173573 for CVE-2020-15780", "url": "https://bugzilla.suse.com/1173573" }, { "category": "external", "summary": "SUSE Bug 1174186 for CVE-2020-15780", "url": "https://bugzilla.suse.com/1174186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_9-default-1-5.3.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.9.1.9.2.6.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.9.2.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.9.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.9.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T14:42:51Z", "details": "important" } ], "title": "CVE-2020-15780" } ] }
suse-su-2020:2478-1
Vulnerability from csaf_suse
Published
2020-09-03 10:12
Modified
2020-09-03 10:12
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP5 RT kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it. This attack is known as Special Register Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).
- CVE-2020-13143: Fixed an out-of-bounds read in gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c (bsc#1171982).
- CVE-2020-12769: Fixed an issue which could have allowed attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one (bsc#1171983).
- CVE-2020-12659: Fixed an out-of-bounds write (by a user with the CAP_NET_ADMIN capability) due to improper headroom validation (bsc#1171214).
- CVE-2020-12657: An a use-after-free in block/bfq-iosched.c (bsc#1171205).
- CVE-2020-12656: Fixed an improper handling of certain domain_release calls leadingch could have led to a memory leak (bsc#1171219).
- CVE-2020-12655: Fixed an issue which could have allowed attackers to trigger a sync of excessive duration via an XFS v5 image with crafted metadata (bsc#1171217).
- CVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a remote AP to trigger a heap-based buffer overflow (bsc#1171202).
- CVE-2020-12653: Fixed an issue in the wifi driver which could have allowed local users to gain privileges or cause a denial of service (bsc#1171195).
- CVE-2020-12652: Fixed an issue which could have allowed local users to hold an incorrect lock during the ioctl operation and trigger a race condition (bsc#1171218).
- CVE-2020-12464: Fixed a use-after-free due to a transfer without a reference (bsc#1170901).
- CVE-2020-12114: Fixed a pivot_root race condition which could have allowed local users to cause a denial of service (panic) by corrupting a mountpoint reference counter (bsc#1171098).
- CVE-2020-11669: Fixed an issue where arch/powerpc/kernel/idle_book3s.S did not have save/restore functionality for PNV_POWERSAVE_AMR, PNV_POWERSAVE_UAMOR, and PNV_POWERSAVE_AMOR (bnc#1169390).
- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172317).
- CVE-2020-10751: Fixed an improper implementation in SELinux LSM hook where it was assumed that an skb would only contain a single netlink message (bsc#1171189).
- CVE-2020-10732: Fixed kernel data leak in userspace coredumps due to uninitialized data (bsc#1171220).
- CVE-2020-10720: Fixed a use-after-free read in napi_gro_frags() (bsc#1170778).
- CVE-2020-10711: Fixed a null pointer dereference in SELinux subsystem which could have allowed a remote network user to crash the kernel resulting in a denial of service (bsc#1171191).
- CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev (bsc#1170056).
- CVE-2019-20908: An issue was discovered in drivers/firmware/efi/efi.c where incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032 (bnc#1173567).
- CVE-2020-10781: zram sysfs resource consumption was fixed (bnc#1173074).
- CVE-2020-15780: An issue was discovered in drivers/acpi/acpi_configfs.c where injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30 (bnc#1173573).
- CVE-2020-15393: usbtest_disconnect in drivers/usb/misc/usbtest.c had a memory leak, aka CID-28ebeb8db770 (bnc#1173514).
- CVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c had a deadlock if a coalescing operation fails (bnc#1171732).
- CVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).
- CVE-2020-10769: A buffer over-read flaw was found in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm's module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash. This flaw allowed a local attacker with user privileges to cause a denial of service (bnc#1173265).
- CVE-2020-10773: A kernel stack information leak on s390/s390x was fixed (bnc#1172999).
- CVE-2020-14416: A race condition in tty->disc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).
- CVE-2020-10766: Fixed an issue which allowed an attacker with a local account to disable SSBD protection (bnc#1172781).
- CVE-2020-10767: Fixed an issue where Indirect Branch Prediction Barrier was disabled in certain circumstances, leaving the system open to a spectre v2 style attack (bnc#1172782).
- CVE-2020-10768: Fixed an issue with the prctl() function, where indirect branch speculation could be enabled even though it was diabled before (bnc#1172783).
- CVE-2020-13974: Fixed a integer overflow in drivers/tty/vt/keyboard.c, if k_ascii is called several times in a row (bnc#1172775).
- CVE-2019-20810: go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c did not call snd_card_free for a failure path, which caused a memory leak, aka CID-9453264ef586 (bnc#1172458).
- CVE-2019-16746: An issue was discovered in net/wireless/nl80211.c, where the length of variable elements in a beacon head was not checked, leading to a buffer overflow (bnc#1152107 1173659).
- CVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a video driver. This could lead to local information disclosure with System execution privileges needed (bsc#1170345).
- CVE-2019-20812: Fixed an issue in prb_calc_retire_blk_tmo() which could have resulted in a denial of service (bsc#1172453).
- CVE-2019-20806: Fixed a null pointer dereference which may had lead to denial of service (bsc#1172199).
- CVE-2019-19462: Fixed an issue which could have allowed local user to cause denial of service (bsc#1158265).
- CVE-2018-1000199: Fixed a potential local code execution via ptrace (bsc#1089895).
The following non-security bugs were fixed:
- ACPI: CPPC: Fix reference count leak in acpi_cppc_processor_probe() (bsc#1051510).
- ACPI: GED: add support for _Exx / _Lxx handler methods (bsc#1111666).
- ACPI: GED: use correct trigger type field in _Exx / _Lxx handling (bsc#1111666).
- ACPI: NFIT: Fix unlock on error in scrub_show() (bsc#1171753).
- ACPI: PM: Avoid using power resources if there are none for D0 (bsc#1051510).
- ACPI: sysfs: Fix pm_profile_attr type (bsc#1111666).
- ACPI: sysfs: Fix reference count leak in acpi_sysfs_add_hotplug_profile() (bsc#1051510).
- acpi/x86: ignore unspecified bit positions in the ACPI global lock field (bsc#1051510).
- Add br_netfilter to kernel-default-base (bsc#1169020)
- agp/intel: Reinforce the barrier after GTT updates (bsc#1051510).
- ahci: Add support for Amazon's Annapurna Labs SATA controller (bsc#1169013).
- ALSA: ctxfi: Remove unnecessary cast in kfree (bsc#1051510).
- ALSA: doc: Document PC Beep Hidden Register on Realtek ALC256 (bsc#1051510).
- ALSA: dummy: Fix PCM format loop in proc output (bsc#1111666).
- ALSA: es1688: Add the missed snd_card_free() (bsc#1051510).
- ALSA: hda: Add driver blacklist (bsc#1051510).
- ALSA: hda: Add ElkhartLake HDMI codec vid (bsc#1111666).
- ALSA: hda: add sienna_cichlid audio asic id for sienna_cichlid up (bsc#1111666).
- ALSA: hda: Always use jackpoll helper for jack update after resume (bsc#1051510).
- ALSA: hda: call runtime_allow() for all hda controllers (bsc#1051510).
- ALSA: hda: Do not release card at firmware loading error (bsc#1051510).
- ALSA: hda: Explicitly permit using autosuspend if runtime PM is supported (bsc#1051510).
- ALSA: hda: Fix potential access overflow in beep helper (bsc#1051510).
- ALSA: hda/hdmi - enable runtime pm for newer AMD display audio (bsc#1111666).
- ALSA: hda/hdmi: fix race in monitor detection during probe (bsc#1051510).
- ALSA: hda/hdmi: fix without unlocked before return (bsc#1051510).
- ALSA: hda: Honor PM disablement in PM freeze and thaw_noirq ops (bsc#1051510).
- ALSA: hda: Keep the controller initialization even if no codecs found (bsc#1051510).
- ALSA: hda: Match both PCI ID and SSID for driver blacklist (bsc#1111666).
- ALSA: hda/realtek - Add a model for Thinkpad T570 without DAC workaround (bsc#1172017).
- ALSA: hda/realtek - add a pintbl quirk for several Lenovo machines (bsc#1111666).
- ALSA: hda/realtek - Add COEF workaround for ASUS ZenBook UX431DA (git-fixes).
- ALSA: hda/realtek - Add HP new mute led supported for ALC236 (git-fixes).
- ALSA: hda/realtek - Add LED class support for micmute LED (bsc#1111666).
- ALSA: hda/realtek - Add more fixup entries for Clevo machines (git-fixes).
- ALSA: hda/realtek - Add new codec supported for ALC245 (bsc#1051510).
- ALSA: hda/realtek - Add new codec supported for ALC287 (git-fixes).
- ALSA: hda/realtek: Add quirk for Samsung Notebook (git-fixes).
- ALSA: hda/realtek - Add supported new mute Led for HP (git-fixes).
- ALSA: hda/realtek - Enable headset mic of ASUS GL503VM with ALC295 (git-fixes).
- ALSA: hda/realtek - Enable headset mic of ASUS UX550GE with ALC295 (git-fixes).
- ALSA: hda/realtek: Enable headset mic of ASUS UX581LV with ALC295 (git-fixes).
- ALSA: hda/realtek - Enable micmute LED on and HP system (bsc#1111666).
- ALSA: hda/realtek - Enable Speaker for ASUS UX533 and UX534 (bsc#1111666).
- ALSA: hda/realtek - Enable the headset mic on Asus FX505DT (bsc#1051510).
- ALSA: hda/realtek - Fix S3 pop noise on Dell Wyse (git-fixes).
- ALSA: hda/realtek - Fix silent output on Gigabyte X570 Aorus Xtreme (bsc#1111666).
- ALSA: hda/realtek - Fix unexpected init_amp override (bsc#1051510).
- ALSA: hda/realtek - Fix unused variable warning w/o CONFIG_LEDS_TRIGGER_AUDIO (bsc#1111666).
- ALSA: hda/realtek - Introduce polarity for micmute LED GPIO (bsc#1111666).
- ALSA: hda/realtek - Limit int mic boost for Thinkpad T530 (git-fixes bsc#1171293).
- ALSA: hda/realtek - Two front mics on a Lenovo ThinkCenter (bsc#1051510).
- ALSA: hda: Release resources at error in delayed probe (bsc#1051510).
- ALSA: hda: Remove ASUS ROG Zenith from the blacklist (bsc#1051510).
- ALSA: hda: Skip controller resume if not needed (bsc#1051510).
- ALSA: hwdep: fix a left shifting 1 by 31 UB bug (git-fixes).
- ALSA: ice1724: Fix invalid access for enumerated ctl items (bsc#1051510).
- ALSA: iec1712: Initialize STDSP24 properly when using the model=staudio option (git-fixes).
- ALSA: lx6464es - add support for LX6464ESe pci express variant (bsc#1111666).
- ALSA: opti9xx: shut up gcc-10 range warning (bsc#1051510).
- ALSA: pcm: disallow linking stream to itself (bsc#1111666).
- ALSA: pcm: fix incorrect hw_base increase (git-fixes).
- ALSA: pcm: oss: Fix regression by buffer overflow fix (bsc#1051510).
- ALSA: pcm: oss: Place the plugin buffer overflow checks correctly (bsc#1170522).
- ALSA: rawmidi: Fix racy buffer resize under concurrent accesses (git-fixes).
- ALSA: usb-audio: Add connector notifier delegation (bsc#1051510).
- ALSA: usb-audio: Add control message quirk delay for Kingston HyperX headset (git-fixes).
- ALSA: usb-audio: Add duplex sound support for USB devices using implicit feedback (bsc#1111666).
- ALSA: usb-audio: add mapping for ASRock TRX40 Creator (git-fixes).
- ALSA: usb-audio: Add mixer workaround for TRX40 and co (bsc#1051510).
- ALSA: usb-audio: Add Pioneer DJ DJM-900NXS2 support (bsc#1111666).
- ALSA: usb-audio: Add quirk for Focusrite Scarlett 2i2 (bsc#1051510).
- ALSA: usb-audio: Add static mapping table for ALC1220-VB-based mobos (bsc#1051510).
- ALSA: usb-audio: Add vendor, product and profile name for HP Thunderbolt Dock (bsc#1111666).
- ALSA: usb-audio: Apply async workaround for Scarlett 2i4 2nd gen (bsc#1051510).
- ALSA: usb-audio: Check mapping at creating connector controls, too (bsc#1051510).
- ALSA: usb-audio: Clean up quirk entries with macros (bsc#1111666).
- ALSA: usb-audio: Correct a typo of NuPrime DAC-10 USB ID (bsc#1051510).
- ALSA: usb-audio: Do not create jack controls for PCM terminals (bsc#1051510).
- ALSA: usb-audio: Do not override ignore_ctl_error value from the map (bsc#1051510).
- ALSA: usb-audio: Filter error from connector kctl ops, too (bsc#1051510).
- ALSA: usb-audio: Fix inconsistent card PM state after resume (bsc#1111666).
- ALSA: usb-audio: Fix packet size calculation (bsc#1111666).
- ALSA: usb-audio: Fix racy list management in output queue (bsc#1111666).
- ALSA: usb-audio: Fix usb audio refcnt leak when getting spdif (bsc#1051510).
- ALSA: usb-audio: Improve frames size computation (bsc#1111666).
- ALSA: usb-audio: Manage auto-pm of all bundled interfaces (bsc#1111666).
- ALSA: usb-audio: mixer: volume quirk for ESS Technology Asus USB DAC (git-fixes).
- ALSA: usb-audio: Quirks for Gigabyte TRX40 Aorus Master onboard audio (git-fixes).
- ALSA: usb-audio: Use the new macro for HP Dock rename quirks (bsc#1111666).
- ALSA: usx2y: Fix potential NULL dereference (bsc#1051510).
- amdgpu: a NULL ->mm does not mean a thread is a kthread (git-fixes).
- arm64: map FDT as RW for early_init_dt_scan() (jsc#SLE-12423).
- ASoC: codecs: hdac_hdmi: Fix incorrect use of list_for_each_entry (bsc#1051510).
- ASoC: dapm: connect virtual mux with default value (bsc#1051510).
- ASoC: dapm: fixup dapm kcontrol widget (bsc#1051510).
- ASoC: dpcm: allow start or stop during pause for backend (bsc#1051510).
- ASoC: fix regwmask (bsc#1051510).
- ASoC: Intel: atom: Take the drv->lock mutex before calling sst_send_slot_map() (bsc#1051510).
- ASoC: msm8916-wcd-digital: Reset RX interpolation path after use (bsc#1051510).
- ASoC: samsung: Prevent clk_get_rate() calls in atomic context (bsc#1111666).
- ASoC: topology: Check return value of pcm_new_ver (bsc#1051510).
- ASoC: topology: use name_prefix for new kcontrol (bsc#1051510).
- ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb (bsc#1111666).
- ath9k: Fix use-after-free Read in ath9k_wmi_ctrl_rx (bsc#1111666).
- ath9k: Fix use-after-free Write in ath9k_htc_rx_msg (bsc#1111666).
- ath9x: Fix stack-out-of-bounds Write in ath9k_hif_usb_rx_cb (bsc#1111666).
- ax25: fix setsockopt(SO_BINDTODEVICE) (networking-stable-20_05_27).
- b43: Fix connection problem with WPA3 (bsc#1111666).
- b43legacy: Fix case where channel status is corrupted (bsc#1051510).
- b43_legacy: Fix connection problem with WPA3 (bsc#1111666).
- batman-adv: fix batadv_nc_random_weight_tq (git-fixes).
- batman-adv: Fix refcnt leak in batadv_show_throughput_override (git-fixes).
- batman-adv: Fix refcnt leak in batadv_store_throughput_override (git-fixes).
- batman-adv: Fix refcnt leak in batadv_v_ogm_process (git-fixes).
- bcache: avoid unnecessary btree nodes flushing in btree_flush_write() (git fixes (block drivers)).
- bcache: Fix an error code in bch_dump_read() (git fixes (block drivers)).
- bcache: fix incorrect data type usage in btree_flush_write() (git fixes (block drivers)).
- bcache: Revert 'bcache: shrink btree node cache after bch_btree_check()' (git fixes (block drivers)).
- be2net: fix link failure after ethtool offline test (git-fixes).
- blk-mq: honor IO scheduler for multiqueue devices (bsc#1165478).
- blk-mq: simplify blk_mq_make_request() (bsc#1165478).
- block, bfq: add requeue-request hook (bsc#1104967 bsc#1171673).
- block, bfq: fix use-after-free in bfq_idle_slice_timer_body (bsc#1168760).
- block, bfq: postpone rq preparation to insert or merge (bsc#1104967 bsc#1171673).
- block/drbd: delete invalid function drbd_md_mark_dirty_ (bsc#1171527).
- block: drbd: remove a stray unlock in __drbd_send_protocol() (bsc#1171599).
- block: fix busy device checking in blk_drop_partitions again (bsc#1171948).
- block: fix busy device checking in blk_drop_partitions (bsc#1171948).
- block: fix memleak of bio integrity data (git fixes (block drivers)).
- block: keep bdi->io_pages in sync with max_sectors_kb for stacked devices (bsc#1168762).
- block: nr_sects_write(): Disable preemption on seqcount write (bsc#1173818).
- block: remove QUEUE_FLAG_STACKABLE (git fixes (block drivers)).
- block: remove the bd_openers checks in blk_drop_partitions (bsc#1171948).
- block: sed-opal: fix sparse warning: convert __be64 data (git fixes (block drivers)).
- Bluetooth: Add SCO fallback for invalid LMP parameters error (bsc#1111666).
- Bluetooth: RFCOMM: fix ODEBUG bug in rfcomm_dev_ioctl (bsc#1051510).
- bnxt_en: Fix AER reset logic on 57500 chips (git-fixes).
- bnxt_en: Fix ethtool selftest crash under error conditions (git-fixes).
- bnxt_en: Fix handling FRAG_ERR when NVM_INSTALL_UPDATE cmd fails (git-fixes).
- bnxt_en: Fix ipv6 RFS filter matching logic (git-fixes).
- bnxt_en: fix memory leaks in bnxt_dcbnl_ieee_getets() (networking-stable-20_03_28).
- bnxt_en: fix NULL dereference in case SR-IOV configuration fails (git-fixes).
- bnxt_en: Fix VF anti-spoof filter setup (networking-stable-20_05_12).
- bnxt_en: Fix VLAN acceleration handling in bnxt_fix_features() (networking-stable-20_05_12).
- bnxt_en: Improve AER slot reset (networking-stable-20_05_12).
- bnxt_en: Reduce BNXT_MSIX_VEC_MAX value to supported CQs per PF (bsc#1104745).
- bnxt_en: reinitialize IRQs when MTU is modified (networking-stable-20_03_14).
- bnxt_en: Return error if bnxt_alloc_ctx_mem() fails (bsc#1104745 ).
- bnxt_en: Return error when allocating zero size context memory (bsc#1104745).
- bonding/alb: make sure arp header is pulled before accessing it (networking-stable-20_03_14).
- bpf: Fix sk_psock refcnt leak when receiving message (bsc#1083647).
- bpf: Forbid XADD on spilled pointers for unprivileged users (bsc#1083647).
- brcmfmac: abort and release host after error (bsc#1051510).
- brcmfmac: fix wrong location to get firmware feature (bsc#1111666).
- brcmfmac: Transform compatible string for FW loading (bsc#1169771).
- btrfs: always wait on ordered extents at fsync time (bsc#1171761).
- btrfs: clean up the left over logged_list usage (bsc#1171761).
- btrfs: do not zero f_bavail if we have available space (bsc#1168081).
- btrfs: do not zero f_bavail if we have available space (bsc#1168081).
- Btrfs: fix deadlock with memory reclaim during scrub (bsc#1172127).
- Btrfs: fix list_add corruption and soft lockups in fsync (bsc#1171761).
- btrfs: fix log context list corruption after rename whiteout error (bsc#1172342).
- Btrfs: fix missing data checksums after a ranged fsync (msync) (bsc#1171761).
- btrfs: fix missing file extent item for hole after ranged fsync (bsc#1171761).
- Btrfs: fix missing hole after hole punching and fsync when using NO_HOLES (bsc#1171761).
- btrfs: fix missing semaphore unlock in btrfs_sync_file (bsc#1171761).
- btrfs: fix partial loss of prealloc extent past i_size after fsync (bsc#1172343).
- Btrfs: fix rare chances for data loss when doing a fast fsync (bsc#1171761).
- btrfs: move the dio_sem higher up the callchain (bsc#1171761).
- btrfs: qgroup: Fix a bug that prevents qgroup to be re-enabled after disable (bsc#1172247).
- btrfs: relocation: add error injection points for cancelling balance (bsc#1171417).
- btrfs: relocation: Check cancel request after each data page read (bsc#1171417).
- btrfs: relocation: Check cancel request after each extent found (bsc#1171417).
- btrfs: relocation: Clear the DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417).
- btrfs: relocation: Fix reloc root leakage and the NULL pointer reference caused by the leakage (bsc#1171417).
- btrfs: relocation: Work around dead relocation stage loop (bsc#1171417).
- btrfs: reloc: clear DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417 bsc#1160947 bsc#1172366).
- btrfs: reloc: fix reloc root leak and NULL pointer dereference (bsc#1171417 bsc#1160947 bsc#1172366).
- btrfs: Remove extra parentheses from condition in copy_items() (bsc#1171761).
- Btrfs: remove no longer used io_err from btrfs_log_ctx (bsc#1171761).
- Btrfs: remove no longer used logged range variables when logging extents (bsc#1171761).
- Btrfs: remove no longer used 'sync' member from transaction handle (bsc#1171761).
- btrfs: remove remaing full_sync logic from btrfs_sync_file (bsc#1171761).
- btrfs: remove the logged extents infrastructure (bsc#1171761).
- btrfs: remove the wait ordered logic in the log_one_extent path (bsc#1171761).
- btrfs: setup a nofs context for memory allocation at btrfs_create_tree() (bsc#1172127).
- btrfs: setup a nofs context for memory allocation at __btrfs_set_acl (bsc#1172127).
- btrfs: use nofs context when initializing security xattrs to avoid deadlock (bsc#1172127).
- btrfs: volumes: Remove ENOSPC-prone btrfs_can_relocate() (bsc#1171124).
- bus: sunxi-rsb: Return correct data when mixing 16-bit and 8-bit reads (bsc#1111666).
- can: add missing attribute validation for termination (networking-stable-20_03_14).
- carl9170: remove P2P_GO support (bsc#1111666).
- cdc-acm: close race betrween suspend() and acm_softint (git-fixes).
- CDC-ACM: heed quirk also in error handling (git-fixes).
- cdc-acm: introduce a cool down (git-fixes).
- ceph: check if file lock exists before sending unlock request (bsc#1168789).
- ceph: convert mdsc->cap_dirty to a per-session list (bsc#1167104).
- ceph: demote quotarealm lookup warning to a debug message (bsc#1171692).
- ceph: fix double unlock in handle_cap_export() (bsc#1171694).
- ceph: fix double unlock in handle_cap_export() (bsc#1171694).
- ceph: fix endianness bug when handling MDS session feature bits (bsc#1171695).
- ceph: fix endianness bug when handling MDS session feature bits (bsc#1171695).
- ceph: request expedited service on session's last cap flush (bsc#1167104).
- cgroup, blkcg: Prepare some symbols for module and !CONFIG_CGROUP usages (bsc#1173857).
- cgroup, netclassid: periodically release file_lock on classid updating (networking-stable-20_03_14).
- char/random: Add a newline at the end of the file (jsc#SLE-12423).
- CIFS: Allocate crypto structures on the fly for calculating signatures of incoming packets (bsc#1144333).
- CIFS: Allocate encryption header through kmalloc (bsc#1144333).
- CIFS: allow unlock flock and OFD lock across fork (bsc#1144333).
- CIFS: check new file size when extending file by fallocate (bsc#1144333).
- CIFS: CIFSpdu.h: Replace zero-length array with flexible-array member (bsc#1144333).
- CIFS: clear PF_MEMALLOC before exiting demultiplex thread (bsc#1144333).
- CIFS: do not share tcons with DFS (bsc#1144333).
- CIFS: dump the session id and keys also for SMB2 sessions (bsc#1144333).
- CIFS: ensure correct super block for DFS reconnect (bsc#1144333).
- CIFS: Fix bug which the return value by asynchronous read is error (bsc#1144333).
- CIFS: fix uninitialised lease_key in open_shroot() (bsc#1144333).
- cifs: get rid of unused parameter in reconn_setup_dfs_targets() (bsc#1144333).
- cifs: handle hostnames that resolve to same ip in failover (bsc#1144333 bsc#1161016).
- CIFS: ignore cached share root handle closing errors (bsc#1166780).
- CIFS: improve read performance for page size 64KB & cache=strict & vers=2.1+ (bsc#1144333).
- CIFS: Increment num_remote_opens stats counter even in case of smb2_query_dir_first (bsc#1144333).
- CIFS: minor update to comments around the cifs_tcp_ses_lock mutex (bsc#1144333).
- CIFS: protect updating server->dstaddr with a spinlock (bsc#1144333).
- cifs: set up next DFS target before generic_ip_connect() (bsc#1144333 bsc#1161016).
- CIFS: smb2pdu.h: Replace zero-length array with flexible-array member (bsc#1144333).
- CIFS: smbd: Calculate the correct maximum packet size for segmented SMBDirect send/receive (bsc#1144333).
- CIFS: smbd: Check and extend sender credits in interrupt context (bsc#1144333).
- CIFS: smbd: Check send queue size before posting a send (bsc#1144333).
- CIFS: smbd: Do not schedule work to send immediate packet on every receive (bsc#1144333).
- CIFS: smbd: Merge code to track pending packets (bsc#1144333).
- CIFS: smbd: Properly process errors on ib_post_send (bsc#1144333).
- CIFS: smbd: Update receive credits before sending and deal with credits roll back on failure before sending (bsc#1144333).
- CIFS: Warn less noisily on default mount (bsc#1144333).
- clk: Add clk_hw_unregister_composite helper function definition (bsc#1051510).
- clk: bcm2835: Fix return type of bcm2835_register_gate (bsc#1051510).
- clk: clk-flexgen: fix clock-critical handling (bsc#1051510).
- clk: imx6ull: use OSC clock during AXI rate change (bsc#1051510).
- clk: imx: make mux parent strings const (bsc#1051510).
- clk: mediatek: correct the clocks for MT2701 HDMI PHY module (bsc#1051510).
- clk: qcom: rcg: Return failure for RCG update (bsc#1051510).
- clk: sunxi: Fix incorrect usage of round_down() (bsc#1051510).
- clk: sunxi-ng: a64: Fix gate bit of DSI DPHY (bsc#1051510).
- clocksource/drivers/hyper-v: Set TSC clocksource as default w/ InvariantTSC (bsc#1170620).
- clocksource/drivers/hyper-v: Set TSC clocksource as default w/ InvariantTSC (bsc#1170620, bsc#1170621).
- clocksource: dw_apb_timer: Make CPU-affiliation being optional (bsc#1111666).
- clocksource: dw_apb_timer_of: Fix missing clockevent timers (bsc#1051510).
- compat_ioctl: block: handle BLKREPORTZONE/BLKRESETZONE (git fixes (block drivers)).
- compat_ioctl: block: handle Persistent Reservations (git fixes (block drivers)).
- component: Silence bind error on -EPROBE_DEFER (bsc#1051510).
- copy_{to,from}_user(): consolidate object size checks (git fixes).
- coresight: do not use the BIT() macro in the UAPI header (git fixes (block drivers)).
- cpufreq: s3c64xx: Remove pointless NULL check in s3c64xx_cpufreq_driver_init (bsc#1051510).
- crypto: algboss - do not wait during notifier callback (bsc#1111666).
- crypto: algif_skcipher - Cap recv SG list at ctx->used (bsc#1111666).
- crypto: caam - update xts sector size for large input length (bsc#1111666).
- crypto: cavium/nitrox - Fix 'nitrox_get_first_device()' when ndevlist is fully iterated (bsc#1111666).
- crypto: cavium/nitrox - Fix 'nitrox_get_first_device()' when ndevlist is fully iterated (git-fixes).
- crypto: ccp - AES CFB mode is a stream cipher (git-fixes).
- crypto: ccp - Change a message to reflect status instead of failure (bsc#1172218).
- crypto: ccp - Clean up and exit correctly on allocation failure (git-fixes).
- crypto: ccp - Cleanup misc_dev on sev_exit() (bsc#1114279).
- crypto: ccp - Cleanup sp_dev_master in psp_dev_destroy() (bsc#1114279).
- Crypto/chcr: fix for ccm(aes) failed test (bsc#1111666).
- crypto: chelsio/chtls: properly set tp->lsndtime (bsc#1111666).
- cxgb4: fix MPS index overwrite when setting MAC address (bsc#1127355).
- cxgb4: fix Txq restart check during backpressure (bsc#1127354 bsc#1127371).
- debugfs: Add debugfs_create_xul() for hexadecimal unsigned long (git-fixes).
- debugfs: Check module state before warning in {full/open}_proxy_open() (bsc#1173746).
- debugfs_lookup(): switch to lookup_one_len_unlocked() (bsc#1171979).
- Deprecate NR_UNSTABLE_NFS, use NR_WRITEBACK (bsc#1163403).
- devlink: fix return value after hitting end in region read (bsc#1109837).
- devlink: validate length of param values (bsc#1109837).
- devlink: validate length of region addr/len (bsc#1109837).
- dmaengine: dmatest: Fix iteration non-stop logic (bsc#1051510).
- dmaengine: tegra210-adma: Fix an error handling path in 'tegra_adma_probe()' (bsc#1111666).
- dm btree: increase rebalance threshold in __rebalance2() (git fixes (block drivers)).
- dm cache: fix a crash due to incorrect work item cancelling (git fixes (block drivers)).
- dm crypt: fix benbi IV constructor crash if used in authenticated mode (git fixes (block drivers)).
- dm: fix potential for q->make_request_fn NULL pointer (git fixes (block drivers)).
- dm mpath: switch paths in dm_blk_ioctl() code path (bsc#1167574).
- dm-raid1: fix invalid return value from dm_mirror (bsc#1172378).
- dm space map common: fix to ensure new block isn't already in use (git fixes (block drivers)).
- dm: various cleanups to md->queue initialization code (git fixes).
- dm verity fec: fix hash block number in verity_fec_decode (git fixes (block drivers)).
- dm verity fec: fix memory leak in verity_fec_dtr (git fixes (block drivers)).
- dm writecache: fix data corruption when reloading the target (git fixes (block drivers)).
- dm writecache: fix incorrect flush sequence when doing SSD mode commit (git fixes (block drivers)).
- dm writecache: verify watermark during resume (git fixes (block drivers)).
- dm zoned: fix invalid memory access (git fixes (block drivers)).
- dm zoned: reduce overhead of backing device checks (git fixes (block drivers)).
- dm zoned: remove duplicate nr_rnd_zones increase in dmz_init_zone() (git fixes (block drivers)).
- dm zoned: support zone sizes smaller than 128MiB (git fixes (block drivers)).
- dp83640: reverse arguments to list_add_tail (git-fixes).
- dpaa_eth: fix usage as DSA master, try 3 (networking-stable-20_05_27).
- driver-core, libnvdimm: Let device subsystems add local lockdep coverage (bsc#1171753).
- Drivers: hv: Add a module description line to the hv_vmbus driver (bsc#1172249, bsc#1172251).
- Drivers: hv: Add a module description line to the hv_vmbus driver (bsc#1172253).
- Drivers: hv: Change flag to write log level in panic msg to false (bsc#1170617, bsc#1170618).
- Drivers: HV: Send one page worth of kmsg dump over Hyper-V during panic (bsc#1170618).
- Drivers: hv: vmbus: Fix the issue with freeing up hv_ctl_table_hdr (bsc#1170618).
- Drivers: hv: vmbus: Get rid of MSR access from vmbus_drv.c (bsc#1170618).
- Drivers: hv: vmus: Fix the check for return value from kmsg get dump buffer (bsc#1170618).
- Drivers/net/ibmvnic: Update VNIC protocol version reporting (bsc#1065729).
- drivers: soc: ti: knav_qmss_queue: Make knav_gp_range_ops static (bsc#1051510).
- Drivers: w1: add hwmon support structures (jsc#SLE-11048).
- Drivers: w1: add hwmon temp support for w1_therm (jsc#SLE-11048).
- Drivers: w1: refactor w1_slave_show to make the temp reading functionality separate (jsc#SLE-11048).
- drm: amd/acp: fix broken menu structure (bsc#1114279) * context changes
- drm: amd/display: fix Kconfig help text (bsc#1113956) * only fix DEBUG_KERNEL_DC
- drm/amdgpu: Correctly initialize thermal controller for GPUs with Powerplay table v0 (e.g Hawaii) (bsc#1111666).
- drm/amdgpu: Fix oops when pp_funcs is unset in ACPI event (bsc#1111666).
- drm/amd/powerplay: force the trim of the mclk dpm_levels if OD is (bsc#1113956)
- drm/atomic: Take the atomic toys away from X (bsc#1112178) * context changes
- drm/bochs: downgrade pci_request_region failure from error to warning (bsc#1051510).
- drm: bridge: adv7511: Extend list of audio sample rates (bsc#1111666).
- drm/crc: Actually allow to change the crc source (bsc#1114279) * offset changes
- drm/dp_mst: Fix clearing payload state on topology disable (bsc#1051510).
- drm/dp_mst: Increase ACT retry timeout to 3s (bsc#1113956) * context changes
- drm/dp_mst: Reformat drm_dp_check_act_status() a bit (bsc#1051510).
- drm_dp_mst_topology: fix broken drm_dp_sideband_parse_remote_dpcd_read() (bsc#1051510).
- drm/edid: Fix off-by-one in DispID DTD pixel clock (bsc#1114279)
- drm: encoder_slave: fix refcouting error for modules (bsc#1111666).
- drm: encoder_slave: fix refcouting error for modules (bsc#1114279)
- drm/etnaviv: fix perfmon domain interation (bsc#1113956)
- drm/etnaviv: rework perfmon query infrastructure (bsc#1112178)
- drm/i915: Apply Wa_1406680159:icl,ehl as an engine workaround (bsc#1112178) * rename gt/intel_workarounds.c to intel_workarounds.c * context changes
- drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of (bsc#1114279)
- drm/i915: HDCP: fix Ri prime check done during link check (bsc#1112178) * rename display/intel_hdmi.c to intel_hdmi.c * context changes
- drm/i915/icl+: Fix hotplug interrupt disabling after storm detection (bsc#1112178)
- drm/i915: properly sanity check batch_start_offset (bsc#1114279) * renamed display/intel_fbc.c -> intel_fb.c * renamed gt/intel_rc6.c -> intel_pm.c * context changes
- drm/i915: Whitelist context-local timestamp in the gen9 cmdparser (bsc#1111666).
- drm/mediatek: Check plane visibility in atomic_update (bsc#1113956) * context changes
- drm/meson: Delete an error message in meson_dw_hdmi_bind() (bsc#1051510).
- drm/msm/dpu: fix error return code in dpu_encoder_init (bsc#1111666).
- drm/msm: stop abusing dma_map/unmap for cache (bsc#1051510).
- drm/msm: Use the correct dma_sync calls harder (bsc#1051510).
- drm/msm: Use the correct dma_sync calls in msm_gem (bsc#1051510).
- drm: NULL pointer dereference [null-pointer-deref] (CWE 476) problem (bsc#1114279)
- drm: panel-orientation-quirks: Add quirk for Asus T101HA panel (bsc#1111666).
- drm: panel-orientation-quirks: Use generic orientation-data for Acer S1003 (bsc#1111666).
- drm/qxl: qxl_release leak in qxl_draw_dirty_fb() (bsc#1051510).
- drm/qxl: qxl_release leak in qxl_hw_surface_alloc() (bsc#1051510).
- drm/qxl: qxl_release use after free (bsc#1051510).
- drm/qxl: Use correct notify port address when creating cursor ring (bsc#1113956)
- drm/radeon: fix double free (bsc#1113956)
- drm/radeon: fix fb_div check in ni_init_smc_spll_table() (bsc#1113956)
- drm: Remove PageReserved manipulation from drm_pci_alloc (bsc#1114279) * offset changes
- drm/sun4i: dsi: Allow binding the host without a panel (bsc#1113956)
- drm/sun4i: dsi: Avoid hotplug race with DRM driver bind (bsc#1113956)
- drm/sun4i: dsi: Remove incorrect use of runtime PM (bsc#1113956) * context changes
- drm/sun4i: dsi: Remove unused drv from driver context (bsc#1113956) * context changes * keep include of sun4i_drv.h
- drm/sun4i: hdmi ddc clk: Fix size of m divider (bsc#1111666).
- drm/tegra: hub: Do not enable orphaned window group (bsc#1111666).
- drm/vkms: Hold gem object while still in-use (bsc#1113956) * context changes
- dump_stack: avoid the livelock of the dump_lock (git fixes (block drivers)).
- e1000: Distribute switch variables for initialization (bsc#1111666).
- e1000e: Disable TSO for buffer overrun workaround (bsc#1051510).
- e1000e: Do not wake up the system via WOL if device wakeup is disabled (bsc#1051510).
- e1000e: Relax condition to trigger reset for ME workaround (bsc#1111666).
- EDAC/amd64: Add family ops for Family 19h Models 00h-0Fh (jsc#SLE-11833).
- EDAC/amd64: Drop some family checks for newer systems (jsc#SLE-11833).
- EDAC/amd64: Read back the scrub rate PCI register on F15h (bsc#1114279).
- EDAC/mce_amd: Always load on SMCA systems (jsc#SLE-11833).
- EDAC/mce_amd: Make fam_ops static global (jsc#SLE-11833).
- EDAC, sb_edac: Add support for systems with segmented PCI buses (bsc#1169525).
- efi/random: Increase size of firmware supplied randomness (jsc#SLE-12423).
- efi/random: Treat EFI_RNG_PROTOCOL output as bootloader randomness (jsc#SLE-12423).
- efi: READ_ONCE rng seed size before munmap (jsc#SLE-12423).
- efi: Reorder pr_notice() with add_device_randomness() call (jsc#SLE-12423).
- evm: Check also if *tfm is an error pointer in init_desc() (bsc#1051510).
- evm: Fix a small race in init_desc() (bsc#1051510).
- ext4: add cond_resched() to __ext4_find_entry() (bsc#1166862).
- ext4: Check for non-zero journal inum in ext4_calculate_overhead (bsc#1167288).
- ext4: do not assume that mmp_nodename/bdevname have NUL (bsc#1166860).
- ext4: do not zeroout extents beyond i_disksize (bsc#1167851).
- ext4: fix a data race at inode->i_blocks (bsc#1171835).
- ext4: fix a data race in EXT4_I(inode)->i_disksize (bsc#1166861).
- ext4: fix extent_status fragmentation for plain files (bsc#1171949).
- ext4: fix incorrect group count in ext4_fill_super error message (bsc#1168765).
- ext4: fix incorrect inodes per group in error message (bsc#1168764).
- ext4: fix partial cluster initialization when splitting extent (bsc#1173839).
- ext4: fix potential race between online resizing and write operations (bsc#1166864).
- ext4: fix potential race between s_flex_groups online resizing and access (bsc#1166867).
- ext4: fix potential race between s_group_info online resizing and access (bsc#1166866).
- ext4: fix race between ext4_sync_parent() and rename() (bsc#1173838).
- ext4: fix race between writepages and enabling EXT4_EXTENTS_FL (bsc#1166870).
- ext4: fix support for inode sizes > 1024 bytes (bsc#1164284).
- ext4, jbd2: ensure panic by fix a race between jbd2 abort and ext4 error handlers (bsc#1173833).
- ext4: potential crash on allocation error in ext4_alloc_flex_bg_array() (bsc#1166940).
- ext4: rename s_journal_flag_rwsem to s_writepages_rwsem (bsc#1166868).
- ext4: use non-movable memory for superblock readahead (bsc#1171952).
- ext4: validate the debug_want_extra_isize mount option at parse time (bsc#1163897).
- extcon: adc-jack: Fix an error handling path in 'adc_jack_probe()' (bsc#1051510).
- fanotify: fix ignore mask logic for events on child and on dir (bsc#1172719).
- fanotify: fix merging marks masks with FAN_ONDIR (bsc#1171679).
- fbcon: fix null-ptr-deref in fbcon_switch (bsc#1114279) * rename drivers/video/fbdev/core to drivers/video/console * context changes
- fbdev: potential information leak in do_fb_ioctl() (bsc#1114279)
- fbmem: Adjust indentation in fb_prepare_logo and fb_blank (bsc#1114279)
- fdt: add support for rng-seed (jsc#SLE-12423).
- fdt: Update CRC check for rng-seed (jsc#SLE-12423).
- fib: add missing attribute validation for tun_id (networking-stable-20_03_14).
- firmware: imx: scu: Fix corruption of header (git-fixes).
- firmware: imx: scu: Fix possible memory leak in imx_scu_probe() (bsc#1111666).
- firmware: qcom: scm: fix compilation error when disabled (bsc#1051510).
- Fix a backport bug, where btrfs_put_root() -> btrfs_put_fs_root() modification is not needed due to missing dependency
- fix multiplication overflow in copy_fdtable() (bsc#1173825).
- fpga: dfl: afu: Corrected error handling levels (git-fixes).
- fq_codel: fix TCA_FQ_CODEL_DROP_BATCH_SIZE sanity checks (networking-stable-20_05_12).
- fs/cifs: fix gcc warning in sid_to_id (bsc#1144333).
- fs/seq_file.c: simplify seq_file iteration code and interface (bsc#1170125).
- gpiolib: Document that GPIO line names are not globally unique (bsc#1051510).
- gpio: tegra: mask GPIO IRQs during IRQ shutdown (bsc#1051510).
- gpu: host1x: Detach driver on unregister (bsc#1111666).
- gpu: ipu-v3: pre: do not trigger update if buffer address does not change (bsc#1111666).
- gre: fix uninit-value in __iptunnel_pull_header (networking-stable-20_03_14).
- HID: hid-input: clear unmapped usages (git-fixes).
- HID: hyperv: Add a module description line (bsc#1172249, bsc#1172251).
- HID: hyperv: Add a module description line (bsc#1172253).
- HID: i2c-hid: add Trekstor Primebook C11B to descriptor override (git-fixes).
- HID: i2c-hid: override HID descriptors for certain devices (git-fixes).
- HID: multitouch: add eGalaxTouch P80H84 support (bsc#1051510).
- HID: sony: Fix for broken buttons on DS3 USB dongles (bsc#1051510).
- HID: wacom: Read HID_DG_CONTACTMAX directly for non-generic devices (git-fixes).
- hrtimer: Annotate lockless access to timer->state (git fixes (block drivers)).
- hsr: add restart routine into hsr_get_node_list() (networking-stable-20_03_28).
- hsr: check protocol version in hsr_newlink() (networking-stable-20_04_17).
- hsr: fix general protection fault in hsr_addr_is_self() (networking-stable-20_03_28).
- hsr: set .netnsok flag (networking-stable-20_03_28).
- hsr: use rcu_read_lock() in hsr_get_node_{list/status}() (networking-stable-20_03_28).
- hwmon: (acpi_power_meter) Fix potential memory leak in acpi_power_meter_add() (bsc#1111666).
- hwmon: (emc2103) fix unable to change fan pwm1_enable attribute (bsc#1111666).
- hwmon: (max6697) Make sure the OVERT mask is set correctly (bsc#1111666).
- i2c: acpi: Force bus speed to 400KHz if a Silead touchscreen is present (git-fixes).
- i2c: acpi: put device when verifying client fails (git-fixes).
- i2c: algo-pca: Add 0x78 as SCL stuck low status for PCA9665 (bsc#1111666).
- i2c: brcmstb: remove unused struct member (git-fixes).
- i2c: core: Allow empty id_table in ACPI case as well (git-fixes).
- i2c: core: decrease reference count of device node in i2c_unregister_device (git-fixes).
- i2c: dev: Fix the race between the release of i2c_dev and cdev (bsc#1051510).
- i2c: fix missing pm_runtime_put_sync in i2c_device_probe (git-fixes).
- i2c-hid: properly terminate i2c_hid_dmi_desc_override_table array (git-fixes).
- i2c: i801: Do not add ICH_RES_IO_SMI for the iTCO_wdt device (git-fixes).
- i2c: iproc: Stop advertising support of SMBUS quick cmd (git-fixes).
- i2c: isch: Remove unnecessary acpi.h include (git-fixes).
- i2c: mlxcpld: check correct size of maximum RECV_LEN packet (bsc#1111666).
- i2c: mux: demux-pinctrl: Fix an error handling path in 'i2c_demux_pinctrl_probe()' (bsc#1051510).
- i2c: st: fix missing struct parameter description (bsc#1051510).
- i40e: reduce stack usage in i40e_set_fc (git-fixes).
- IB/ipoib: Add child to parent list only if device initialized (bsc#1168503).
- IB/ipoib: Consolidate checking of the proposed child interface (bsc#1168503).
- IB/ipoib: Do not remove child devices from within the ndo_uninit (bsc#1168503).
- IB/ipoib: Get rid of IPOIB_FLAG_GOING_DOWN (bsc#1168503).
- IB/ipoib: Get rid of the sysfs_mutex (bsc#1168503).
- IB/ipoib: Maintain the child_intfs list from ndo_init/uninit (bsc#1168503).
- IB/ipoib: Move all uninit code into ndo_uninit (bsc#1168503).
- IB/ipoib: Move init code to ndo_init (bsc#1168503).
- IB/ipoib: Replace printk with pr_warn (bsc#1168503).
- IB/ipoib: Use cancel_delayed_work_sync for neigh-clean task (bsc#1168503).
- IB/ipoib: Warn when one port fails to initialize (bsc#1168503).
- IB/mlx5: Fix missing congestion control debugfs on rep rdma device (bsc#1103991).
- ibmveth: Fix max MTU limit (bsc#1173428 ltc#186397).
- ibmvfc: do not send implicit logouts prior to NPIV login (bsc#1169625 ltc#184611).
- ibmvnic: continue to init in CRQ reset returns H_CLOSED (bsc#1173280 ltc#185369).
- ibmvnic: Flush existing work items before device removal (bsc#1065729).
- ibmvnic: Harden device login requests (bsc#1170011 ltc#183538).
- ibmvnic: Skip fatal error reset after passive init (bsc#1171078 ltc#184239).
- iio:ad7797: Use correct attribute_group (bsc#1051510).
- iio: adc: stm32-adc: fix device used to request dma (bsc#1051510).
- iio: adc: stm32-adc: fix sleep in atomic context (git-fixes).
- iio: adc: stm32-adc: Use dma_request_chan() instead dma_request_slave_channel() (bsc#1051510).
- iio: buffer: Do not allow buffers without any channels enabled to be activated (bsc#1051510).
- iio: dac: vf610: Fix an error handling path in 'vf610_dac_probe()' (bsc#1051510).
- iio:health:afe4404 Fix timestamp alignment and prevent data leak (bsc#1111666).
- iio:humidity:hdc100x Fix alignment and data leak issues (bsc#1111666).
- iio:magnetometer:ak8974: Fix alignment and data leak issues (bsc#1111666).
- iio: mma8452: Add missed iio_device_unregister() call in mma8452_probe() (bsc#1111666).
- iio: pressure: bmp280: Tolerate IRQ before registering (bsc#1051510).
- iio:pressure:ms5611 Fix buffer element alignment (bsc#1111666).
- iio: pressure: zpa2326: handle pm_runtime_get_sync failure (bsc#1111666).
- iio: sca3000: Remove an erroneous 'get_device()' (bsc#1051510).
- iio: xilinx-xadc: Fix ADC-B powerdown (bsc#1051510).
- iio: xilinx-xadc: Fix clearing interrupt when enabling trigger (bsc#1051510).
- iio: xilinx-xadc: Fix sequencer configuration for aux channels in simultaneous mode (bsc#1051510).
- ima: Directly assign the ima_default_policy pointer to ima_rules (bsc#1051510).
- ima: Fix ima digest hash table key calculation (bsc#1051510).
- ima: Fix return value of ima_write_policy() (git-fixes).
- include/asm-generic/topology.h: guard cpumask_of_node() macro argument (bsc#1148868).
- Input: evdev - call input_flush_device() on release(), not flush() (bsc#1051510).
- Input: hyperv-keyboard - add module description (bsc#1172249, bsc#1172251).
- Input: hyperv-keyboard - add module description (bsc#1172253).
- Input: i8042 - add Acer Aspire 5738z to nomux list (bsc#1051510).
- Input: i8042 - add ThinkPad S230u to i8042 reset list (bsc#1051510).
- Input: raydium_i2c_ts - use true and false for boolean values (bsc#1051510).
- Input: synaptics - add a second working PNP_ID for Lenovo T470s (bsc#1111666).
- Input: synaptics-rmi4 - fix error return code in rmi_driver_probe() (bsc#1051510).
- Input: synaptics-rmi4 - really fix attn_data use-after-free (git-fixes).
- Input: usbtouchscreen - add support for BonXeon TP (bsc#1051510).
- Input: xpad - add custom init packet for Xbox One S controllers (bsc#1051510).
- intel_idle: Graceful probe failure when MWAIT is disabled (bsc#1174115).
- intel_th: Fix a NULL dereference when hub driver is not loaded (bsc#1111666).
- iommu/amd: Call domain_flush_complete() in update_domain() (bsc#1172096).
- iommu/amd: Do not flush Device Table in iommu_map_page() (bsc#1172097).
- iommu/amd: Do not loop forever when trying to increase address space (bsc#1172098).
- iommu/amd: Fix legacy interrupt remapping for x2APIC-enabled system (bsc#1172099).
- iommu/amd: Fix over-read of ACPI UID from IVRS table (bsc#1172101).
- iommu/amd: Fix race in increase_address_space()/fetch_pte() (bsc#1172102).
- iommu/amd: Fix the configuration of GCR3 table root pointer (bsc#1169057).
- iommu/amd: Update Device Table in increase_address_space() (bsc#1172103).
- iommu: Fix reference count leak in iommu_group_alloc (bsc#1172397).
- iommu/vt-d: Enable PCI ACS for platform opt in hint (bsc#1174130).
- ip6_tunnel: Allow rcv/xmit even if remote address is a local address (bsc#1166978).
- ipmi: fix hung processes in __get_guid() (git-fixes).
- ipv4: fix a RCU-list lock in fib_triestat_seq_show (networking-stable-20_04_02).
- ipv6/addrconf: call ipv6_mc_up() for non-Ethernet interface (networking-stable-20_03_14).
- ipv6: do not auto-add link-local address to lag ports (networking-stable-20_04_09).
- ipv6: fix IPV6_ADDRFORM operation logic (bsc#1171662).
- ipv6: Fix nlmsg_flags when splitting a multipath route (networking-stable-20_03_01).
- ipv6: fix restrict IPV6_ADDRFORM operation (bsc#1171662).
- ipv6: Fix route replacement with dev-only route (networking-stable-20_03_01).
- ipvlan: add cond_resched_rcu() while processing muticast backlog (networking-stable-20_03_14).
- ipvlan: call dev_change_flags when ipvlan mode is reset (git-fixes).
- ipvlan: do not add hardware address of master to its unicast filter list (bsc#1137325).
- ipvlan: do not deref eth hdr before checking it's set (networking-stable-20_03_14).
- ipvlan: do not use cond_resched_rcu() in ipvlan_process_multicast() (networking-stable-20_03_14).
- iwlwifi: pcie: actually release queue memory in TVQM (bsc#1051510).
- ixgbe: do not check firmware errors (bsc#1170284).
- ixgbevf: Remove limit of 10 entries for unicast filter list (git-fixes).
- jbd2: avoid leaking transaction credits when unreserving handle (bsc#1173845).
- jbd2: Preserve kABI when adding j_abort_mutex (bsc#1173833).
- kabi fix for (bsc#1168202).
- kabi fix for early XHCI debug (git-fixes).
- kabi for for md: improve handling of bio with REQ_PREFLUSH in md_flush_request() (git-fixes).
- kabi: ppc64le: prevent struct dma_map_ops to become defined (jsc#SLE-12423).
- kabi, protect struct ib_device (bsc#1168503).
- kABI: protect struct mlx5_cmd_work_ent (kabi).
- kabi/severities: Do not track KVM internal symbols.
- kabi/severities: Ingnore get_dev_data() The function is internal to the AMD IOMMU driver and must not be called by any third party.
- kabi workaround for snd_rawmidi buffer_ref field addition (git-fixes).
- kernfs: fix barrier usage in __kernfs_new_node() (bsc#1111666).
- KEYS: reaching the keys quotas correctly (bsc#1051510).
- KVM: arm64: Change hyp_panic()s dependency on tpidr_el2 (bsc#1133021).
- KVM: arm64: Stop save/restoring host tpidr_el1 on VHE (bsc#1133021).
- KVM: Check validity of resolved slot when searching memslots (bsc#1172104).
- KVM: nVMX: Do not reread VMCS-agnostic state when switching VMCS (bsc#1114279).
- KVM: nVMX: Skip IBPB when switching between vmcs01 and vmcs02 (bsc#1114279).
- KVM: s390: vsie: Fix delivery of addressing exceptions (git-fixes).
- KVM: s390: vsie: Fix possible race when shadowing region 3 tables (git-fixes).
- KVM: s390: vsie: Fix region 1 ASCE sanity shadow address checks (git-fixes).
- KVM: SVM: Fix potential memory leak in svm_cpu_init() (bsc#1171736).
- KVM x86: Extend AMD specific guest behavior to Hygon virtual CPUs (bsc#1152489).
- KVM: x86: Fix APIC page invalidation race (bsc#1174122).
- kvm: x86: Fix L1TF mitigation for shadow MMU (bsc#1171904).
- KVM: x86/mmu: Set mmio_value to '0' if reserved #PF can't be generated (bsc#1171904).
- KVM: x86: only do L1TF workaround on affected processors (bsc#1171904).
- l2tp: Allow management of tunnels and session in user namespace (networking-stable-20_04_17).
- libata: Remove extra scsi_host_put() in ata_scsi_add_hosts() (bsc#1051510).
- libata: Return correct status in sata_pmp_eh_recover_pm() when ATA_DFLAG_DETACH is set (bsc#1051510).
- libceph: do not omit recovery_deletes in target_copy() (bsc#1173462).
- libceph: do not omit recovery_deletes in target_copy() (bsc#1174113).
- libceph: ignore pool overlay and cache logic on redirects (bsc#1173146).
- libfs: fix infoleak in simple_attr_read() (bsc#1168881).
- libnvdimm/bus: Fix wait_nvdimm_bus_probe_idle() ABBA deadlock (bsc#1171753).
- libnvdimm/bus: Prepare the nd_ioctl() path to be re-entrant (bsc#1171753).
- libnvdimm/bus: Stop holding nvdimm_bus_list_mutex over __nd_ioctl() (bsc#1171753).
- libnvdimm: cover up changes in struct nvdimm_bus (bsc#1171753).
- libnvdimm: cover up nd_pfn_sb changes (bsc#1171759).
- libnvdimm/dax: Pick the right alignment default when creating dax devices (bsc#1171759).
- libnvdimm/label: Remove the dpa align check (bsc#1171759).
- libnvdimm/of_pmem: Provide a unique name for bus provider (bsc#1171739).
- libnvdimm/pfn_dev: Add a build check to make sure we notice when struct page size change (bsc#1171743).
- libnvdimm/pfn_dev: Add page size and struct page size to pfn superblock (bsc#1171759).
- libnvdimm/pfn: Prevent raw mode fallback if pfn-infoblock valid (bsc#1171743).
- libnvdimm/pmem: Advance namespace seed for specific probe errors (bsc#1171743).
- libnvdimm/region: Initialize bad block for volatile namespaces (bnc#1151927 5.3.6).
- libnvdimm/region: Rewrite _probe_success() to _advance_seeds() (bsc#1171743).
- libnvdimm: Use PAGE_SIZE instead of SZ_4K for align check (bsc#1171759).
- lib: raid6: fix awk build warnings (git fixes (block drivers)).
- lib/raid6/test: fix build on distros whose /bin/sh is not bash (git fixes (block drivers)).
- lib/stackdepot.c: fix global out-of-bounds in stack_slabs (git fixes (block drivers)).
- livepatch: Apply vmlinux-specific KLP relocations early (bsc#1071995).
- livepatch: Disallow vmlinux.ko (bsc#1071995).
- livepatch: Make klp_apply_object_relocs static (bsc#1071995).
- livepatch: Prevent module-specific KLP rela sections from referencing vmlinux symbols (bsc#1071995).
- livepatch: Remove .klp.arch (bsc#1071995).
- locks: print unsigned ino in /proc/locks (bsc#1171951).
- loop: replace kill_bdev with invalidate_bdev (bsc#1173820).
- lpfc_debugfs: get rid of pointless access_ok() (bsc#1172687 bsc#1171530).
- lpfc: Synchronize NVME transport and lpfc driver devloss_tmo (bcs#1173060).
- mac80211: add ieee80211_is_any_nullfunc() (bsc#1051510).
- mac80211: add option for setting control flags (bsc#1111666).
- mac80211_hwsim: Use kstrndup() in place of kasprintf() (bsc#1051510).
- mac80211: mesh: fix discovery timer re-arming issue / crash (bsc#1051510).
- mac80211: set IEEE80211_TX_CTRL_PORT_CTRL_PROTO for nl80211 TX (bsc#1111666).
- macsec: avoid to set wrong mtu (bsc#1051510).
- macsec: restrict to ethernet devices (networking-stable-20_03_28).
- macvlan: add cond_resched() during multicast processing (networking-stable-20_03_14).
- macvlan: fix null dereference in macvlan_device_event() (bsc#1051510).
- mailbox: imx: Disable the clock on devm_mbox_controller_register() failure (git-fixes).
- make some Fujitsu systems run (bsc#1141558).
- md: Avoid namespace collision with bitmap API (git fixes (block drivers)).
- md: improve handling of bio with REQ_PREFLUSH in md_flush_request() (git-fixes).
- md/raid0: Fix an error message in raid0_make_request() (git fixes (block drivers)).
- md/raid10: prevent access of uninitialized resync_pages offset (git-fixes).
- mdraid: fix read/write bytes accounting (bsc#1172537).
- md: use memalloc scope APIs in mddev_suspend()/mddev_resume() (bsc#1166985)).
- md: use memalloc scope APIs in mddev_suspend()/mddev_resume() (git fixes (block drivers)).
- media: dvb: return -EREMOTEIO on i2c transfer failure (bsc#1051510).
- media: flexcop-usb: fix endpoint sanity check (git-fixes).
- media: platform: fcp: Set appropriate DMA parameters (bsc#1051510).
- media: si2157: Better check for running tuner in init (bsc#1111666).
- media: ti-vpe: cal: fix disable_irqs to only the intended target (git-fixes).
- mei: release me_cl object reference (bsc#1051510).
- mlxsw: core: Do not use WQ_MEM_RECLAIM for mlxsw ordered workqueue (git-fixes).
- mlxsw: core: Do not use WQ_MEM_RECLAIM for mlxsw workqueue (git-fixes).
- mlxsw: Fix some IS_ERR() vs NULL bugs (networking-stable-20_04_27).
- mlxsw: pci: Return error on PCI reset timeout (git-fixes).
- mlxsw: spectrum_acl_tcam: Position vchunk in a vregion list properly (networking-stable-20_05_12).
- mlxsw: spectrum: Disallow prio-tagged packets when PVID is removed (git-fixes).
- mlxsw: spectrum_dpipe: Add missing error path (git-fixes).
- mlxsw: spectrum_flower: Do not stop at FLOW_ACTION_VLAN_MANGLE (networking-stable-20_04_09).
- mlxsw: spectrum_mr: Fix list iteration in error path (bsc#1112374).
- mlxsw: spectrum: Prevent force of 56G (git-fixes).
- mlxsw: spectrum_router: Refresh nexthop neighbour when it becomes dead (git-fixes).
- mlxsw: spectrum_router: Remove inappropriate usage of WARN_ON() (git-fixes).
- mlxsw: spectrum_switchdev: Add MDB entries in prepare phase (git-fixes).
- mlxsw: spectrum_switchdev: Do not treat static FDB entries as sticky (git-fixes).
- mmc: atmel-mci: Fix debugfs on 64-bit platforms (git-fixes).
- mmc: block: Fix request completion in the CQE timeout path (bsc#1111666).
- mmc: block: Fix use-after-free issue for rpmb (bsc#1111666).
- mmc: core: Check request type before completing the request (git-fixes).
- mmc: core: Fix recursive locking issue in CQE recovery path (git-fixes).
- mmc: cqhci: Avoid false 'cqhci: CQE stuck on' by not open-coding timeout loop (git-fixes).
- mmc: dw_mmc: Fix debugfs on 64-bit platforms (git-fixes).
- mmc: fix compilation of user API (bsc#1051510).
- mmc: meson-gx: make sure the descriptor is stopped on errors (git-fixes).
- mmc: meson-gx: simplify interrupt handler (git-fixes).
- mmc: renesas_sdhi: limit block count to 16 bit for old revisions (git-fixes).
- mmc: sdhci-esdhc-imx: fix the mask for tuning start point (bsc#1051510).
- mmc: sdhci-msm: Clear tuning done flag while hs400 tuning (bsc#1051510).
- mmc: sdhci-msm: Set SDHCI_QUIRK_MULTIBLOCK_READ_ACMD12 quirk (bsc#1111666).
- mmc: sdhci-of-at91: fix memleak on clk_get failure (git-fixes).
- mmc: sdhci-pci: Fix eMMC driver strength for BYT-based controllers (bsc#1051510).
- mmc: sdhci-xenon: fix annoying 1.8V regulator warning (bsc#1051510).
- mmc: sdio: Fix potential NULL pointer error in mmc_sdio_init_card() (bsc#1051510).
- mmc: tmio: fix access width of Block Count Register (git-fixes).
- mm/filemap.c: do not initiate writeback if mapping has no dirty pages (bsc#1168884).
- mm: limit boost_watermark on small zones (git fixes (mm/pgalloc)).
- mm/memory_hotplug.c: only respect mem= parameter during boot stage (bsc#1065600).
- mm: replace PF_LESS_THROTTLE with PF_LOCAL_THROTTLE (bsc#1163403).
- mm: thp: handle page cache THP correctly in PageTransCompoundMap (git fixes (block drivers)).
- mtd: cfi: fix deadloop in cfi_cmdset_0002.c do_write_buffer (bsc#1051510).
- mtd: spi-nor: cadence-quadspi: add a delay in write sequence (git-fixes).
- mtd: spi-nor: enable 4B opcodes for mx66l51235l (git-fixes).
- mtd: spi-nor: fsl-quadspi: Do not let -EINVAL on the bus (git-fixes).
- mvpp2: remove misleading comment (git-fixes).
- mwifiex: avoid -Wstringop-overflow warning (bsc#1051510).
- mwifiex: Fix memory corruption in dump_station (bsc#1051510).
- net: bcmgenet: correct per TX/RX ring statistics (networking-stable-20_04_27).
- net/cxgb4: Check the return from t4_query_params properly (git-fixes).
- net: dsa: b53: Fix ARL register definitions (networking-stable-20_04_27).
- net: dsa: b53: Rework ARL bin logic (networking-stable-20_04_27).
- net: dsa: bcm_sf2: Do not register slave MDIO bus with OF (networking-stable-20_04_09).
- net: dsa: bcm_sf2: Ensure correct sub-node is parsed (networking-stable-20_04_09).
- net: dsa: bcm_sf2: Fix overflow checks (git-fixes).
- net: dsa: Fix duplicate frames flooded by learning (networking-stable-20_03_28).
- net: dsa: loop: Add module soft dependency (networking-stable-20_05_16).
- net: dsa: mt7530: fix roaming from DSA user ports (networking-stable-20_05_27).
- net: dsa: mv88e6xxx: fix lockup on warm boot (networking-stable-20_03_14).
- net: ena: add intr_moder_rx_interval to struct ena_com_dev and use it (git-fixes).
- net: ena: add missing ethtool TX timestamping indication (git-fixes).
- net: ena: avoid memory access violation by validating req_id properly (git-fixes).
- net: ena: do not wake up tx queue when down (git-fixes).
- net: ena: ena-com.c: prevent NULL pointer dereference (git-fixes).
- net: ena: ethtool: use correct value for crc32 hash (git-fixes).
- net: ena: fix continuous keep-alive resets (git-fixes).
- net: ena: fix corruption of dev_idx_to_host_tbl (git-fixes).
- net: ena: fix default tx interrupt moderation interval (git-fixes).
- net: ena: fix incorrect default RSS key (git-fixes).
- net: ena: fix incorrectly saving queue numbers when setting RSS indirection table (git-fixes).
- net: ena: fix issues in setting interrupt moderation params in ethtool (git-fixes).
- net: ena: fix potential crash when rxfh key is NULL (git-fixes).
- net: ena: fix retrieval of nonadaptive interrupt moderation intervals (git-fixes).
- net: ena: fix uses of round_jiffies() (git-fixes).
- net: ena: make ena rxfh support ETH_RSS_HASH_NO_CHANGE (git-fixes).
- net: ena: reimplement set/get_coalesce() (git-fixes).
- net: ena: rss: do not allocate key when not supported (git-fixes).
- net: ena: rss: fix failure to get indirection table (git-fixes).
- net: ena: rss: store hash function as values and not bits (git-fixes).
- net/ethernet: add Google GVE driver (jsc#SLE-10538)
- net: fec: add phy_reset_after_clk_enable() support (git-fixes).
- net: fec: validate the new settings in fec_enet_set_coalesce() (networking-stable-20_03_14).
- net: fib_rules: Correctly set table field when table number exceeds 8 bits (networking-stable-20_03_01).
- netfilter: connlabels: prefer static lock initialiser (git-fixes).
- netfilter: conntrack: sctp: use distinct states for new SCTP connections (bsc#1159199).
- netfilter: ctnetlink: netns exit must wait for callbacks (bsc#1169795).
- netfilter: not mark a spinlock as __read_mostly (git-fixes).
- net: fix a potential recursive NETDEV_FEAT_CHANGE (networking-stable-20_05_16).
- net: fix race condition in __inet_lookup_established() (bsc#1151794).
- net: fq: add missing attribute validation for orphan mask (networking-stable-20_03_14).
- net: hns3: fix 'tc qdisc del' failed issue (bsc#1109837).
- net: inet_csk: Fix so_reuseport bind-address cache in tb->fast* (networking-stable-20_05_27).
- net: ipip: fix wrong address family in init error path (networking-stable-20_05_27).
- net, ip_tunnel: fix interface lookup with no key (networking-stable-20_04_02).
- net: ipv4: devinet: Fix crash when add/del multicast IP with autojoin (networking-stable-20_04_17).
- net: ipv6: do not consider routes via gateways for anycast address check (networking-stable-20_04_17).
- net: ipvlan: Fix ipvlan device tso disabled while NETIF_F_IP_CSUM is set (git-fixes).
- netlink: Use netlink header as base to calculate bad attribute offset (networking-stable-20_03_14).
- net: macsec: preserve ingress frame ordering (networking-stable-20_05_12).
- net: macsec: update SCI upon MAC address change (networking-stable-20_03_14).
- net: memcg: fix lockdep splat in inet_csk_accept() (networking-stable-20_03_14).
- net: memcg: late association of sock to memcg (networking-stable-20_03_14).
- net/mlx4_core: drop useless LIST_HEAD (git-fixes).
- net/mlx4_core: fix a memory leak bug (git-fixes).
- net/mlx4_core: Fix use of ENOSPC around mlx4_counter_alloc() (networking-stable-20_05_12).
- net/mlx4_en: avoid indirect call in TX completion (networking-stable-20_04_27).
- net/mlx5: Add command entry handling completion (networking-stable-20_05_27).
- net/mlx5: Add new fields to Port Type and Speed register (bsc#1171118).
- net/mlx5: Add new fields to Port Type and Speed register (bsc#1171118).
- net/mlx5: Add RoCE RX ICRC encapsulated counter (bsc#1171118).
- net/mlx5: Avoid panic when setting vport rate (git-fixes).
- net/mlx5: Continue driver initialization despite debugfs failure (git-fixes).
- net/mlx5e: ethtool, Fix a typo in WOL function names (git-fixes).
- net/mlx5e: Fix ethtool self test: link speed (bsc#1171118).
- net/mlx5e: Fix traffic duplication in ethtool steering (git-fixes).
- net/mlx5e: Move port speed code from en_ethtool.c to en/port.c (bsc#1171118).
- net/mlx5e: Remove unnecessary clear_bit()s (git-fixes).
- net/mlx5e: Update netdev txq on completions during closure (networking-stable-20_05_27).
- net/mlx5: Expose link speed directly (bsc#1171118).
- net/mlx5: Expose link speed directly (bsc#1171118).
- net/mlx5: Expose port speed when possible (bsc#1171118).
- net/mlx5: Expose port speed when possible (bsc#1171118).
- net/mlx5: Fix command entry leak in Internal Error State (networking-stable-20_05_12).
- net/mlx5: Fix failing fw tracer allocation on s390 (bsc#1103990 ).
- net/mlx5: Fix forced completion access non initialized command entry (networking-stable-20_05_12).
- net: mvmdio: allow up to four clocks to be specified for orion-mdio (git-fixes).
- net: mvneta: Fix the case where the last poll did not process all rx (networking-stable-20_03_28).
- net: mvpp2: prs: Do not override the sign bit in SRAM parser shift (git-fixes).
- net: netrom: Fix potential nr_neigh refcnt leak in nr_add_node (networking-stable-20_04_27).
- net/packet: tpacket_rcv: do not increment ring index on drop (networking-stable-20_03_14).
- net: phy: fix aneg restart in phy_ethtool_set_eee (networking-stable-20_05_16).
- net: phy: micrel: kszphy_resume(): add delay after genphy_resume() before accessing PHY registers (bsc#1051510).
- net: phy: restore mdio regs in the iproc mdio driver (networking-stable-20_03_01).
- netprio_cgroup: Fix unlimited memory leak of v2 cgroups (networking-stable-20_05_16).
- net: qede: stop adding events on an already destroyed workqueue (git-fixes).
- net: qed: fix excessive QM ILT lines consumption (git-fixes).
- net: qed: fix NVMe login fails over VFs (git-fixes).
- net: qmi_wwan: add support for ASKEY WWHC050 (networking-stable-20_03_28).
- net: qrtr: Fix passing invalid reference to qrtr_local_enqueue() (networking-stable-20_05_27).
- net: revert default NAPI poll timeout to 2 jiffies (networking-stable-20_04_17).
- net: revert 'net: get rid of an signed integer overflow in ip_idents_reserve()' (networking-stable-20_05_27).
- net_sched: cls_route: remove the right filter from hashtable (networking-stable-20_03_28).
- net sched: fix reporting the first-time use timestamp (networking-stable-20_05_27).
- net_sched: sch_skbprio: add message validation to skbprio_change() (bsc#1109837).
- net/smc: add fallback check to connect() (git-fixes).
- net/smc: fix refcount non-blocking connect() -part 2 (git-fixes).
- net: stricter validation of untrusted gso packets (networking-stable-20_05_12).
- net/tls: Fix sk_psock refcnt leak in bpf_exec_tx_verdict() (networking-stable-20_05_12).
- net/tls: Fix sk_psock refcnt leak when in tls_data_ready() (networking-stable-20_05_12).
- net: usb: qmi_wwan: add support for DW5816e (networking-stable-20_05_12).
- net: vmxnet3: fix possible buffer overflow caused by bad DMA value in vmxnet3_get_rss() (bsc#1172484).
- net/x25: Fix x25_neigh refcnt leak when receiving frame (networking-stable-20_04_27).
- nfc: add missing attribute validation for SE API (networking-stable-20_03_14).
- nfc: add missing attribute validation for vendor subcommand (networking-stable-20_03_14).
- nfc: pn544: Fix occasional HW initialization failure (networking-stable-20_03_01).
- nfc: st21nfca: add missed kfree_skb() in an error path (bsc#1051510).
- nfp: abm: fix a memory leak bug (bsc#1109837).
- nfp: bpf: fix code-gen bug on BPF_ALU | BPF_XOR | BPF_K (git-fixes).
- nfsd4: fix up replay_matches_cache() (git-fixes).
- nfsd: Ensure CLONE persists data and metadata changes to the target file (git-fixes).
- nfsd: fix delay timer on 32-bit architectures (git-fixes).
- nfsd: fix jiffies/time_t mixup in LRU list (git-fixes).
- nfs: Directory page cache pages need to be locked when read (git-fixes).
- nfsd: memory corruption in nfsd4_lock() (git-fixes).
- nfs: Do not call generic_error_remove_page() while holding locks (bsc#1170457).
- NFS: Fix an RCU lock leak in nfs4_refresh_delegation_stateid() (bsc#1170592).
- nfs: Fix memory leaks and corruption in readdir (git-fixes).
- nfs: Fix O_DIRECT accounting of number of bytes read/written (git-fixes).
- nfs: Fix potential posix_acl refcnt leak in nfs3_set_acl (git-fixes).
- nfs: fix racey wait in nfs_set_open_stateid_locked (bsc#1170592).
- nfs/flexfiles: Use the correct TCP timeout for flexfiles I/O (git-fixes).
- nfs/pnfs: Fix pnfs_generic_prepare_to_resend_writes() (git-fixes).
- nfs: Revalidate the file size on a fatal write error (git-fixes).
- NFSv4.0: nfs4_do_fsinfo() should not do implicit lease renewals (git-fixes).
- NFSv4: Do not allow a cached open with a revoked delegation (git-fixes).
- NFSv4: Fix leak of clp->cl_acceptor string (git-fixes).
- NFSv4/pnfs: Return valid stateids in nfs_layout_find_inode_by_stateid() (git-fixes).
- NFSv4: Retry CLOSE and DELEGRETURN on NFS4ERR_OLD_STATEID (bsc#1170592).
- NFSv4: try lease recovery on NFS4ERR_EXPIRED (git-fixes).
- NFSv4.x: Drop the slot if nfs4_delegreturn_prepare waits for layoutreturn (git-fixes).
- nilfs2: fix null pointer dereference at nilfs_segctor_do_construct() (bsc#1173857).
- nl80211: fix NL80211_ATTR_CHANNEL_WIDTH attribute type (bsc#1111666).
- nl802154: add missing attribute validation for dev_type (networking-stable-20_03_14).
- nl802154: add missing attribute validation (networking-stable-20_03_14).
- nvdimm: Avoid race between probe and reading device attributes (bsc#1170442).
- nvme: check for NVME_CTRL_LIVE in nvme_report_ns_ids() (bcs#1171558 bsc#1159058).
- nvme: do not update multipath disk information if the controller is down (bcs#1171558 bsc#1159058).
- nvme: fail cancelled commands with NVME_SC_HOST_PATH_ERROR (bsc#1158983 bsc#1172538).
- nvme-fc: Fail transport errors with NVME_SC_HOST_PATH (bsc#1158983 bsc#1172538).
- nvme-fc: print proper nvme-fc devloss_tmo value (bsc#1172391).
- nvme-tcp: fail command with NVME_SC_HOST_PATH_ERROR send failed (bsc#1158983 bsc#1172538).
- objtool: Add is_static_jump() helper (bsc#1169514).
- objtool: Add relocation check for alternative sections (bsc#1169514).
- objtool: Clean instruction state before each function validation (bsc#1169514).
- objtool: Fix stack offset tracking for indirect CFAs (bsc#1169514).
- objtool: Fix switch table detection in .text.unlikely (bsc#1169514).
- objtool: Ignore empty alternatives (bsc#1169514).
- objtool: Make BP scratch register warning more robust (bsc#1169514).
- ocfs2: no need try to truncate file beyond i_size (bsc#1171841).
- OMAP: DSS2: remove non-zero check on variable r (bsc#1114279)
- overflow: Fix -Wtype-limits compilation warnings (git fixes).
- overflow.h: Add arithmetic shift helper (git fixes).
- p54usb: add AirVasT USB stick device-id (bsc#1051510).
- padata: ensure the reorder timer callback runs on the correct CPU (git-fixes).
- padata: Remove broken queue flushing (git-fixes).
- padata: reorder work kABI fixup (git-fixes).
- Partially revert 'kfifo: fix kfifo_alloc() and kfifo_init()' (git fixes (block drivers)).
- partitions/efi: Fix partition name parsing in GUID partition entry (bsc#1168763).
- PCI: Allow pci_resize_resource() for devices on root bus (bsc#1051510).
- PCI: Fix pci_register_host_bridge() device_register() error handling (bsc#1051510).
- PCI: Generalize multi-function power dependency device links (bsc#1111666).
- PCI: hv: Add support for protocol 1.3 and support PCI_BUS_RELATIONS2 (bsc#1172201, bsc#1172202).
- PCI: hv: Decouple the func definition in hv_dr_state from VSP message (bsc#1172201, bsc#1172202).
- PCI: pciehp: Fix indefinite wait on sysfs requests (git-fixes).
- PCI: pciehp: Fix MSI interrupt race (bsc#1159037).
- PCI: pciehp: Support interrupts sent from D3hot (git-fixes).
- PCI/PM: Call .bridge_d3() hook only if non-NULL (git-fixes).
- PCI: Program MPS for RCiEP devices (bsc#1051510).
- PCI/PTM: Inherit Switch Downstream Port PTM settings from Upstream Port (bsc#1051510).
- PCI: sanity test on PCI vendor to be sure we do not touch everything (bsc#1141558).
- pcm_native: result of put_user() needs to be checked (bsc#1111666).
- perf: Allocate context task_ctx_data for child event (git-fixes).
- perf: Allocate context task_ctx_data for child event (git-fixes).
- perf/cgroup: Fix perf cgroup hierarchy support (git-fixes).
- perf/cgroup: Fix perf cgroup hierarchy support (git-fixes).
- perf: Copy parent's address filter offsets on clone (git-fixes).
- perf: Copy parent's address filter offsets on clone (git-fixes).
- perf/core: Add sanity check to deal with pinned event failure (git-fixes).
- perf/core: Add sanity check to deal with pinned event failure (git-fixes).
- perf/core: Avoid freeing static PMU contexts when PMU is unregistered (git-fixes).
- perf/core: Avoid freeing static PMU contexts when PMU is unregistered (git-fixes).
- perf/core: Correct event creation with PERF_FORMAT_GROUP (git-fixes).
- perf/core: Correct event creation with PERF_FORMAT_GROUP (git-fixes).
- perf/core: Do not WARN() for impossible ring-buffer sizes (git-fixes).
- perf/core: Do not WARN() for impossible ring-buffer sizes (git-fixes).
- perf/core: Fix bad use of igrab() (git fixes (dependent patch)).
- perf/core: Fix crash when using HW tracing kernel filters (git-fixes).
- perf/core: Fix ctx_event_type in ctx_resched() (git-fixes).
- perf/core: Fix ctx_event_type in ctx_resched() (git-fixes).
- perf/core: Fix error handling in perf_event_alloc() (git-fixes).
- perf/core: Fix error handling in perf_event_alloc() (git-fixes).
- perf/core: Fix exclusive events' grouping (git-fixes).
- perf/core: Fix exclusive events' grouping (git-fixes).
- perf/core: Fix group scheduling with mixed hw and sw events (git-fixes).
- perf/core: Fix group scheduling with mixed hw and sw events (git-fixes).
- perf/core: Fix impossible ring-buffer sizes warning (git-fixes).
- perf/core: Fix impossible ring-buffer sizes warning (git-fixes).
- perf/core: Fix locking for children siblings group read (git-fixes).
- perf/core: Fix locking for children siblings group read (git-fixes).
- perf/core: Fix lock inversion between perf,trace,cpuhp (git-fixes (dependent patch for 18736eef1213)).
- perf/core: Fix perf_event_read_value() locking (git-fixes).
- perf/core: Fix perf_event_read_value() locking (git-fixes).
- perf/core: Fix perf_pmu_unregister() locking (git-fixes).
- perf/core: Fix perf_pmu_unregister() locking (git-fixes).
- perf/core: Fix __perf_read_group_add() locking (git-fixes (dependent patch)).
- perf/core: Fix perf_sample_regs_user() mm check (git-fixes).
- perf/core: Fix perf_sample_regs_user() mm check (git-fixes).
- perf/core: Fix possible Spectre-v1 indexing for ->aux_pages (git-fixes).
- perf/core: Fix possible Spectre-v1 indexing for ->aux_pages (git-fixes).
- perf/core: Fix race between close() and fork() (git-fixes).
- perf/core: Fix race between close() and fork() (git-fixes).
- perf/core: Fix the address filtering fix (git-fixes).
- perf/core: Fix the address filtering fix (git-fixes).
- perf/core: Fix use-after-free in uprobe_perf_close() (git-fixes).
- perf/core: Fix use-after-free in uprobe_perf_close() (git-fixes).
- perf/core: Force USER_DS when recording user stack data (git-fixes).
- perf/core: Force USER_DS when recording user stack data (git-fixes).
- perf/core: Restore mmap record type correctly (git-fixes).
- perf/core: Restore mmap record type correctly (git-fixes).
- perf: Fix header.size for namespace events (git-fixes).
- perf: Fix header.size for namespace events (git-fixes).
- perf/ioctl: Add check for the sample_period value (git-fixes).
- perf/ioctl: Add check for the sample_period value (git-fixes).
- perf, pt, coresight: Fix address filters for vmas with non-zero offset (git-fixes).
- perf, pt, coresight: Fix address filters for vmas with non-zero offset (git-fixes).
- perf: Return proper values for user stack errors (git-fixes).
- perf: Return proper values for user stack errors (git-fixes).
- perf/x86/amd: Add support for Large Increment per Cycle Events (jsc#SLE-11831).
- perf/x86/amd: Constrain Large Increment per Cycle events (git-fixes).
- perf/x86/amd: Constrain Large Increment per Cycle events (jsc#SLE-11831).
- perf/x86/amd/ibs: Fix reading of the IBS OpData register and thus precise RIP validity (git-fixes).
- perf/x86/amd/ibs: Fix sample bias for dispatched micro-ops (git-fixes).
- perf/x86/amd/ibs: Handle erratum #420 only on the affected CPU family (10h) (git-fixes).
- perf/x86/amd/iommu: Make the 'amd_iommu_attr_groups' symbol static (git-fixes).
- perf/x86/amd/uncore: Do not set 'ThreadMask' and 'SliceMask' for non-L3 PMCs (git-fixes stable).
- perf/x86/amd/uncore: Set the thread mask for F17h L3 PMCs (git-fixes).
- perf/x86/amd/uncore: Set ThreadMask and SliceMask for L3 Cache perf events (git-fixes stable).
- perf/x86: Enable free running PEBS for REGS_USER/INTR (git-fixes).
- perf/x86: Fix incorrect PEBS_REGS (git-fixes).
- perf/x86/intel: Add generic branch tracing check to intel_pmu_has_bts() (git-fixes).
- perf/x86/intel: Add proper condition to run sched_task callbacks (git-fixes).
- perf/x86/intel/bts: Fix the use of page_private() (git-fixes).
- perf/x86/intel: Fix PT PMI handling (git-fixes).
- perf/x86/intel: Move branch tracing setup to the Intel-specific source file (git-fixes).
- perf/x86/intel/uncore: Add Node ID mask (git-fixes).
- perf/x86/intel/uncore: Fix PCI BDF address of M3UPI on SKX (git-fixes).
- perf/x86/intel/uncore: Handle invalid event coding for free-running counter (git-fixes).
- perf/x86/pt, coresight: Clean up address filter structure (git fixes (dependent patch)).
- perf/x86/uncore: Fix event group support (git-fixes).
- pid: Improve the comment about waiting in zap_pid_ns_processes (git fixes)).
- pinctrl: baytrail: Enable pin configuration setting for GPIO chip (git-fixes).
- pinctrl: cherryview: Add missing spinlock usage in chv_gpio_irq_handler (git-fixes).
- pinctrl: freescale: imx: Fix an error handling path in 'imx_pinctrl_probe()' (bsc#1051510).
- pinctrl: imxl: Fix an error handling path in 'imx1_pinctrl_core_probe()' (bsc#1051510).
- pinctrl: samsung: Save/restore eint_mask over suspend for EINT_TYPE GPIOs (bsc#1051510).
- pinctrl: sunrisepoint: Fix PAD lock register offset for SPT-H (git-fixes).
- platform/x86: asus-nb-wmi: Do not load on Asus T100TA and T200TA (bsc#1051510).
- platform/x86: dell-laptop: do not register micmute LED if there is no token (bsc#1111666).
- platform/x86: hp-wmi: Convert simple_strtoul() to kstrtou32() (bsc#1111666).
- PM / Domains: Allow genpd users to specify default active wakeup behavior (git-fixes).
- pNFS: Ensure we do clear the return-on-close layout stateid on fatal errors (git-fixes).
- pnp: Use list_for_each_entry() instead of open coding (git fixes).
- powerpc/64s: Do not let DT CPU features set FSCR_DSCR (bsc#1065729).
- powerpc/64s: Save FSCR to init_task.thread.fscr after feature init (bsc#1065729).
- powerpc: Add attributes for setjmp/longjmp (bsc#1065729).
- powerpc/book3s64: Export has_transparent_hugepage() related functions (bsc#1171759).
- powerpc/book3s64/pkeys: Fix pkey_access_permitted() for execute disable pkey (bsc#1065729).
- powerpc/fadump: fix race between pstore write and fadump crash trigger (bsc#1168959 ltc#185010).
- powerpc/hash64/devmap: Use H_PAGE_THP_HUGE when setting up huge devmap PTE entries (bsc#1065729).
- powerpc/pci/of: Parse unassigned resources (bsc#1065729).
- powerpc/setup_64: Set cache-line-size based on cache-block-size (bsc#1065729).
- powerpc/sstep: Fix DS operand in ld encoding to appropriate value (bsc#1065729).
- powerpc/xive: Clear the page tables for the ESB IO mapping (bsc#1085030).
- powerpc/xmon: Reset RCU and soft lockup watchdogs (bsc#1065729).
- power: supply: bq24257_charger: Replace depends on REGMAP_I2C with select (bsc#1051510).
- power: supply: lp8788: Fix an error handling path in 'lp8788_charger_probe()' (bsc#1051510).
- power: supply: smb347-charger: IRQSTAT_D is volatile (bsc#1051510).
- power: vexpress: add suppress_bind_attrs to true (bsc#1111666).
- pppoe: only process PADT targeted at local interfaces (networking-stable-20_05_16).
- pwm: bcm2835: Dynamically allocate base (bsc#1051510).
- pwm: meson: Fix confusing indentation (bsc#1051510).
- pwm: pca9685: Fix PWM/GPIO inter-operation (bsc#1051510).
- pwm: rcar: Fix late Runtime PM enablement (bsc#1051510).
- pwm: renesas-tpu: Fix late Runtime PM enablement (bsc#1051510).
- qede: Fix race between rdma destroy workqueue and link change event (networking-stable-20_03_01).
- qed: reduce maximum stack frame size (git-fixes).
- qlcnic: fix missing release in qlcnic_83xx_interrupt_test (git-fixes).
- r8152: check disconnect status after long sleep (networking-stable-20_03_14).
- r8152: support additional Microsoft Surface Ethernet Adapter variant (networking-stable-20_05_27).
- raid5: remove gfp flags from scribble_alloc() (bsc#1166985).
- raid5: remove gfp flags from scribble_alloc() (git fixes (block drivers)).
- raid6/ppc: Fix build for clang (git fixes (block drivers)).
- random: always use batched entropy for get_random_u{32,64} (bsc#1164871).
- rcu: locking and unlocking need to always be at least barriers (git fixes (block drivers)).
- RDMA/efa: Fix setting of wrong bit in get/set_feature commands (bsc#1111666)
- RDMA/efa: Set maximum pkeys device attribute (bsc#1111666)
- RDMA/efa: Support remote read access in MR registration (bsc#1111666)
- RDMA/efa: Unified getters/setters for device structs bitmask access (bsc#1111666)
- RDMA/ipoib: Fix use of sizeof() (bsc#1168503).
- RDMA/netdev: Fix netlink support in IPoIB (bsc#1168503).
- RDMA/netdev: Hoist alloc_netdev_mqs out of the driver (bsc#1168503).
- RDMA/netdev: Use priv_destructor for netdev cleanup (bsc#1168503).
- regmap: debugfs: Do not sleep while atomic for fast_io regmaps (bsc#1111666).
- resolve KABI warning for perf-pt-coresight (git-fixes).
- rpm/kernel-docs.spec.in: Require python-packaging for build.
- rtlwifi: Fix a double free in _rtl_usb_tx_urb_setup() (bsc#1051510).
- s390/bpf: Maintain 8-byte stack alignment (bsc#1169194).
- s390/cio: avoid duplicated 'ADD' uevents (git-fixes).
- s390/cio: generate delayed uevent for vfio-ccw subchannels (git-fixes).
- s390/cpuinfo: fix wrong output when CPU0 is offline (git-fixes).
- s390/cpum_cf: Add new extended counters for IBM z15 (bsc#1169762 LTC#185291).
- s390/diag: fix display of diagnose call statistics (git-fixes).
- s390: fix syscall_get_error for compat processes (git-fixes).
- s390/ftrace: fix potential crashes when switching tracers (git-fixes).
- s390/gmap: return proper error code on ksm unsharing (git-fixes).
- s390/ism: fix error return code in ism_probe() (git-fixes).
- s390/ism: fix error return code in ism_probe() (git-fixes).
- s390/pci: do not set affinity for floating irqs (git-fixes).
- s390/pci: Fix possible deadlock in recover_store() (bsc#1165183 LTC#184103).
- s390/pci: Recover handle in clp_set_pci_fn() (bsc#1165183 LTC#184103).
- s390/qdio: consistently restore the IRQ handler (git-fixes).
- s390/qdio: lock device while installing IRQ handler (git-fixes).
- s390/qdio: put thinint indicator after early error (git-fixes).
- s390/qdio: tear down thinint indicator after early error (git-fixes).
- s390/qeth: cancel RX reclaim work earlier (git-fixes).
- s390/qeth: do not return -ENOTSUPP to userspace (git-fixes).
- s390/qeth: do not warn for napi with 0 budget (git-fixes).
- s390/qeth: fix error handling for isolation mode cmds (git-fixes).
- s390/qeth: fix off-by-one in RX copybreak check (git-fixes).
- s390/qeth: fix promiscuous mode after reset (git-fixes).
- s390/qeth: fix qdio teardown after early init error (git-fixes).
- s390/qeth: handle error due to unsupported transport mode (git-fixes).
- s390/qeth: handle error when backing RX buffer (git-fixes).
- s390/qeth: lock the card while changing its hsuid (git-fixes).
- s390/qeth: support net namespaces for L3 devices (git-fixes).
- s390/time: Fix clk type in get_tod_clock (git-fixes).
- sch_choke: avoid potential panic in choke_reset() (networking-stable-20_05_12).
- sch_sfq: validate silly quantum values (networking-stable-20_05_12).
- scripts/decodecode: fix trapping instruction formatting (bsc#1065729).
- scripts/dtc: Remove redundant YYLOC global declaration (bsc#1160388).
- scsi: aacraid: fix a signedness bug (bsc#1174296).
- scsi: bnx2i: fix potential use after free (bsc#1171600).
- scsi: core: avoid repetitive logging of device offline messages (bsc#1145929).
- scsi: core: Handle drivers which set sg_tablesize to zero (bsc#1171601) This commit also required: > scsi: core: avoid preallocating big SGL for data
- scsi: core: kABI fix offline_already (bsc#1145929).
- scsi: core: save/restore command resid for error handling (bsc#1171602).
- scsi: core: scsi_trace: Use get_unaligned_be*() (bsc#1171604).
- scsi: core: try to get module before removing device (bsc#1171605).
- scsi: csiostor: Adjust indentation in csio_device_reset (bsc#1171606).
- scsi: csiostor: Do not enable IRQs too early (bsc#1171607).
- scsi: esas2r: unlock on error in esas2r_nvram_read_direct() (bsc#1171608).
- scsi: fnic: fix invalid stack access (bsc#1171609).
- scsi: fnic: fix msix interrupt allocation (bsc#1171610).
- scsi: hisi_sas: fix calls to dma_set_mask_and_coherent() (bsc#1174296).
- scsi: ibmvscsi: Do not send host info in adapter info MAD after LPM (bsc#1172759 ltc#184814).
- scsi: ibmvscsi: Fix WARN_ON during event pool release (bsc#1170791 ltc#185128).
- scsi: iscsi: Avoid potential deadlock in iscsi_if_rx func (bsc#1171611).
- scsi: iscsi: Fix a potential deadlock in the timeout handler (bsc#1171612).
- scsi: iscsi: qla4xxx: fix double free in probe (bsc#1171613).
- scsi: lpfc: Add an internal trace log buffer (bsc#1172687 bsc#1171530).
- scsi: lpfc: Add blk_io_poll support for latency improvment (bsc#1172687 bsc#1171530).
- scsi: lpfc: Add support to display if adapter dumps are available (bsc#1172687 bsc#1171530).
- scsi: lpfc: Allow applications to issue Common Set Features mailbox command (bsc#1172687 bsc#1171530).
- scsi: lpfc: Avoid another null dereference in lpfc_sli4_hba_unset() (bsc#1172687 bsc#1171530).
- scsi: lpfc: Change default queue allocation for reduced memory consumption (bsc#1164780).
- scsi: lpfc: fix: Coverity: lpfc_cmpl_els_rsp(): Null pointer dereferences (bsc#1171614).
- scsi: lpfc: Fix crash in target side cable pulls hitting WAIT_FOR_UNREG (bsc#1171615).
- scsi: lpfc: Fix inconsistent indenting (bsc#1158983).
- scsi: lpfc: Fix interrupt assignments when multiple vectors are supported on same CPU (bsc#1158983).
- scsi: lpfc: Fix kdump hang on PPC (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix language in 0373 message to reflect non-error message (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix less-than-zero comparison of unsigned value (bsc#1158983).
- scsi: lpfc: Fix lpfc_nodelist leak when processing unsolicited event (bsc#1164780).
- scsi: lpfc: Fix MDS Diagnostic Enablement definition (bsc#1164780).
- scsi: lpfc: Fix missing MDS functionality (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix negation of else clause in lpfc_prep_node_fc4type (bsc#1164780).
- scsi: lpfc: Fix noderef and address space warnings (bsc#1164780).
- scsi: lpfc: Fix NVMe rport deregister and registration during ADISC (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix oops due to overrun when reading SLI3 data (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix shost refcount mismatch when deleting vport (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix stack trace seen while setting rrq active (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix unused assignment in lpfc_sli4_bsg_link_diag_test (bsc#1172687 bsc#1171530).
- scsi: lpfc: Maintain atomic consistency of queue_claimed flag (bsc#1164780).
- scsi: lpfc: remove duplicate unloading checks (bsc#1164780).
- scsi: lpfc: Remove re-binding of nvme rport during registration (bsc#1164780).
- scsi: lpfc: Remove redundant initialization to variable rc (bsc#1164780).
- scsi: lpfc: Remove unnecessary lockdep_assert_held calls (bsc#1164780).
- scsi: lpfc: Update lpfc version to 12.8.0.1 (bsc#1164780).
- scsi: lpfc: Update lpfc version to 12.8.0.2 (bsc#1158983).
- scsi: megaraid_sas: Do not initiate OCR if controller is not in ready state (bsc#1171616).
- scsi: megaraid_sas: Fix a compilation warning (bsc#1174296).
- scsi: mpt3sas: Fix double free in attach error handling (bsc#1174296).
- scsi: qedf: Add port_id getter (bsc#1150660).
- scsi: qla2xxx: add ring buffer for tracing debug logs (bsc#1157169).
- scsi: qla2xxx: check UNLOADING before posting async work (bsc#1157169).
- scsi: qla2xxx: Delete all sessions before unregister local nvme port (bsc#1157169).
- scsi: qla2xxx: Do not log message when reading port speed via sysfs (bsc#1157169).
- scsi: qla2xxx: Fix a condition in qla2x00_find_all_fabric_devs() (bsc#1174296).
- scsi: qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV (bsc#1157169).
- scsi: qla2xxx: Fix regression warnings (bsc#1157169).
- scsi: qla2xxx: Remove non functional code (bsc#1157169).
- scsi: qla2xxx: Set NVMe status code for failed NVMe FCP request (bsc#1158983).
- scsi: qla2xxx: set UNLOADING before waiting for session deletion (bsc#1157169).
- scsi: qla4xxx: Adjust indentation in qla4xxx_mem_free (bsc#1171617).
- scsi: qla4xxx: fix double free bug (bsc#1171618).
- scsi: sd: Clear sdkp->protection_type if disk is reformatted without PI (bsc#1171619).
- scsi: sg: add sg_remove_request in sg_common_write (bsc#1171620).
- scsi: tracing: Fix handling of TRANSFER LENGTH == 0 for READ(6) and WRITE(6) (bsc#1171621).
- scsi: ufs: change msleep to usleep_range (bsc#1171622).
- scsi: ufs: Clean up ufshcd_scale_clks() and clock scaling error out path (bsc#1171623).
- scsi: ufs: Fix ufshcd_hold() caused scheduling while atomic (bsc#1171624).
- scsi: ufs: Fix ufshcd_probe_hba() reture value in case ufshcd_scsi_add_wlus() fails (bsc#1171625).
- scsi: ufs: Recheck bkops level if bkops is disabled (bsc#1171626).
- scsi: zfcp: fix missing erp_lock in port recovery trigger for point-to-point (git-fixes).
- sctp: Do not add the shutdown timer if its already been added (networking-stable-20_05_27).
- sctp: fix possibly using a bad saddr with a given dst (networking-stable-20_04_02).
- sctp: fix refcount bug in sctp_wfree (networking-stable-20_04_02).
- sctp: move the format error check out of __sctp_sf_do_9_1_abort (networking-stable-20_03_01).
- sctp: Start shutdown on association restart if in SHUTDOWN-SENT state and socket is closed (networking-stable-20_05_27).
- selftests/powerpc: Fix build errors in powerpc ptrace selftests (boo#1124278).
- Separate one more kABI fixup from the functional change:
- seq_file: fix problem when seeking mid-record (bsc#1170125).
- serial: uartps: Move the spinlock after the read of the tx empty (git-fixes).
- sfc: detach from cb_page in efx_copy_channel() (networking-stable-20_03_14).
- signal/pid_namespace: Fix reboot_pid_ns to use send_sig not force_sig (bsc#1172185).
- slcan: not call free_netdev before rtnl_unlock in slcan_open (networking-stable-20_03_28).
- slip: make slhc_compress() more robust against malicious packets (networking-stable-20_03_14).
- smb3: Add new compression flags (bsc#1144333).
- smb3: change noisy error message to FYI (bsc#1144333).
- smb3: enable swap on SMB3 mounts (bsc#1144333).
- smb3: Minor cleanup of protocol definitions (bsc#1144333).
- smb3: remove overly noisy debug line in signing errors (bsc#1144333).
- smb3: smbdirect support can be configured by default (bsc#1144333).
- smb3: use SMB2_SIGNATURE_SIZE define (bsc#1144333).
- snb3: Additional compression structures (bsc#1144333).
- spi: bcm2835: Fix 3-wire mode if DMA is enabled (git-fixes).
- spi: bcm63xx-hsspi: Really keep pll clk enabled (bsc#1051510).
- spi: bcm-qspi: when tx/rx buffer is NULL set to 0 (bsc#1051510).
- spi: dw: Add SPI Rx-done wait method to DMA-based transfer (bsc#1051510).
- spi: dw: Add SPI Tx-done wait method to DMA-based transfer (bsc#1051510).
- spi: dw: use 'smp_mb()' to avoid sending spi data error (bsc#1051510).
- spi: dw: Zero DMA Tx and Rx configurations on stack (bsc#1051510).
- spi: fsl: do not map irq during probe (git-fixes).
- spi: fsl: use platform_get_irq() instead of of_irq_to_resource() (git-fixes).
- spi: pxa2xx: Add CS control clock quirk (bsc#1051510).
- spi: pxa2xx: Apply CS clk quirk to BXT (bsc#1111666).
- spi: qup: call spi_qup_pm_resume_runtime before suspending (bsc#1051510).
- spi: spi-fsl-dspi: Replace interruptible wait queue with a simple completion (git-fixes).
- spi: spi-mem: Fix Dual/Quad modes on Octal-capable devices (bsc#1111666).
- spi: spi-s3c64xx: Fix system resume support (git-fixes).
- spi: spi-sun6i: sun6i_spi_transfer_one(): fix setting of clock rate (bsc#1111666).
- spi/zynqmp: remove entry that causes a cs glitch (bsc#1051510).
- staging: comedi: dt2815: fix writing hi byte of analog output (bsc#1051510).
- staging: comedi: Fix comedi_device refcnt leak in comedi_open (bsc#1051510).
- staging: comedi: verify array index is correct before using it (bsc#1111666).
- staging: iio: ad2s1210: Fix SPI reading (bsc#1051510).
- staging: rtl8712: Fix IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK (bsc#1051510).
- staging: sm750fb: add missing case while setting FB_VISUAL (bsc#1051510).
- staging: vt6656: Do not set RCR_MULTICAST or RCR_BROADCAST by default (git-fixes).
- staging: vt6656: Fix drivers TBTT timing counter (git-fixes).
- staging: vt6656: Fix pairwise key entry save (git-fixes).
- SUNRPC: defer slow parts of rpc_free_client() to a workqueue (bsc#1168202).
- SUNRPC: expiry_time should be seconds not timeval (git-fixes).
- SUNRPC: Fix a potential buffer overflow in 'svc_print_xprts()' (git-fixes).
- SUNRPC: The TCP back channel mustn't disappear while requests are outstanding (bsc#1152624).
- supported.conf: Add br_netfilter to base (bsc#1169020).
- supported.conf: support w1 core and thermometer support
- svcrdma: Fix double svc_rdma_send_ctxt_put() in an error path (bsc#1103992).
- svcrdma: Fix leak of transport addresses (git-fixes).
- svcrdma: Fix trace point use-after-free race (bsc#1103992 ).
- taskstats: fix data-race (bsc#1172188).
- tcp: cache line align MAX_TCP_HEADER (networking-stable-20_04_27).
- tcp: repair: fix TCP_QUEUE_SEQ implementation (networking-stable-20_03_28).
- team: add missing attribute validation for array index (networking-stable-20_03_14).
- team: add missing attribute validation for port ifindex (networking-stable-20_03_14).
- team: fix hang in team_mode_get() (networking-stable-20_04_27).
- tg3: driver sleeps indefinitely when EEH errors exceed eeh_max_freezes (bsc#1173284).
- timers: Add a function to start/reduce a timer (networking-stable-20_05_27).
- tools lib traceevent: Remove unneeded qsort and uses memmove instead (git-fixes).
- tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send() (bsc#1065729).
- tpm_tis: Remove the HID IFX0102 (bsc#1111666).
- tpm/tpm_tis: Free IRQ if probing fails (bsc#1082555).
- tpm/tpm_tis: Free IRQ if probing fails (git-fixes).
- tracing: Add a vmalloc_sync_mappings() for safe measure (git-fixes).
- tracing: Disable trace_printk() on post poned tests (git-fixes).
- tracing: Fix event trigger to accept redundant spaces (git-fixes).
- tracing: Fix the race between registering 'snapshot' event trigger and triggering 'snapshot' operation (git-fixes).
- tty: n_gsm: Fix bogus i++ in gsm_data_kick (bsc#1051510).
- tty: n_gsm: Fix SOF skipping (bsc#1051510).
- tty: n_gsm: Fix waking up upper tty layer when room available (bsc#1051510).
- tty: rocket, avoid OOB access (git-fixes).
- tun: Do not put_page() for all negative return values from XDP program (bsc#1109837).
- tunnel: Propagate ECT(1) when decapsulating as recommended by RFC6040 (networking-stable-20_05_12).
- UAS: fix deadlock in error handling and PM flushing work (git-fixes).
- UAS: no use logging any details in case of ENODEV (git-fixes).
- ubifs: remove broken lazytime support (bsc#1173826).
- Update config files: Build w1 bus on arm64 (jsc#SLE-11048)
- USB: Add USB_QUIRK_DELAY_CTRL_MSG and USB_QUIRK_DELAY_INIT for Corsair K70 RGB RAPIDFIRE (git-fixes).
- usb: add USB_QUIRK_DELAY_INIT for Logitech C922 (git-fixes).
- USB: c67x00: fix use after free in c67x00_giveback_urb (bsc#1111666).
- USB: cdc-acm: restore capability check order (git-fixes).
- usb: chipidea: core: add wakeup support for extcon (bsc#1111666).
- USB: core: Fix misleading driver bug report (bsc#1051510).
- usb: dwc2: Fix shutdown callback in platform (bsc#1111666).
- usb: dwc2: gadget: move gadget resume after the core is in L0 state (bsc#1051510).
- USB: dwc3: do not set gadget->is_otg flag (git-fixes).
- USB: dwc3: gadget: Do link recovery for SS and SSP (git-fixes).
- usb: dwc3: gadget: introduce cancelled_list (git-fixes).
- usb: dwc3: gadget: never call ->complete() from ->ep_queue() (git-fixes).
- usb: dwc3: gadget: Properly handle ClearFeature(halt) (git-fixes).
- usb: dwc3: gadget: Properly handle failed kick_transfer (git-fixes).
- USB: early: Handle AMD's spec-compliant identifiers, too (git-fixes).
- USB: ehci: reopen solution for Synopsys HC bug (git-fixes).
- USB: f_fs: Clear OS Extended descriptor counts to zero in ffs_data_reset() (git-fixes).
- USB: gadget: audio: Fix a missing error return value in audio_bind() (git-fixes).
- USB: gadget: composite: Inform controller driver of self-powered (git-fixes).
- usb: gadget: fix potential double-free in m66592_probe (bsc#1111666).
- USB: gadget: legacy: fix error return code in cdc_bind() (git-fixes).
- USB: gadget: legacy: fix error return code in gncm_bind() (git-fixes).
- USB: gadget: legacy: fix redundant initialization warnings (bsc#1051510).
- usb: gadget: lpc32xx_udc: do not dereference ep pointer before null check (bsc#1051510).
- USB: gadget: net2272: Fix a memory leak in an error handling path in 'net2272_plat_probe()' (git-fixes).
- usb: gadget: udc: atmel: fix uninitialized read in debug printk (bsc#1111666).
- USB: gadget: udc: atmel: Fix vbus disconnect handling (git-fixes).
- USB: gadget: udc: atmel: Make some symbols static (git-fixes).
- usb: gadget: udc: atmel: remove outdated comment in usba_ep_disable() (bsc#1111666).
- USB: gadget: udc: bdc: Remove unnecessary NULL checks in bdc_req_complete (git-fixes).
- usb: gadget: udc: Potential Oops in error handling code (bsc#1111666).
- USB: gadget: udc: s3c2410_udc: Remove pointless NULL check in s3c2410_udc_nuke (bsc#1051510).
- usb: host: ehci-exynos: Fix error check in exynos_ehci_probe() (bsc#1111666).
- USB: host: ehci-mxc: Add error handling in ehci_mxc_drv_probe() (bsc#1051510).
- USB: host: xhci-plat: keep runtime active when removing host (git-fixes).
- USB: hub: Fix handling of connect changes during sleep (git-fixes).
- usb: musb: Fix runtime PM imbalance on error (bsc#1051510).
- usb: musb: start session in resume for host port (bsc#1051510).
- usbnet: silence an unnecessary warning (bsc#1170770).
- usbnet: smsc95xx: Fix use-after-free after removal (bsc#1111666).
- USB: ohci-sm501: Add missed iounmap() in remove (bsc#1111666).
- USB: serial: garmin_gps: add sanity checking for data length (git-fixes).
- USB: serial: iuu_phoenix: fix memory corruption (bsc#1111666).
- USB: serial: option: add BroadMobi BM806U (git-fixes).
- USB: serial: option: add support for ASKEY WWHC050 (git-fixes).
- USB: serial: option: add Telit LE910C1-EUX compositions (bsc#1051510).
- USB: serial: option: add Wistron Neweb D19Q1 (git-fixes).
- USB: serial: qcserial: add DW5816e QDL support (bsc#1051510).
- USB: serial: qcserial: Add DW5816e support (git-fixes).
- USB: serial: usb_wwan: do not resubmit rx urb on fatal errors (bsc#1051510).
- USB: serial: usb_wwan: do not resubmit rx urb on fatal errors (git-fixes).
- USB: sisusbvga: Change port variable from signed to unsigned (git-fixes).
- usb-storage: Add unusual_devs entry for JMicron JMS566 (git-fixes).
- USB: uas: add quirk for LaCie 2Big Quadra (git-fixes).
- USB: xhci: Fix NULL pointer dereference when enqueuing trbs from urb sg list (git-fixes).
- vfio/pci: Fix SR-IOV VF handling with MMIO blocking (bsc#1174123).
- vfs: Fix EOVERFLOW testing in put_compat_statfs64 (bnc#1151927 5.3.6).
- video: fbdev: sis: Remove unnecessary parentheses and commented code (bsc#1114279)
- video: fbdev: w100fb: Fix a potential double free (bsc#1051510).
- virtio-blk: handle block_device_operations callbacks after hot unplug (git fixes (block drivers)).
- vmxnet3: add geneve and vxlan tunnel offload support (bsc#1172484).
- vmxnet3: add support to get/set rx flow hash (bsc#1172484).
- vmxnet3: allow rx flow hash ops only when rss is enabled (bsc#1172484).
- vmxnet3: avoid format strint overflow warning (bsc#1172484).
- vmxnet3: prepare for version 4 changes (bsc#1172484).
- vmxnet3: Remove always false conditional statement (bsc#1172484).
- vmxnet3: remove redundant initialization of pointer 'rq' (bsc#1172484).
- vmxnet3: remove unused flag 'rxcsum' from struct vmxnet3_adapter (bsc#1172484).
- vmxnet3: Replace msleep(1) with usleep_range() (bsc#1172484).
- vmxnet3: update to version 4 (bsc#1172484).
- vmxnet3: use correct hdr reference when packet is encapsulated (bsc#1172484).
- vrf: Check skb for XFRM_TRANSFORMED flag (networking-stable-20_04_27).
- vt: ioctl, switch VT_IS_IN_USE and VT_BUSY to inlines (git-fixes).
- vt: selection, introduce vc_is_sel (git-fixes).
- vt: vt_ioctl: fix race in VT_RESIZEX (git-fixes).
- vt: vt_ioctl: fix use-after-free in vt_in_use() (git-fixes).
- vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console (git-fixes).
- vxlan: Avoid infinite loop when suppressing NS messages with invalid options (git-fixes).
- vxlan: check return value of gro_cells_init() (networking-stable-20_03_28).
- w1: Add subsystem kernel public interface (jsc#SLE-11048).
- w1: Fix slave count on 1-Wire bus (resend) (jsc#SLE-11048).
- w1: keep balance of mutex locks and refcnts (jsc#SLE-11048).
- w1: omap-hdq: cleanup to add missing newline for some dev_dbg (bsc#1051510).
- w1: use put_device() if device_register() fail (jsc#SLE-11048).
- watchdog: reset last_hw_keepalive time at start (git-fixes).
- watchdog: sp805: fix restart handler (bsc#1111666).
- wcn36xx: Fix error handling path in 'wcn36xx_probe()' (bsc#1051510).
- wil6210: add general initialization/size checks (bsc#1111666).
- wil6210: check rx_buff_mgmt before accessing it (bsc#1111666).
- wil6210: ignore HALP ICR if already handled (bsc#1111666).
- wil6210: make sure Rx ring sizes are correlated (git-fixes).
- wil6210: remove reset file from debugfs (git-fixes).
- wimax/i2400m: Fix potential urb refcnt leak (bsc#1051510).
- work around mvfs bug (bsc#1162063).
- workqueue: do not use wq_select_unbound_cpu() for bound works (bsc#1172130).
- x86/amd_nb: Add Family 19h PCI IDs (jsc#SLE-11834).
- x86/apic: Install an empty physflat_init_apic_ldr (bsc#1163309).
- x86/cpu/amd: Make erratum #1054 a legacy erratum (bsc#1114279).
- x86/entry/64: Fix unwind hints in kernel exit path (bsc#1058115).
- x86/entry/64: Fix unwind hints in register clearing code (bsc#1058115).
- x86/entry/64: Fix unwind hints in rewind_stack_do_exit() (bsc#1058115).
- x86/entry/64: Fix unwind hints in __switch_to_asm() (bsc#1058115).
- x86/events/intel/ds: Add PERF_SAMPLE_PERIOD into PEBS_FREERUNNING_FLAGS (git-fixes).
- x86/events/intel/ds: Add PERF_SAMPLE_PERIOD into PEBS_FREERUNNING_FLAGS (git-fixes).
- x86: Fix early boot crash on gcc-10, third try (bsc#1114279).
- x86/Hyper-V: Allow guests to enable InvariantTSC (bsc#1170620).
- x86/Hyper-V: Free hv_panic_page when fail to register kmsg dump (bsc#1170617, bsc#1170618).
- x86/Hyper-V: Free hv_panic_page when fail to register kmsg dump (bsc#1170618).
- x86/Hyper-V: Report crash data in die() when panic_on_oops is set (bsc#1170617, bsc#1170618).
- x86/Hyper-V: Report crash data in die() when panic_on_oops is set (bsc#1170618).
- x86/Hyper-V: Report crash register data or kmsg before running crash kernel (bsc#1170617, bsc#1170618).
- x86/Hyper-V: Report crash register data or kmsg before running crash kernel (bsc#1170618).
- x86/Hyper-V: Report crash register data when sysctl_record_panic_msg is not set (bsc#1170617, bsc#1170618).
- x86/Hyper-V: Report crash register data when sysctl_record_panic_msg is not set (bsc#1170618).
- x86/Hyper-V: report value of misc_features (git fixes).
- x86/Hyper-V: report value of misc_features (git-fixes).
- x86/Hyper-V: Trigger crash enlightenment only once during system crash (bsc#1170617, bsc#1170618).
- x86/Hyper-V: Trigger crash enlightenment only once during system crash (bsc#1170618).
- x86/Hyper-V: Unload vmbus channel in hv panic callback (bsc#1170617, bsc#1170618).
- x86/Hyper-V: Unload vmbus channel in hv panic callback (bsc#1170618).
- x86/Hyperv-V: Allow guests to enable InvariantTSC (bsc#1170621, bsc#1170620).
- x86/kprobes: Avoid kretprobe recursion bug (bsc#1114279).
- x86/MCE/AMD: Add a KABI workaround for enum smca_bank_types (jsc#SLE-11833).
- x86/MCE/AMD, EDAC/mce_amd: Add new Load Store unit McaType (jsc#SLE-11833).
- x86/{mce,mm}: Unmap the entire page if the whole page is affected and poisoned (bsc#1172257).
- x86/microcode/AMD: Increase microcode PATCH_MAX_SIZE (bsc#1169005).
- x86/reboot/quirks: Add MacBook6,1 reboot quirk (bsc#1114279).
- x86/resctrl: Fix invalid attempt at removing the default resource group (git-fixes).
- x86/resctrl: Preserve CDP enable over CPU hotplug (bsc#1114279).
- x86/unwind/orc: Do not skip the first frame for inactive tasks (bsc#1058115).
- x86/unwind/orc: Fix error handling in __unwind_start() (bsc#1058115).
- x86/unwind/orc: Fix error path for bad ORC entry type (bsc#1058115).
- x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks (bsc#1058115).
- x86/unwind/orc: Prevent unwinding before ORC initialization (bsc#1058115).
- x86/unwind: Prevent false warnings for non-current tasks (bsc#1058115).
- x86/xen: fix booting 32-bit pv guest (bsc#1071995).
- x86/xen: Make the boot CPU idle task reliable (bsc#1071995).
- x86/xen: Make the secondary CPU idle tasks reliable (bsc#1071995).
- xen/blkfront: fix memory allocation flags in blkfront_setup_indirect() (bsc#1168486).
- xen/pci: reserve MCFG areas earlier (bsc#1170145).
- xfrm: Always set XFRM_TRANSFORMED in xfrm{4,6}_output_finish (networking-stable-20_04_27).
- xfrm: fix error in comment (git fixes).
- xfs: clear PF_MEMALLOC before exiting xfsaild thread (git-fixes).
- xfs: Correctly invert xfs_buftarg LRU isolation logic (git-fixes).
- xfs: do not ever return a stale pointer from __xfs_dir3_free_read (git-fixes).
- xhci: Fix incorrect EP_STATE_MASK (git-fixes).
- xprtrdma: Fix completion wait during device removal (git-fixes).
Patchnames
SUSE-2020-2478,SUSE-SLE-RT-12-SP5-2020-2478
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 12 SP5 RT kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it. This attack is known as Special Register Buffer Data Sampling (SRBDS) or \u0027CrossTalk\u0027 (bsc#1154824).\n- CVE-2020-13143: Fixed an out-of-bounds read in gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c (bsc#1171982).\n- CVE-2020-12769: Fixed an issue which could have allowed attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one (bsc#1171983).\n- CVE-2020-12659: Fixed an out-of-bounds write (by a user with the CAP_NET_ADMIN capability) due to improper headroom validation (bsc#1171214).\n- CVE-2020-12657: An a use-after-free in block/bfq-iosched.c (bsc#1171205).\n- CVE-2020-12656: Fixed an improper handling of certain domain_release calls leadingch could have led to a memory leak (bsc#1171219).\n- CVE-2020-12655: Fixed an issue which could have allowed attackers to trigger a sync of excessive duration via an XFS v5 image with crafted metadata (bsc#1171217).\n- CVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a remote AP to trigger a heap-based buffer overflow (bsc#1171202).\n- CVE-2020-12653: Fixed an issue in the wifi driver which could have allowed local users to gain privileges or cause a denial of service (bsc#1171195).\n- CVE-2020-12652: Fixed an issue which could have allowed local users to hold an incorrect lock during the ioctl operation and trigger a race condition (bsc#1171218).\n- CVE-2020-12464: Fixed a use-after-free due to a transfer without a reference (bsc#1170901).\n- CVE-2020-12114: Fixed a pivot_root race condition which could have allowed local users to cause a denial of service (panic) by corrupting a mountpoint reference counter (bsc#1171098).\n- CVE-2020-11669: Fixed an issue where arch/powerpc/kernel/idle_book3s.S did not have save/restore functionality for PNV_POWERSAVE_AMR, PNV_POWERSAVE_UAMOR, and PNV_POWERSAVE_AMOR (bnc#1169390).\n- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172317).\n- CVE-2020-10751: Fixed an improper implementation in SELinux LSM hook where it was assumed that an skb would only contain a single netlink message (bsc#1171189).\n- CVE-2020-10732: Fixed kernel data leak in userspace coredumps due to uninitialized data (bsc#1171220).\n- CVE-2020-10720: Fixed a use-after-free read in napi_gro_frags() (bsc#1170778).\n- CVE-2020-10711: Fixed a null pointer dereference in SELinux subsystem which could have allowed a remote network user to crash the kernel resulting in a denial of service (bsc#1171191).\n- CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev (bsc#1170056).\n- CVE-2019-20908: An issue was discovered in drivers/firmware/efi/efi.c where incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032 (bnc#1173567).\n- CVE-2020-10781: zram sysfs resource consumption was fixed (bnc#1173074).\n- CVE-2020-15780: An issue was discovered in drivers/acpi/acpi_configfs.c where injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30 (bnc#1173573).\n- CVE-2020-15393: usbtest_disconnect in drivers/usb/misc/usbtest.c had a memory leak, aka CID-28ebeb8db770 (bnc#1173514).\n- CVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c had a deadlock if a coalescing operation fails (bnc#1171732).\n- CVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).\n- CVE-2020-10769: A buffer over-read flaw was found in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm\u0027s module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash. This flaw allowed a local attacker with user privileges to cause a denial of service (bnc#1173265).\n- CVE-2020-10773: A kernel stack information leak on s390/s390x was fixed (bnc#1172999).\n- CVE-2020-14416: A race condition in tty-\u003edisc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).\n- CVE-2020-10766: Fixed an issue which allowed an attacker with a local account to disable SSBD protection (bnc#1172781).\n- CVE-2020-10767: Fixed an issue where Indirect Branch Prediction Barrier was disabled in certain circumstances, leaving the system open to a spectre v2 style attack (bnc#1172782).\n- CVE-2020-10768: Fixed an issue with the prctl() function, where indirect branch speculation could be enabled even though it was diabled before (bnc#1172783).\n- CVE-2020-13974: Fixed a integer overflow in drivers/tty/vt/keyboard.c, if k_ascii is called several times in a row (bnc#1172775).\n- CVE-2019-20810: go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c did not call snd_card_free for a failure path, which caused a memory leak, aka CID-9453264ef586 (bnc#1172458).\n- CVE-2019-16746: An issue was discovered in net/wireless/nl80211.c, where the length of variable elements in a beacon head was not checked, leading to a buffer overflow (bnc#1152107 1173659).\n- CVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a video driver. This could lead to local information disclosure with System execution privileges needed (bsc#1170345).\n- CVE-2019-20812: Fixed an issue in prb_calc_retire_blk_tmo() which could have resulted in a denial of service (bsc#1172453).\n- CVE-2019-20806: Fixed a null pointer dereference which may had lead to denial of service (bsc#1172199).\n- CVE-2019-19462: Fixed an issue which could have allowed local user to cause denial of service (bsc#1158265).\n- CVE-2018-1000199: Fixed a potential local code execution via ptrace (bsc#1089895).\n\nThe following non-security bugs were fixed:\n\n- ACPI: CPPC: Fix reference count leak in acpi_cppc_processor_probe() (bsc#1051510).\n- ACPI: GED: add support for _Exx / _Lxx handler methods (bsc#1111666).\n- ACPI: GED: use correct trigger type field in _Exx / _Lxx handling (bsc#1111666).\n- ACPI: NFIT: Fix unlock on error in scrub_show() (bsc#1171753).\n- ACPI: PM: Avoid using power resources if there are none for D0 (bsc#1051510).\n- ACPI: sysfs: Fix pm_profile_attr type (bsc#1111666).\n- ACPI: sysfs: Fix reference count leak in acpi_sysfs_add_hotplug_profile() (bsc#1051510).\n- acpi/x86: ignore unspecified bit positions in the ACPI global lock field (bsc#1051510).\n- Add br_netfilter to kernel-default-base (bsc#1169020)\n- agp/intel: Reinforce the barrier after GTT updates (bsc#1051510).\n- ahci: Add support for Amazon\u0027s Annapurna Labs SATA controller (bsc#1169013).\n- ALSA: ctxfi: Remove unnecessary cast in kfree (bsc#1051510).\n- ALSA: doc: Document PC Beep Hidden Register on Realtek ALC256 (bsc#1051510).\n- ALSA: dummy: Fix PCM format loop in proc output (bsc#1111666).\n- ALSA: es1688: Add the missed snd_card_free() (bsc#1051510).\n- ALSA: hda: Add driver blacklist (bsc#1051510).\n- ALSA: hda: Add ElkhartLake HDMI codec vid (bsc#1111666).\n- ALSA: hda: add sienna_cichlid audio asic id for sienna_cichlid up (bsc#1111666).\n- ALSA: hda: Always use jackpoll helper for jack update after resume (bsc#1051510).\n- ALSA: hda: call runtime_allow() for all hda controllers (bsc#1051510).\n- ALSA: hda: Do not release card at firmware loading error (bsc#1051510).\n- ALSA: hda: Explicitly permit using autosuspend if runtime PM is supported (bsc#1051510).\n- ALSA: hda: Fix potential access overflow in beep helper (bsc#1051510).\n- ALSA: hda/hdmi - enable runtime pm for newer AMD display audio (bsc#1111666).\n- ALSA: hda/hdmi: fix race in monitor detection during probe (bsc#1051510).\n- ALSA: hda/hdmi: fix without unlocked before return (bsc#1051510).\n- ALSA: hda: Honor PM disablement in PM freeze and thaw_noirq ops (bsc#1051510).\n- ALSA: hda: Keep the controller initialization even if no codecs found (bsc#1051510).\n- ALSA: hda: Match both PCI ID and SSID for driver blacklist (bsc#1111666).\n- ALSA: hda/realtek - Add a model for Thinkpad T570 without DAC workaround (bsc#1172017).\n- ALSA: hda/realtek - add a pintbl quirk for several Lenovo machines (bsc#1111666).\n- ALSA: hda/realtek - Add COEF workaround for ASUS ZenBook UX431DA (git-fixes).\n- ALSA: hda/realtek - Add HP new mute led supported for ALC236 (git-fixes).\n- ALSA: hda/realtek - Add LED class support for micmute LED (bsc#1111666).\n- ALSA: hda/realtek - Add more fixup entries for Clevo machines (git-fixes).\n- ALSA: hda/realtek - Add new codec supported for ALC245 (bsc#1051510).\n- ALSA: hda/realtek - Add new codec supported for ALC287 (git-fixes).\n- ALSA: hda/realtek: Add quirk for Samsung Notebook (git-fixes).\n- ALSA: hda/realtek - Add supported new mute Led for HP (git-fixes).\n- ALSA: hda/realtek - Enable headset mic of ASUS GL503VM with ALC295 (git-fixes).\n- ALSA: hda/realtek - Enable headset mic of ASUS UX550GE with ALC295 (git-fixes).\n- ALSA: hda/realtek: Enable headset mic of ASUS UX581LV with ALC295 (git-fixes).\n- ALSA: hda/realtek - Enable micmute LED on and HP system (bsc#1111666).\n- ALSA: hda/realtek - Enable Speaker for ASUS UX533 and UX534 (bsc#1111666).\n- ALSA: hda/realtek - Enable the headset mic on Asus FX505DT (bsc#1051510).\n- ALSA: hda/realtek - Fix S3 pop noise on Dell Wyse (git-fixes).\n- ALSA: hda/realtek - Fix silent output on Gigabyte X570 Aorus Xtreme (bsc#1111666).\n- ALSA: hda/realtek - Fix unexpected init_amp override (bsc#1051510).\n- ALSA: hda/realtek - Fix unused variable warning w/o CONFIG_LEDS_TRIGGER_AUDIO (bsc#1111666).\n- ALSA: hda/realtek - Introduce polarity for micmute LED GPIO (bsc#1111666).\n- ALSA: hda/realtek - Limit int mic boost for Thinkpad T530 (git-fixes bsc#1171293).\n- ALSA: hda/realtek - Two front mics on a Lenovo ThinkCenter (bsc#1051510).\n- ALSA: hda: Release resources at error in delayed probe (bsc#1051510).\n- ALSA: hda: Remove ASUS ROG Zenith from the blacklist (bsc#1051510).\n- ALSA: hda: Skip controller resume if not needed (bsc#1051510).\n- ALSA: hwdep: fix a left shifting 1 by 31 UB bug (git-fixes).\n- ALSA: ice1724: Fix invalid access for enumerated ctl items (bsc#1051510).\n- ALSA: iec1712: Initialize STDSP24 properly when using the model=staudio option (git-fixes).\n- ALSA: lx6464es - add support for LX6464ESe pci express variant (bsc#1111666).\n- ALSA: opti9xx: shut up gcc-10 range warning (bsc#1051510).\n- ALSA: pcm: disallow linking stream to itself (bsc#1111666).\n- ALSA: pcm: fix incorrect hw_base increase (git-fixes).\n- ALSA: pcm: oss: Fix regression by buffer overflow fix (bsc#1051510).\n- ALSA: pcm: oss: Place the plugin buffer overflow checks correctly (bsc#1170522).\n- ALSA: rawmidi: Fix racy buffer resize under concurrent accesses (git-fixes).\n- ALSA: usb-audio: Add connector notifier delegation (bsc#1051510).\n- ALSA: usb-audio: Add control message quirk delay for Kingston HyperX headset (git-fixes).\n- ALSA: usb-audio: Add duplex sound support for USB devices using implicit feedback (bsc#1111666).\n- ALSA: usb-audio: add mapping for ASRock TRX40 Creator (git-fixes).\n- ALSA: usb-audio: Add mixer workaround for TRX40 and co (bsc#1051510).\n- ALSA: usb-audio: Add Pioneer DJ DJM-900NXS2 support (bsc#1111666).\n- ALSA: usb-audio: Add quirk for Focusrite Scarlett 2i2 (bsc#1051510).\n- ALSA: usb-audio: Add static mapping table for ALC1220-VB-based mobos (bsc#1051510).\n- ALSA: usb-audio: Add vendor, product and profile name for HP Thunderbolt Dock (bsc#1111666).\n- ALSA: usb-audio: Apply async workaround for Scarlett 2i4 2nd gen (bsc#1051510).\n- ALSA: usb-audio: Check mapping at creating connector controls, too (bsc#1051510).\n- ALSA: usb-audio: Clean up quirk entries with macros (bsc#1111666).\n- ALSA: usb-audio: Correct a typo of NuPrime DAC-10 USB ID (bsc#1051510).\n- ALSA: usb-audio: Do not create jack controls for PCM terminals (bsc#1051510).\n- ALSA: usb-audio: Do not override ignore_ctl_error value from the map (bsc#1051510).\n- ALSA: usb-audio: Filter error from connector kctl ops, too (bsc#1051510).\n- ALSA: usb-audio: Fix inconsistent card PM state after resume (bsc#1111666).\n- ALSA: usb-audio: Fix packet size calculation (bsc#1111666).\n- ALSA: usb-audio: Fix racy list management in output queue (bsc#1111666).\n- ALSA: usb-audio: Fix usb audio refcnt leak when getting spdif (bsc#1051510).\n- ALSA: usb-audio: Improve frames size computation (bsc#1111666).\n- ALSA: usb-audio: Manage auto-pm of all bundled interfaces (bsc#1111666).\n- ALSA: usb-audio: mixer: volume quirk for ESS Technology Asus USB DAC (git-fixes).\n- ALSA: usb-audio: Quirks for Gigabyte TRX40 Aorus Master onboard audio (git-fixes).\n- ALSA: usb-audio: Use the new macro for HP Dock rename quirks (bsc#1111666).\n- ALSA: usx2y: Fix potential NULL dereference (bsc#1051510).\n- amdgpu: a NULL -\u003emm does not mean a thread is a kthread (git-fixes).\n- arm64: map FDT as RW for early_init_dt_scan() (jsc#SLE-12423).\n- ASoC: codecs: hdac_hdmi: Fix incorrect use of list_for_each_entry (bsc#1051510).\n- ASoC: dapm: connect virtual mux with default value (bsc#1051510).\n- ASoC: dapm: fixup dapm kcontrol widget (bsc#1051510).\n- ASoC: dpcm: allow start or stop during pause for backend (bsc#1051510).\n- ASoC: fix regwmask (bsc#1051510).\n- ASoC: Intel: atom: Take the drv-\u003elock mutex before calling sst_send_slot_map() (bsc#1051510).\n- ASoC: msm8916-wcd-digital: Reset RX interpolation path after use (bsc#1051510).\n- ASoC: samsung: Prevent clk_get_rate() calls in atomic context (bsc#1111666).\n- ASoC: topology: Check return value of pcm_new_ver (bsc#1051510).\n- ASoC: topology: use name_prefix for new kcontrol (bsc#1051510).\n- ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb (bsc#1111666).\n- ath9k: Fix use-after-free Read in ath9k_wmi_ctrl_rx (bsc#1111666).\n- ath9k: Fix use-after-free Write in ath9k_htc_rx_msg (bsc#1111666).\n- ath9x: Fix stack-out-of-bounds Write in ath9k_hif_usb_rx_cb (bsc#1111666).\n- ax25: fix setsockopt(SO_BINDTODEVICE) (networking-stable-20_05_27).\n- b43: Fix connection problem with WPA3 (bsc#1111666).\n- b43legacy: Fix case where channel status is corrupted (bsc#1051510).\n- b43_legacy: Fix connection problem with WPA3 (bsc#1111666).\n- batman-adv: fix batadv_nc_random_weight_tq (git-fixes).\n- batman-adv: Fix refcnt leak in batadv_show_throughput_override (git-fixes).\n- batman-adv: Fix refcnt leak in batadv_store_throughput_override (git-fixes).\n- batman-adv: Fix refcnt leak in batadv_v_ogm_process (git-fixes).\n- bcache: avoid unnecessary btree nodes flushing in btree_flush_write() (git fixes (block drivers)).\n- bcache: Fix an error code in bch_dump_read() (git fixes (block drivers)).\n- bcache: fix incorrect data type usage in btree_flush_write() (git fixes (block drivers)).\n- bcache: Revert \u0027bcache: shrink btree node cache after bch_btree_check()\u0027 (git fixes (block drivers)).\n- be2net: fix link failure after ethtool offline test (git-fixes).\n- blk-mq: honor IO scheduler for multiqueue devices (bsc#1165478).\n- blk-mq: simplify blk_mq_make_request() (bsc#1165478).\n- block, bfq: add requeue-request hook (bsc#1104967 bsc#1171673).\n- block, bfq: fix use-after-free in bfq_idle_slice_timer_body (bsc#1168760).\n- block, bfq: postpone rq preparation to insert or merge (bsc#1104967 bsc#1171673).\n- block/drbd: delete invalid function drbd_md_mark_dirty_ (bsc#1171527).\n- block: drbd: remove a stray unlock in __drbd_send_protocol() (bsc#1171599).\n- block: fix busy device checking in blk_drop_partitions again (bsc#1171948).\n- block: fix busy device checking in blk_drop_partitions (bsc#1171948).\n- block: fix memleak of bio integrity data (git fixes (block drivers)).\n- block: keep bdi-\u003eio_pages in sync with max_sectors_kb for stacked devices (bsc#1168762).\n- block: nr_sects_write(): Disable preemption on seqcount write (bsc#1173818).\n- block: remove QUEUE_FLAG_STACKABLE (git fixes (block drivers)).\n- block: remove the bd_openers checks in blk_drop_partitions (bsc#1171948).\n- block: sed-opal: fix sparse warning: convert __be64 data (git fixes (block drivers)).\n- Bluetooth: Add SCO fallback for invalid LMP parameters error (bsc#1111666).\n- Bluetooth: RFCOMM: fix ODEBUG bug in rfcomm_dev_ioctl (bsc#1051510).\n- bnxt_en: Fix AER reset logic on 57500 chips (git-fixes).\n- bnxt_en: Fix ethtool selftest crash under error conditions (git-fixes).\n- bnxt_en: Fix handling FRAG_ERR when NVM_INSTALL_UPDATE cmd fails (git-fixes).\n- bnxt_en: Fix ipv6 RFS filter matching logic (git-fixes).\n- bnxt_en: fix memory leaks in bnxt_dcbnl_ieee_getets() (networking-stable-20_03_28).\n- bnxt_en: fix NULL dereference in case SR-IOV configuration fails (git-fixes).\n- bnxt_en: Fix VF anti-spoof filter setup (networking-stable-20_05_12).\n- bnxt_en: Fix VLAN acceleration handling in bnxt_fix_features() (networking-stable-20_05_12).\n- bnxt_en: Improve AER slot reset (networking-stable-20_05_12).\n- bnxt_en: Reduce BNXT_MSIX_VEC_MAX value to supported CQs per PF (bsc#1104745).\n- bnxt_en: reinitialize IRQs when MTU is modified (networking-stable-20_03_14).\n- bnxt_en: Return error if bnxt_alloc_ctx_mem() fails (bsc#1104745 ).\n- bnxt_en: Return error when allocating zero size context memory (bsc#1104745).\n- bonding/alb: make sure arp header is pulled before accessing it (networking-stable-20_03_14).\n- bpf: Fix sk_psock refcnt leak when receiving message (bsc#1083647).\n- bpf: Forbid XADD on spilled pointers for unprivileged users (bsc#1083647).\n- brcmfmac: abort and release host after error (bsc#1051510).\n- brcmfmac: fix wrong location to get firmware feature (bsc#1111666).\n- brcmfmac: Transform compatible string for FW loading (bsc#1169771).\n- btrfs: always wait on ordered extents at fsync time (bsc#1171761).\n- btrfs: clean up the left over logged_list usage (bsc#1171761).\n- btrfs: do not zero f_bavail if we have available space (bsc#1168081).\n- btrfs: do not zero f_bavail if we have available space (bsc#1168081).\n- Btrfs: fix deadlock with memory reclaim during scrub (bsc#1172127).\n- Btrfs: fix list_add corruption and soft lockups in fsync (bsc#1171761).\n- btrfs: fix log context list corruption after rename whiteout error (bsc#1172342).\n- Btrfs: fix missing data checksums after a ranged fsync (msync) (bsc#1171761).\n- btrfs: fix missing file extent item for hole after ranged fsync (bsc#1171761).\n- Btrfs: fix missing hole after hole punching and fsync when using NO_HOLES (bsc#1171761).\n- btrfs: fix missing semaphore unlock in btrfs_sync_file (bsc#1171761).\n- btrfs: fix partial loss of prealloc extent past i_size after fsync (bsc#1172343).\n- Btrfs: fix rare chances for data loss when doing a fast fsync (bsc#1171761).\n- btrfs: move the dio_sem higher up the callchain (bsc#1171761).\n- btrfs: qgroup: Fix a bug that prevents qgroup to be re-enabled after disable (bsc#1172247).\n- btrfs: relocation: add error injection points for cancelling balance (bsc#1171417).\n- btrfs: relocation: Check cancel request after each data page read (bsc#1171417).\n- btrfs: relocation: Check cancel request after each extent found (bsc#1171417).\n- btrfs: relocation: Clear the DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417).\n- btrfs: relocation: Fix reloc root leakage and the NULL pointer reference caused by the leakage (bsc#1171417).\n- btrfs: relocation: Work around dead relocation stage loop (bsc#1171417).\n- btrfs: reloc: clear DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417 bsc#1160947 bsc#1172366).\n- btrfs: reloc: fix reloc root leak and NULL pointer dereference (bsc#1171417 bsc#1160947 bsc#1172366).\n- btrfs: Remove extra parentheses from condition in copy_items() (bsc#1171761).\n- Btrfs: remove no longer used io_err from btrfs_log_ctx (bsc#1171761).\n- Btrfs: remove no longer used logged range variables when logging extents (bsc#1171761).\n- Btrfs: remove no longer used \u0027sync\u0027 member from transaction handle (bsc#1171761).\n- btrfs: remove remaing full_sync logic from btrfs_sync_file (bsc#1171761).\n- btrfs: remove the logged extents infrastructure (bsc#1171761).\n- btrfs: remove the wait ordered logic in the log_one_extent path (bsc#1171761).\n- btrfs: setup a nofs context for memory allocation at btrfs_create_tree() (bsc#1172127).\n- btrfs: setup a nofs context for memory allocation at __btrfs_set_acl (bsc#1172127).\n- btrfs: use nofs context when initializing security xattrs to avoid deadlock (bsc#1172127).\n- btrfs: volumes: Remove ENOSPC-prone btrfs_can_relocate() (bsc#1171124).\n- bus: sunxi-rsb: Return correct data when mixing 16-bit and 8-bit reads (bsc#1111666).\n- can: add missing attribute validation for termination (networking-stable-20_03_14).\n- carl9170: remove P2P_GO support (bsc#1111666).\n- cdc-acm: close race betrween suspend() and acm_softint (git-fixes).\n- CDC-ACM: heed quirk also in error handling (git-fixes).\n- cdc-acm: introduce a cool down (git-fixes).\n- ceph: check if file lock exists before sending unlock request (bsc#1168789).\n- ceph: convert mdsc-\u003ecap_dirty to a per-session list (bsc#1167104).\n- ceph: demote quotarealm lookup warning to a debug message (bsc#1171692).\n- ceph: fix double unlock in handle_cap_export() (bsc#1171694).\n- ceph: fix double unlock in handle_cap_export() (bsc#1171694).\n- ceph: fix endianness bug when handling MDS session feature bits (bsc#1171695).\n- ceph: fix endianness bug when handling MDS session feature bits (bsc#1171695).\n- ceph: request expedited service on session\u0027s last cap flush (bsc#1167104).\n- cgroup, blkcg: Prepare some symbols for module and !CONFIG_CGROUP usages (bsc#1173857).\n- cgroup, netclassid: periodically release file_lock on classid updating (networking-stable-20_03_14).\n- char/random: Add a newline at the end of the file (jsc#SLE-12423).\n- CIFS: Allocate crypto structures on the fly for calculating signatures of incoming packets (bsc#1144333).\n- CIFS: Allocate encryption header through kmalloc (bsc#1144333).\n- CIFS: allow unlock flock and OFD lock across fork (bsc#1144333).\n- CIFS: check new file size when extending file by fallocate (bsc#1144333).\n- CIFS: CIFSpdu.h: Replace zero-length array with flexible-array member (bsc#1144333).\n- CIFS: clear PF_MEMALLOC before exiting demultiplex thread (bsc#1144333).\n- CIFS: do not share tcons with DFS (bsc#1144333).\n- CIFS: dump the session id and keys also for SMB2 sessions (bsc#1144333).\n- CIFS: ensure correct super block for DFS reconnect (bsc#1144333).\n- CIFS: Fix bug which the return value by asynchronous read is error (bsc#1144333).\n- CIFS: fix uninitialised lease_key in open_shroot() (bsc#1144333).\n- cifs: get rid of unused parameter in reconn_setup_dfs_targets() (bsc#1144333).\n- cifs: handle hostnames that resolve to same ip in failover (bsc#1144333 bsc#1161016).\n- CIFS: ignore cached share root handle closing errors (bsc#1166780).\n- CIFS: improve read performance for page size 64KB \u0026 cache=strict \u0026 vers=2.1+ (bsc#1144333).\n- CIFS: Increment num_remote_opens stats counter even in case of smb2_query_dir_first (bsc#1144333).\n- CIFS: minor update to comments around the cifs_tcp_ses_lock mutex (bsc#1144333).\n- CIFS: protect updating server-\u003edstaddr with a spinlock (bsc#1144333).\n- cifs: set up next DFS target before generic_ip_connect() (bsc#1144333 bsc#1161016).\n- CIFS: smb2pdu.h: Replace zero-length array with flexible-array member (bsc#1144333).\n- CIFS: smbd: Calculate the correct maximum packet size for segmented SMBDirect send/receive (bsc#1144333).\n- CIFS: smbd: Check and extend sender credits in interrupt context (bsc#1144333).\n- CIFS: smbd: Check send queue size before posting a send (bsc#1144333).\n- CIFS: smbd: Do not schedule work to send immediate packet on every receive (bsc#1144333).\n- CIFS: smbd: Merge code to track pending packets (bsc#1144333).\n- CIFS: smbd: Properly process errors on ib_post_send (bsc#1144333).\n- CIFS: smbd: Update receive credits before sending and deal with credits roll back on failure before sending (bsc#1144333).\n- CIFS: Warn less noisily on default mount (bsc#1144333).\n- clk: Add clk_hw_unregister_composite helper function definition (bsc#1051510).\n- clk: bcm2835: Fix return type of bcm2835_register_gate (bsc#1051510).\n- clk: clk-flexgen: fix clock-critical handling (bsc#1051510).\n- clk: imx6ull: use OSC clock during AXI rate change (bsc#1051510).\n- clk: imx: make mux parent strings const (bsc#1051510).\n- clk: mediatek: correct the clocks for MT2701 HDMI PHY module (bsc#1051510).\n- clk: qcom: rcg: Return failure for RCG update (bsc#1051510).\n- clk: sunxi: Fix incorrect usage of round_down() (bsc#1051510).\n- clk: sunxi-ng: a64: Fix gate bit of DSI DPHY (bsc#1051510).\n- clocksource/drivers/hyper-v: Set TSC clocksource as default w/ InvariantTSC (bsc#1170620).\n- clocksource/drivers/hyper-v: Set TSC clocksource as default w/ InvariantTSC (bsc#1170620, bsc#1170621).\n- clocksource: dw_apb_timer: Make CPU-affiliation being optional (bsc#1111666).\n- clocksource: dw_apb_timer_of: Fix missing clockevent timers (bsc#1051510).\n- compat_ioctl: block: handle BLKREPORTZONE/BLKRESETZONE (git fixes (block drivers)).\n- compat_ioctl: block: handle Persistent Reservations (git fixes (block drivers)).\n- component: Silence bind error on -EPROBE_DEFER (bsc#1051510).\n- copy_{to,from}_user(): consolidate object size checks (git fixes).\n- coresight: do not use the BIT() macro in the UAPI header (git fixes (block drivers)).\n- cpufreq: s3c64xx: Remove pointless NULL check in s3c64xx_cpufreq_driver_init (bsc#1051510).\n- crypto: algboss - do not wait during notifier callback (bsc#1111666).\n- crypto: algif_skcipher - Cap recv SG list at ctx-\u003eused (bsc#1111666).\n- crypto: caam - update xts sector size for large input length (bsc#1111666).\n- crypto: cavium/nitrox - Fix \u0027nitrox_get_first_device()\u0027 when ndevlist is fully iterated (bsc#1111666).\n- crypto: cavium/nitrox - Fix \u0027nitrox_get_first_device()\u0027 when ndevlist is fully iterated (git-fixes).\n- crypto: ccp - AES CFB mode is a stream cipher (git-fixes).\n- crypto: ccp - Change a message to reflect status instead of failure (bsc#1172218).\n- crypto: ccp - Clean up and exit correctly on allocation failure (git-fixes).\n- crypto: ccp - Cleanup misc_dev on sev_exit() (bsc#1114279).\n- crypto: ccp - Cleanup sp_dev_master in psp_dev_destroy() (bsc#1114279).\n- Crypto/chcr: fix for ccm(aes) failed test (bsc#1111666).\n- crypto: chelsio/chtls: properly set tp-\u003elsndtime (bsc#1111666).\n- cxgb4: fix MPS index overwrite when setting MAC address (bsc#1127355).\n- cxgb4: fix Txq restart check during backpressure (bsc#1127354 bsc#1127371).\n- debugfs: Add debugfs_create_xul() for hexadecimal unsigned long (git-fixes).\n- debugfs: Check module state before warning in {full/open}_proxy_open() (bsc#1173746).\n- debugfs_lookup(): switch to lookup_one_len_unlocked() (bsc#1171979).\n- Deprecate NR_UNSTABLE_NFS, use NR_WRITEBACK (bsc#1163403).\n- devlink: fix return value after hitting end in region read (bsc#1109837).\n- devlink: validate length of param values (bsc#1109837).\n- devlink: validate length of region addr/len (bsc#1109837).\n- dmaengine: dmatest: Fix iteration non-stop logic (bsc#1051510).\n- dmaengine: tegra210-adma: Fix an error handling path in \u0027tegra_adma_probe()\u0027 (bsc#1111666).\n- dm btree: increase rebalance threshold in __rebalance2() (git fixes (block drivers)).\n- dm cache: fix a crash due to incorrect work item cancelling (git fixes (block drivers)).\n- dm crypt: fix benbi IV constructor crash if used in authenticated mode (git fixes (block drivers)).\n- dm: fix potential for q-\u003emake_request_fn NULL pointer (git fixes (block drivers)).\n- dm mpath: switch paths in dm_blk_ioctl() code path (bsc#1167574).\n- dm-raid1: fix invalid return value from dm_mirror (bsc#1172378).\n- dm space map common: fix to ensure new block isn\u0027t already in use (git fixes (block drivers)).\n- dm: various cleanups to md-\u003equeue initialization code (git fixes).\n- dm verity fec: fix hash block number in verity_fec_decode (git fixes (block drivers)).\n- dm verity fec: fix memory leak in verity_fec_dtr (git fixes (block drivers)).\n- dm writecache: fix data corruption when reloading the target (git fixes (block drivers)).\n- dm writecache: fix incorrect flush sequence when doing SSD mode commit (git fixes (block drivers)).\n- dm writecache: verify watermark during resume (git fixes (block drivers)).\n- dm zoned: fix invalid memory access (git fixes (block drivers)).\n- dm zoned: reduce overhead of backing device checks (git fixes (block drivers)).\n- dm zoned: remove duplicate nr_rnd_zones increase in dmz_init_zone() (git fixes (block drivers)).\n- dm zoned: support zone sizes smaller than 128MiB (git fixes (block drivers)).\n- dp83640: reverse arguments to list_add_tail (git-fixes).\n- dpaa_eth: fix usage as DSA master, try 3 (networking-stable-20_05_27).\n- driver-core, libnvdimm: Let device subsystems add local lockdep coverage (bsc#1171753).\n- Drivers: hv: Add a module description line to the hv_vmbus driver (bsc#1172249, bsc#1172251).\n- Drivers: hv: Add a module description line to the hv_vmbus driver (bsc#1172253).\n- Drivers: hv: Change flag to write log level in panic msg to false (bsc#1170617, bsc#1170618).\n- Drivers: HV: Send one page worth of kmsg dump over Hyper-V during panic (bsc#1170618).\n- Drivers: hv: vmbus: Fix the issue with freeing up hv_ctl_table_hdr (bsc#1170618).\n- Drivers: hv: vmbus: Get rid of MSR access from vmbus_drv.c (bsc#1170618).\n- Drivers: hv: vmus: Fix the check for return value from kmsg get dump buffer (bsc#1170618).\n- Drivers/net/ibmvnic: Update VNIC protocol version reporting (bsc#1065729).\n- drivers: soc: ti: knav_qmss_queue: Make knav_gp_range_ops static (bsc#1051510).\n- Drivers: w1: add hwmon support structures (jsc#SLE-11048).\n- Drivers: w1: add hwmon temp support for w1_therm (jsc#SLE-11048).\n- Drivers: w1: refactor w1_slave_show to make the temp reading functionality separate (jsc#SLE-11048).\n- drm: amd/acp: fix broken menu structure (bsc#1114279) \t* context changes\n- drm: amd/display: fix Kconfig help text (bsc#1113956) \t* only fix DEBUG_KERNEL_DC\n- drm/amdgpu: Correctly initialize thermal controller for GPUs with Powerplay table v0 (e.g Hawaii) (bsc#1111666).\n- drm/amdgpu: Fix oops when pp_funcs is unset in ACPI event (bsc#1111666).\n- drm/amd/powerplay: force the trim of the mclk dpm_levels if OD is (bsc#1113956)\n- drm/atomic: Take the atomic toys away from X (bsc#1112178) \t* context changes\n- drm/bochs: downgrade pci_request_region failure from error to warning (bsc#1051510).\n- drm: bridge: adv7511: Extend list of audio sample rates (bsc#1111666).\n- drm/crc: Actually allow to change the crc source (bsc#1114279) \t* offset changes\n- drm/dp_mst: Fix clearing payload state on topology disable (bsc#1051510).\n- drm/dp_mst: Increase ACT retry timeout to 3s (bsc#1113956) * context changes\n- drm/dp_mst: Reformat drm_dp_check_act_status() a bit (bsc#1051510).\n- drm_dp_mst_topology: fix broken drm_dp_sideband_parse_remote_dpcd_read() (bsc#1051510).\n- drm/edid: Fix off-by-one in DispID DTD pixel clock (bsc#1114279)\n- drm: encoder_slave: fix refcouting error for modules (bsc#1111666).\n- drm: encoder_slave: fix refcouting error for modules (bsc#1114279)\n- drm/etnaviv: fix perfmon domain interation (bsc#1113956)\n- drm/etnaviv: rework perfmon query infrastructure (bsc#1112178)\n- drm/i915: Apply Wa_1406680159:icl,ehl as an engine workaround (bsc#1112178) \t* rename gt/intel_workarounds.c to intel_workarounds.c \t* context changes\n- drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of (bsc#1114279)\n- drm/i915: HDCP: fix Ri prime check done during link check (bsc#1112178) \t* rename display/intel_hdmi.c to intel_hdmi.c \t* context changes\n- drm/i915/icl+: Fix hotplug interrupt disabling after storm detection (bsc#1112178)\n- drm/i915: properly sanity check batch_start_offset (bsc#1114279) \t* renamed display/intel_fbc.c -\u003e intel_fb.c \t* renamed gt/intel_rc6.c -\u003e intel_pm.c \t* context changes\n- drm/i915: Whitelist context-local timestamp in the gen9 cmdparser (bsc#1111666).\n- drm/mediatek: Check plane visibility in atomic_update (bsc#1113956) * context changes\n- drm/meson: Delete an error message in meson_dw_hdmi_bind() (bsc#1051510).\n- drm/msm/dpu: fix error return code in dpu_encoder_init (bsc#1111666).\n- drm/msm: stop abusing dma_map/unmap for cache (bsc#1051510).\n- drm/msm: Use the correct dma_sync calls harder (bsc#1051510).\n- drm/msm: Use the correct dma_sync calls in msm_gem (bsc#1051510).\n- drm: NULL pointer dereference [null-pointer-deref] (CWE 476) problem (bsc#1114279)\n- drm: panel-orientation-quirks: Add quirk for Asus T101HA panel (bsc#1111666).\n- drm: panel-orientation-quirks: Use generic orientation-data for Acer S1003 (bsc#1111666).\n- drm/qxl: qxl_release leak in qxl_draw_dirty_fb() (bsc#1051510).\n- drm/qxl: qxl_release leak in qxl_hw_surface_alloc() (bsc#1051510).\n- drm/qxl: qxl_release use after free (bsc#1051510).\n- drm/qxl: Use correct notify port address when creating cursor ring (bsc#1113956)\n- drm/radeon: fix double free (bsc#1113956)\n- drm/radeon: fix fb_div check in ni_init_smc_spll_table() (bsc#1113956)\n- drm: Remove PageReserved manipulation from drm_pci_alloc (bsc#1114279) \t* offset changes\n- drm/sun4i: dsi: Allow binding the host without a panel (bsc#1113956)\n- drm/sun4i: dsi: Avoid hotplug race with DRM driver bind (bsc#1113956)\n- drm/sun4i: dsi: Remove incorrect use of runtime PM (bsc#1113956) \t* context changes\n- drm/sun4i: dsi: Remove unused drv from driver context (bsc#1113956) \t* context changes \t* keep include of sun4i_drv.h\n- drm/sun4i: hdmi ddc clk: Fix size of m divider (bsc#1111666).\n- drm/tegra: hub: Do not enable orphaned window group (bsc#1111666).\n- drm/vkms: Hold gem object while still in-use (bsc#1113956) * context changes\n- dump_stack: avoid the livelock of the dump_lock (git fixes (block drivers)).\n- e1000: Distribute switch variables for initialization (bsc#1111666).\n- e1000e: Disable TSO for buffer overrun workaround (bsc#1051510).\n- e1000e: Do not wake up the system via WOL if device wakeup is disabled (bsc#1051510).\n- e1000e: Relax condition to trigger reset for ME workaround (bsc#1111666).\n- EDAC/amd64: Add family ops for Family 19h Models 00h-0Fh (jsc#SLE-11833).\n- EDAC/amd64: Drop some family checks for newer systems (jsc#SLE-11833).\n- EDAC/amd64: Read back the scrub rate PCI register on F15h (bsc#1114279).\n- EDAC/mce_amd: Always load on SMCA systems (jsc#SLE-11833).\n- EDAC/mce_amd: Make fam_ops static global (jsc#SLE-11833).\n- EDAC, sb_edac: Add support for systems with segmented PCI buses (bsc#1169525).\n- efi/random: Increase size of firmware supplied randomness (jsc#SLE-12423).\n- efi/random: Treat EFI_RNG_PROTOCOL output as bootloader randomness (jsc#SLE-12423).\n- efi: READ_ONCE rng seed size before munmap (jsc#SLE-12423).\n- efi: Reorder pr_notice() with add_device_randomness() call (jsc#SLE-12423).\n- evm: Check also if *tfm is an error pointer in init_desc() (bsc#1051510).\n- evm: Fix a small race in init_desc() (bsc#1051510).\n- ext4: add cond_resched() to __ext4_find_entry() (bsc#1166862).\n- ext4: Check for non-zero journal inum in ext4_calculate_overhead (bsc#1167288).\n- ext4: do not assume that mmp_nodename/bdevname have NUL (bsc#1166860).\n- ext4: do not zeroout extents beyond i_disksize (bsc#1167851).\n- ext4: fix a data race at inode-\u003ei_blocks (bsc#1171835).\n- ext4: fix a data race in EXT4_I(inode)-\u003ei_disksize (bsc#1166861).\n- ext4: fix extent_status fragmentation for plain files (bsc#1171949).\n- ext4: fix incorrect group count in ext4_fill_super error message (bsc#1168765).\n- ext4: fix incorrect inodes per group in error message (bsc#1168764).\n- ext4: fix partial cluster initialization when splitting extent (bsc#1173839).\n- ext4: fix potential race between online resizing and write operations (bsc#1166864).\n- ext4: fix potential race between s_flex_groups online resizing and access (bsc#1166867).\n- ext4: fix potential race between s_group_info online resizing and access (bsc#1166866).\n- ext4: fix race between ext4_sync_parent() and rename() (bsc#1173838).\n- ext4: fix race between writepages and enabling EXT4_EXTENTS_FL (bsc#1166870).\n- ext4: fix support for inode sizes \u003e 1024 bytes (bsc#1164284).\n- ext4, jbd2: ensure panic by fix a race between jbd2 abort and ext4 error handlers (bsc#1173833).\n- ext4: potential crash on allocation error in ext4_alloc_flex_bg_array() (bsc#1166940).\n- ext4: rename s_journal_flag_rwsem to s_writepages_rwsem (bsc#1166868).\n- ext4: use non-movable memory for superblock readahead (bsc#1171952).\n- ext4: validate the debug_want_extra_isize mount option at parse time (bsc#1163897).\n- extcon: adc-jack: Fix an error handling path in \u0027adc_jack_probe()\u0027 (bsc#1051510).\n- fanotify: fix ignore mask logic for events on child and on dir (bsc#1172719).\n- fanotify: fix merging marks masks with FAN_ONDIR (bsc#1171679).\n- fbcon: fix null-ptr-deref in fbcon_switch (bsc#1114279) \t* rename drivers/video/fbdev/core to drivers/video/console \t* context changes\n- fbdev: potential information leak in do_fb_ioctl() (bsc#1114279)\n- fbmem: Adjust indentation in fb_prepare_logo and fb_blank (bsc#1114279)\n- fdt: add support for rng-seed (jsc#SLE-12423).\n- fdt: Update CRC check for rng-seed (jsc#SLE-12423).\n- fib: add missing attribute validation for tun_id (networking-stable-20_03_14).\n- firmware: imx: scu: Fix corruption of header (git-fixes).\n- firmware: imx: scu: Fix possible memory leak in imx_scu_probe() (bsc#1111666).\n- firmware: qcom: scm: fix compilation error when disabled (bsc#1051510).\n- Fix a backport bug, where btrfs_put_root() -\u003e btrfs_put_fs_root() modification is not needed due to missing dependency\n- fix multiplication overflow in copy_fdtable() (bsc#1173825).\n- fpga: dfl: afu: Corrected error handling levels (git-fixes).\n- fq_codel: fix TCA_FQ_CODEL_DROP_BATCH_SIZE sanity checks (networking-stable-20_05_12).\n- fs/cifs: fix gcc warning in sid_to_id (bsc#1144333).\n- fs/seq_file.c: simplify seq_file iteration code and interface (bsc#1170125).\n- gpiolib: Document that GPIO line names are not globally unique (bsc#1051510).\n- gpio: tegra: mask GPIO IRQs during IRQ shutdown (bsc#1051510).\n- gpu: host1x: Detach driver on unregister (bsc#1111666).\n- gpu: ipu-v3: pre: do not trigger update if buffer address does not change (bsc#1111666).\n- gre: fix uninit-value in __iptunnel_pull_header (networking-stable-20_03_14).\n- HID: hid-input: clear unmapped usages (git-fixes).\n- HID: hyperv: Add a module description line (bsc#1172249, bsc#1172251).\n- HID: hyperv: Add a module description line (bsc#1172253).\n- HID: i2c-hid: add Trekstor Primebook C11B to descriptor override (git-fixes).\n- HID: i2c-hid: override HID descriptors for certain devices (git-fixes).\n- HID: multitouch: add eGalaxTouch P80H84 support (bsc#1051510).\n- HID: sony: Fix for broken buttons on DS3 USB dongles (bsc#1051510).\n- HID: wacom: Read HID_DG_CONTACTMAX directly for non-generic devices (git-fixes).\n- hrtimer: Annotate lockless access to timer-\u003estate (git fixes (block drivers)).\n- hsr: add restart routine into hsr_get_node_list() (networking-stable-20_03_28).\n- hsr: check protocol version in hsr_newlink() (networking-stable-20_04_17).\n- hsr: fix general protection fault in hsr_addr_is_self() (networking-stable-20_03_28).\n- hsr: set .netnsok flag (networking-stable-20_03_28).\n- hsr: use rcu_read_lock() in hsr_get_node_{list/status}() (networking-stable-20_03_28).\n- hwmon: (acpi_power_meter) Fix potential memory leak in acpi_power_meter_add() (bsc#1111666).\n- hwmon: (emc2103) fix unable to change fan pwm1_enable attribute (bsc#1111666).\n- hwmon: (max6697) Make sure the OVERT mask is set correctly (bsc#1111666).\n- i2c: acpi: Force bus speed to 400KHz if a Silead touchscreen is present (git-fixes).\n- i2c: acpi: put device when verifying client fails (git-fixes).\n- i2c: algo-pca: Add 0x78 as SCL stuck low status for PCA9665 (bsc#1111666).\n- i2c: brcmstb: remove unused struct member (git-fixes).\n- i2c: core: Allow empty id_table in ACPI case as well (git-fixes).\n- i2c: core: decrease reference count of device node in i2c_unregister_device (git-fixes).\n- i2c: dev: Fix the race between the release of i2c_dev and cdev (bsc#1051510).\n- i2c: fix missing pm_runtime_put_sync in i2c_device_probe (git-fixes).\n- i2c-hid: properly terminate i2c_hid_dmi_desc_override_table array (git-fixes).\n- i2c: i801: Do not add ICH_RES_IO_SMI for the iTCO_wdt device (git-fixes).\n- i2c: iproc: Stop advertising support of SMBUS quick cmd (git-fixes).\n- i2c: isch: Remove unnecessary acpi.h include (git-fixes).\n- i2c: mlxcpld: check correct size of maximum RECV_LEN packet (bsc#1111666).\n- i2c: mux: demux-pinctrl: Fix an error handling path in \u0027i2c_demux_pinctrl_probe()\u0027 (bsc#1051510).\n- i2c: st: fix missing struct parameter description (bsc#1051510).\n- i40e: reduce stack usage in i40e_set_fc (git-fixes).\n- IB/ipoib: Add child to parent list only if device initialized (bsc#1168503).\n- IB/ipoib: Consolidate checking of the proposed child interface (bsc#1168503).\n- IB/ipoib: Do not remove child devices from within the ndo_uninit (bsc#1168503).\n- IB/ipoib: Get rid of IPOIB_FLAG_GOING_DOWN (bsc#1168503).\n- IB/ipoib: Get rid of the sysfs_mutex (bsc#1168503).\n- IB/ipoib: Maintain the child_intfs list from ndo_init/uninit (bsc#1168503).\n- IB/ipoib: Move all uninit code into ndo_uninit (bsc#1168503).\n- IB/ipoib: Move init code to ndo_init (bsc#1168503).\n- IB/ipoib: Replace printk with pr_warn (bsc#1168503).\n- IB/ipoib: Use cancel_delayed_work_sync for neigh-clean task (bsc#1168503).\n- IB/ipoib: Warn when one port fails to initialize (bsc#1168503).\n- IB/mlx5: Fix missing congestion control debugfs on rep rdma device (bsc#1103991).\n- ibmveth: Fix max MTU limit (bsc#1173428 ltc#186397).\n- ibmvfc: do not send implicit logouts prior to NPIV login (bsc#1169625 ltc#184611).\n- ibmvnic: continue to init in CRQ reset returns H_CLOSED (bsc#1173280 ltc#185369).\n- ibmvnic: Flush existing work items before device removal (bsc#1065729).\n- ibmvnic: Harden device login requests (bsc#1170011 ltc#183538).\n- ibmvnic: Skip fatal error reset after passive init (bsc#1171078 ltc#184239).\n- iio:ad7797: Use correct attribute_group (bsc#1051510).\n- iio: adc: stm32-adc: fix device used to request dma (bsc#1051510).\n- iio: adc: stm32-adc: fix sleep in atomic context (git-fixes).\n- iio: adc: stm32-adc: Use dma_request_chan() instead dma_request_slave_channel() (bsc#1051510).\n- iio: buffer: Do not allow buffers without any channels enabled to be activated (bsc#1051510).\n- iio: dac: vf610: Fix an error handling path in \u0027vf610_dac_probe()\u0027 (bsc#1051510).\n- iio:health:afe4404 Fix timestamp alignment and prevent data leak (bsc#1111666).\n- iio:humidity:hdc100x Fix alignment and data leak issues (bsc#1111666).\n- iio:magnetometer:ak8974: Fix alignment and data leak issues (bsc#1111666).\n- iio: mma8452: Add missed iio_device_unregister() call in mma8452_probe() (bsc#1111666).\n- iio: pressure: bmp280: Tolerate IRQ before registering (bsc#1051510).\n- iio:pressure:ms5611 Fix buffer element alignment (bsc#1111666).\n- iio: pressure: zpa2326: handle pm_runtime_get_sync failure (bsc#1111666).\n- iio: sca3000: Remove an erroneous \u0027get_device()\u0027 (bsc#1051510).\n- iio: xilinx-xadc: Fix ADC-B powerdown (bsc#1051510).\n- iio: xilinx-xadc: Fix clearing interrupt when enabling trigger (bsc#1051510).\n- iio: xilinx-xadc: Fix sequencer configuration for aux channels in simultaneous mode (bsc#1051510).\n- ima: Directly assign the ima_default_policy pointer to ima_rules (bsc#1051510).\n- ima: Fix ima digest hash table key calculation (bsc#1051510).\n- ima: Fix return value of ima_write_policy() (git-fixes).\n- include/asm-generic/topology.h: guard cpumask_of_node() macro argument (bsc#1148868).\n- Input: evdev - call input_flush_device() on release(), not flush() (bsc#1051510).\n- Input: hyperv-keyboard - add module description (bsc#1172249, bsc#1172251).\n- Input: hyperv-keyboard - add module description (bsc#1172253).\n- Input: i8042 - add Acer Aspire 5738z to nomux list (bsc#1051510).\n- Input: i8042 - add ThinkPad S230u to i8042 reset list (bsc#1051510).\n- Input: raydium_i2c_ts - use true and false for boolean values (bsc#1051510).\n- Input: synaptics - add a second working PNP_ID for Lenovo T470s (bsc#1111666).\n- Input: synaptics-rmi4 - fix error return code in rmi_driver_probe() (bsc#1051510).\n- Input: synaptics-rmi4 - really fix attn_data use-after-free (git-fixes).\n- Input: usbtouchscreen - add support for BonXeon TP (bsc#1051510).\n- Input: xpad - add custom init packet for Xbox One S controllers (bsc#1051510).\n- intel_idle: Graceful probe failure when MWAIT is disabled (bsc#1174115).\n- intel_th: Fix a NULL dereference when hub driver is not loaded (bsc#1111666).\n- iommu/amd: Call domain_flush_complete() in update_domain() (bsc#1172096).\n- iommu/amd: Do not flush Device Table in iommu_map_page() (bsc#1172097).\n- iommu/amd: Do not loop forever when trying to increase address space (bsc#1172098).\n- iommu/amd: Fix legacy interrupt remapping for x2APIC-enabled system (bsc#1172099).\n- iommu/amd: Fix over-read of ACPI UID from IVRS table (bsc#1172101).\n- iommu/amd: Fix race in increase_address_space()/fetch_pte() (bsc#1172102).\n- iommu/amd: Fix the configuration of GCR3 table root pointer (bsc#1169057).\n- iommu/amd: Update Device Table in increase_address_space() (bsc#1172103).\n- iommu: Fix reference count leak in iommu_group_alloc (bsc#1172397).\n- iommu/vt-d: Enable PCI ACS for platform opt in hint (bsc#1174130).\n- ip6_tunnel: Allow rcv/xmit even if remote address is a local address (bsc#1166978).\n- ipmi: fix hung processes in __get_guid() (git-fixes).\n- ipv4: fix a RCU-list lock in fib_triestat_seq_show (networking-stable-20_04_02).\n- ipv6/addrconf: call ipv6_mc_up() for non-Ethernet interface (networking-stable-20_03_14).\n- ipv6: do not auto-add link-local address to lag ports (networking-stable-20_04_09).\n- ipv6: fix IPV6_ADDRFORM operation logic (bsc#1171662).\n- ipv6: Fix nlmsg_flags when splitting a multipath route (networking-stable-20_03_01).\n- ipv6: fix restrict IPV6_ADDRFORM operation (bsc#1171662).\n- ipv6: Fix route replacement with dev-only route (networking-stable-20_03_01).\n- ipvlan: add cond_resched_rcu() while processing muticast backlog (networking-stable-20_03_14).\n- ipvlan: call dev_change_flags when ipvlan mode is reset (git-fixes).\n- ipvlan: do not add hardware address of master to its unicast filter list (bsc#1137325).\n- ipvlan: do not deref eth hdr before checking it\u0027s set (networking-stable-20_03_14).\n- ipvlan: do not use cond_resched_rcu() in ipvlan_process_multicast() (networking-stable-20_03_14).\n- iwlwifi: pcie: actually release queue memory in TVQM (bsc#1051510).\n- ixgbe: do not check firmware errors (bsc#1170284).\n- ixgbevf: Remove limit of 10 entries for unicast filter list (git-fixes).\n- jbd2: avoid leaking transaction credits when unreserving handle (bsc#1173845).\n- jbd2: Preserve kABI when adding j_abort_mutex (bsc#1173833).\n- kabi fix for (bsc#1168202).\n- kabi fix for early XHCI debug (git-fixes).\n- kabi for for md: improve handling of bio with REQ_PREFLUSH in md_flush_request() (git-fixes).\n- kabi: ppc64le: prevent struct dma_map_ops to become defined (jsc#SLE-12423).\n- kabi, protect struct ib_device (bsc#1168503).\n- kABI: protect struct mlx5_cmd_work_ent (kabi).\n- kabi/severities: Do not track KVM internal symbols.\n- kabi/severities: Ingnore get_dev_data() The function is internal to the AMD IOMMU driver and must not be called by any third party.\n- kabi workaround for snd_rawmidi buffer_ref field addition (git-fixes).\n- kernfs: fix barrier usage in __kernfs_new_node() (bsc#1111666).\n- KEYS: reaching the keys quotas correctly (bsc#1051510).\n- KVM: arm64: Change hyp_panic()s dependency on tpidr_el2 (bsc#1133021).\n- KVM: arm64: Stop save/restoring host tpidr_el1 on VHE (bsc#1133021).\n- KVM: Check validity of resolved slot when searching memslots (bsc#1172104).\n- KVM: nVMX: Do not reread VMCS-agnostic state when switching VMCS (bsc#1114279).\n- KVM: nVMX: Skip IBPB when switching between vmcs01 and vmcs02 (bsc#1114279).\n- KVM: s390: vsie: Fix delivery of addressing exceptions (git-fixes).\n- KVM: s390: vsie: Fix possible race when shadowing region 3 tables (git-fixes).\n- KVM: s390: vsie: Fix region 1 ASCE sanity shadow address checks (git-fixes).\n- KVM: SVM: Fix potential memory leak in svm_cpu_init() (bsc#1171736).\n- KVM x86: Extend AMD specific guest behavior to Hygon virtual CPUs (bsc#1152489).\n- KVM: x86: Fix APIC page invalidation race (bsc#1174122).\n- kvm: x86: Fix L1TF mitigation for shadow MMU (bsc#1171904).\n- KVM: x86/mmu: Set mmio_value to \u00270\u0027 if reserved #PF can\u0027t be generated (bsc#1171904).\n- KVM: x86: only do L1TF workaround on affected processors (bsc#1171904).\n- l2tp: Allow management of tunnels and session in user namespace (networking-stable-20_04_17).\n- libata: Remove extra scsi_host_put() in ata_scsi_add_hosts() (bsc#1051510).\n- libata: Return correct status in sata_pmp_eh_recover_pm() when ATA_DFLAG_DETACH is set (bsc#1051510).\n- libceph: do not omit recovery_deletes in target_copy() (bsc#1173462).\n- libceph: do not omit recovery_deletes in target_copy() (bsc#1174113).\n- libceph: ignore pool overlay and cache logic on redirects (bsc#1173146).\n- libfs: fix infoleak in simple_attr_read() (bsc#1168881).\n- libnvdimm/bus: Fix wait_nvdimm_bus_probe_idle() ABBA deadlock (bsc#1171753).\n- libnvdimm/bus: Prepare the nd_ioctl() path to be re-entrant (bsc#1171753).\n- libnvdimm/bus: Stop holding nvdimm_bus_list_mutex over __nd_ioctl() (bsc#1171753).\n- libnvdimm: cover up changes in struct nvdimm_bus (bsc#1171753).\n- libnvdimm: cover up nd_pfn_sb changes (bsc#1171759).\n- libnvdimm/dax: Pick the right alignment default when creating dax devices (bsc#1171759).\n- libnvdimm/label: Remove the dpa align check (bsc#1171759).\n- libnvdimm/of_pmem: Provide a unique name for bus provider (bsc#1171739).\n- libnvdimm/pfn_dev: Add a build check to make sure we notice when struct page size change (bsc#1171743).\n- libnvdimm/pfn_dev: Add page size and struct page size to pfn superblock (bsc#1171759).\n- libnvdimm/pfn: Prevent raw mode fallback if pfn-infoblock valid (bsc#1171743).\n- libnvdimm/pmem: Advance namespace seed for specific probe errors (bsc#1171743).\n- libnvdimm/region: Initialize bad block for volatile namespaces (bnc#1151927 5.3.6).\n- libnvdimm/region: Rewrite _probe_success() to _advance_seeds() (bsc#1171743).\n- libnvdimm: Use PAGE_SIZE instead of SZ_4K for align check (bsc#1171759).\n- lib: raid6: fix awk build warnings (git fixes (block drivers)).\n- lib/raid6/test: fix build on distros whose /bin/sh is not bash (git fixes (block drivers)).\n- lib/stackdepot.c: fix global out-of-bounds in stack_slabs (git fixes (block drivers)).\n- livepatch: Apply vmlinux-specific KLP relocations early (bsc#1071995).\n- livepatch: Disallow vmlinux.ko (bsc#1071995).\n- livepatch: Make klp_apply_object_relocs static (bsc#1071995).\n- livepatch: Prevent module-specific KLP rela sections from referencing vmlinux symbols (bsc#1071995).\n- livepatch: Remove .klp.arch (bsc#1071995).\n- locks: print unsigned ino in /proc/locks (bsc#1171951). \n- loop: replace kill_bdev with invalidate_bdev (bsc#1173820).\n- lpfc_debugfs: get rid of pointless access_ok() (bsc#1172687 bsc#1171530).\n- lpfc: Synchronize NVME transport and lpfc driver devloss_tmo (bcs#1173060).\n- mac80211: add ieee80211_is_any_nullfunc() (bsc#1051510).\n- mac80211: add option for setting control flags (bsc#1111666).\n- mac80211_hwsim: Use kstrndup() in place of kasprintf() (bsc#1051510).\n- mac80211: mesh: fix discovery timer re-arming issue / crash (bsc#1051510).\n- mac80211: set IEEE80211_TX_CTRL_PORT_CTRL_PROTO for nl80211 TX (bsc#1111666).\n- macsec: avoid to set wrong mtu (bsc#1051510).\n- macsec: restrict to ethernet devices (networking-stable-20_03_28).\n- macvlan: add cond_resched() during multicast processing (networking-stable-20_03_14).\n- macvlan: fix null dereference in macvlan_device_event() (bsc#1051510).\n- mailbox: imx: Disable the clock on devm_mbox_controller_register() failure (git-fixes).\n- make some Fujitsu systems run (bsc#1141558).\n- md: Avoid namespace collision with bitmap API (git fixes (block drivers)).\n- md: improve handling of bio with REQ_PREFLUSH in md_flush_request() (git-fixes).\n- md/raid0: Fix an error message in raid0_make_request() (git fixes (block drivers)).\n- md/raid10: prevent access of uninitialized resync_pages offset (git-fixes).\n- mdraid: fix read/write bytes accounting (bsc#1172537).\n- md: use memalloc scope APIs in mddev_suspend()/mddev_resume() (bsc#1166985)).\n- md: use memalloc scope APIs in mddev_suspend()/mddev_resume() (git fixes (block drivers)).\n- media: dvb: return -EREMOTEIO on i2c transfer failure (bsc#1051510).\n- media: flexcop-usb: fix endpoint sanity check (git-fixes).\n- media: platform: fcp: Set appropriate DMA parameters (bsc#1051510).\n- media: si2157: Better check for running tuner in init (bsc#1111666).\n- media: ti-vpe: cal: fix disable_irqs to only the intended target (git-fixes).\n- mei: release me_cl object reference (bsc#1051510).\n- mlxsw: core: Do not use WQ_MEM_RECLAIM for mlxsw ordered workqueue (git-fixes).\n- mlxsw: core: Do not use WQ_MEM_RECLAIM for mlxsw workqueue (git-fixes).\n- mlxsw: Fix some IS_ERR() vs NULL bugs (networking-stable-20_04_27).\n- mlxsw: pci: Return error on PCI reset timeout (git-fixes).\n- mlxsw: spectrum_acl_tcam: Position vchunk in a vregion list properly (networking-stable-20_05_12).\n- mlxsw: spectrum: Disallow prio-tagged packets when PVID is removed (git-fixes).\n- mlxsw: spectrum_dpipe: Add missing error path (git-fixes).\n- mlxsw: spectrum_flower: Do not stop at FLOW_ACTION_VLAN_MANGLE (networking-stable-20_04_09).\n- mlxsw: spectrum_mr: Fix list iteration in error path (bsc#1112374).\n- mlxsw: spectrum: Prevent force of 56G (git-fixes).\n- mlxsw: spectrum_router: Refresh nexthop neighbour when it becomes dead (git-fixes).\n- mlxsw: spectrum_router: Remove inappropriate usage of WARN_ON() (git-fixes).\n- mlxsw: spectrum_switchdev: Add MDB entries in prepare phase (git-fixes).\n- mlxsw: spectrum_switchdev: Do not treat static FDB entries as sticky (git-fixes).\n- mmc: atmel-mci: Fix debugfs on 64-bit platforms (git-fixes).\n- mmc: block: Fix request completion in the CQE timeout path (bsc#1111666).\n- mmc: block: Fix use-after-free issue for rpmb (bsc#1111666).\n- mmc: core: Check request type before completing the request (git-fixes).\n- mmc: core: Fix recursive locking issue in CQE recovery path (git-fixes).\n- mmc: cqhci: Avoid false \u0027cqhci: CQE stuck on\u0027 by not open-coding timeout loop (git-fixes).\n- mmc: dw_mmc: Fix debugfs on 64-bit platforms (git-fixes).\n- mmc: fix compilation of user API (bsc#1051510).\n- mmc: meson-gx: make sure the descriptor is stopped on errors (git-fixes).\n- mmc: meson-gx: simplify interrupt handler (git-fixes).\n- mmc: renesas_sdhi: limit block count to 16 bit for old revisions (git-fixes).\n- mmc: sdhci-esdhc-imx: fix the mask for tuning start point (bsc#1051510).\n- mmc: sdhci-msm: Clear tuning done flag while hs400 tuning (bsc#1051510).\n- mmc: sdhci-msm: Set SDHCI_QUIRK_MULTIBLOCK_READ_ACMD12 quirk (bsc#1111666).\n- mmc: sdhci-of-at91: fix memleak on clk_get failure (git-fixes).\n- mmc: sdhci-pci: Fix eMMC driver strength for BYT-based controllers (bsc#1051510).\n- mmc: sdhci-xenon: fix annoying 1.8V regulator warning (bsc#1051510).\n- mmc: sdio: Fix potential NULL pointer error in mmc_sdio_init_card() (bsc#1051510).\n- mmc: tmio: fix access width of Block Count Register (git-fixes).\n- mm/filemap.c: do not initiate writeback if mapping has no dirty pages (bsc#1168884).\n- mm: limit boost_watermark on small zones (git fixes (mm/pgalloc)).\n- mm/memory_hotplug.c: only respect mem= parameter during boot stage (bsc#1065600).\n- mm: replace PF_LESS_THROTTLE with PF_LOCAL_THROTTLE (bsc#1163403).\n- mm: thp: handle page cache THP correctly in PageTransCompoundMap (git fixes (block drivers)).\n- mtd: cfi: fix deadloop in cfi_cmdset_0002.c do_write_buffer (bsc#1051510).\n- mtd: spi-nor: cadence-quadspi: add a delay in write sequence (git-fixes).\n- mtd: spi-nor: enable 4B opcodes for mx66l51235l (git-fixes).\n- mtd: spi-nor: fsl-quadspi: Do not let -EINVAL on the bus (git-fixes).\n- mvpp2: remove misleading comment (git-fixes).\n- mwifiex: avoid -Wstringop-overflow warning (bsc#1051510).\n- mwifiex: Fix memory corruption in dump_station (bsc#1051510).\n- net: bcmgenet: correct per TX/RX ring statistics (networking-stable-20_04_27).\n- net/cxgb4: Check the return from t4_query_params properly (git-fixes).\n- net: dsa: b53: Fix ARL register definitions (networking-stable-20_04_27).\n- net: dsa: b53: Rework ARL bin logic (networking-stable-20_04_27).\n- net: dsa: bcm_sf2: Do not register slave MDIO bus with OF (networking-stable-20_04_09).\n- net: dsa: bcm_sf2: Ensure correct sub-node is parsed (networking-stable-20_04_09).\n- net: dsa: bcm_sf2: Fix overflow checks (git-fixes).\n- net: dsa: Fix duplicate frames flooded by learning (networking-stable-20_03_28).\n- net: dsa: loop: Add module soft dependency (networking-stable-20_05_16).\n- net: dsa: mt7530: fix roaming from DSA user ports (networking-stable-20_05_27).\n- net: dsa: mv88e6xxx: fix lockup on warm boot (networking-stable-20_03_14).\n- net: ena: add intr_moder_rx_interval to struct ena_com_dev and use it (git-fixes).\n- net: ena: add missing ethtool TX timestamping indication (git-fixes).\n- net: ena: avoid memory access violation by validating req_id properly (git-fixes).\n- net: ena: do not wake up tx queue when down (git-fixes).\n- net: ena: ena-com.c: prevent NULL pointer dereference (git-fixes).\n- net: ena: ethtool: use correct value for crc32 hash (git-fixes).\n- net: ena: fix continuous keep-alive resets (git-fixes).\n- net: ena: fix corruption of dev_idx_to_host_tbl (git-fixes).\n- net: ena: fix default tx interrupt moderation interval (git-fixes).\n- net: ena: fix incorrect default RSS key (git-fixes).\n- net: ena: fix incorrectly saving queue numbers when setting RSS indirection table (git-fixes).\n- net: ena: fix issues in setting interrupt moderation params in ethtool (git-fixes).\n- net: ena: fix potential crash when rxfh key is NULL (git-fixes).\n- net: ena: fix retrieval of nonadaptive interrupt moderation intervals (git-fixes).\n- net: ena: fix uses of round_jiffies() (git-fixes).\n- net: ena: make ena rxfh support ETH_RSS_HASH_NO_CHANGE (git-fixes).\n- net: ena: reimplement set/get_coalesce() (git-fixes).\n- net: ena: rss: do not allocate key when not supported (git-fixes).\n- net: ena: rss: fix failure to get indirection table (git-fixes).\n- net: ena: rss: store hash function as values and not bits (git-fixes).\n- net/ethernet: add Google GVE driver (jsc#SLE-10538)\n- net: fec: add phy_reset_after_clk_enable() support (git-fixes).\n- net: fec: validate the new settings in fec_enet_set_coalesce() (networking-stable-20_03_14).\n- net: fib_rules: Correctly set table field when table number exceeds 8 bits (networking-stable-20_03_01).\n- netfilter: connlabels: prefer static lock initialiser (git-fixes).\n- netfilter: conntrack: sctp: use distinct states for new SCTP connections (bsc#1159199).\n- netfilter: ctnetlink: netns exit must wait for callbacks (bsc#1169795).\n- netfilter: not mark a spinlock as __read_mostly (git-fixes).\n- net: fix a potential recursive NETDEV_FEAT_CHANGE (networking-stable-20_05_16).\n- net: fix race condition in __inet_lookup_established() (bsc#1151794).\n- net: fq: add missing attribute validation for orphan mask (networking-stable-20_03_14).\n- net: hns3: fix \u0027tc qdisc del\u0027 failed issue (bsc#1109837).\n- net: inet_csk: Fix so_reuseport bind-address cache in tb-\u003efast* (networking-stable-20_05_27).\n- net: ipip: fix wrong address family in init error path (networking-stable-20_05_27).\n- net, ip_tunnel: fix interface lookup with no key (networking-stable-20_04_02).\n- net: ipv4: devinet: Fix crash when add/del multicast IP with autojoin (networking-stable-20_04_17).\n- net: ipv6: do not consider routes via gateways for anycast address check (networking-stable-20_04_17).\n- net: ipvlan: Fix ipvlan device tso disabled while NETIF_F_IP_CSUM is set (git-fixes).\n- netlink: Use netlink header as base to calculate bad attribute offset (networking-stable-20_03_14).\n- net: macsec: preserve ingress frame ordering (networking-stable-20_05_12).\n- net: macsec: update SCI upon MAC address change (networking-stable-20_03_14).\n- net: memcg: fix lockdep splat in inet_csk_accept() (networking-stable-20_03_14).\n- net: memcg: late association of sock to memcg (networking-stable-20_03_14).\n- net/mlx4_core: drop useless LIST_HEAD (git-fixes).\n- net/mlx4_core: fix a memory leak bug (git-fixes).\n- net/mlx4_core: Fix use of ENOSPC around mlx4_counter_alloc() (networking-stable-20_05_12).\n- net/mlx4_en: avoid indirect call in TX completion (networking-stable-20_04_27).\n- net/mlx5: Add command entry handling completion (networking-stable-20_05_27).\n- net/mlx5: Add new fields to Port Type and Speed register (bsc#1171118).\n- net/mlx5: Add new fields to Port Type and Speed register (bsc#1171118).\n- net/mlx5: Add RoCE RX ICRC encapsulated counter (bsc#1171118).\n- net/mlx5: Avoid panic when setting vport rate (git-fixes).\n- net/mlx5: Continue driver initialization despite debugfs failure (git-fixes).\n- net/mlx5e: ethtool, Fix a typo in WOL function names (git-fixes).\n- net/mlx5e: Fix ethtool self test: link speed (bsc#1171118).\n- net/mlx5e: Fix traffic duplication in ethtool steering (git-fixes).\n- net/mlx5e: Move port speed code from en_ethtool.c to en/port.c (bsc#1171118).\n- net/mlx5e: Remove unnecessary clear_bit()s (git-fixes).\n- net/mlx5e: Update netdev txq on completions during closure (networking-stable-20_05_27).\n- net/mlx5: Expose link speed directly (bsc#1171118).\n- net/mlx5: Expose link speed directly (bsc#1171118).\n- net/mlx5: Expose port speed when possible (bsc#1171118).\n- net/mlx5: Expose port speed when possible (bsc#1171118).\n- net/mlx5: Fix command entry leak in Internal Error State (networking-stable-20_05_12).\n- net/mlx5: Fix failing fw tracer allocation on s390 (bsc#1103990 ).\n- net/mlx5: Fix forced completion access non initialized command entry (networking-stable-20_05_12).\n- net: mvmdio: allow up to four clocks to be specified for orion-mdio (git-fixes).\n- net: mvneta: Fix the case where the last poll did not process all rx (networking-stable-20_03_28).\n- net: mvpp2: prs: Do not override the sign bit in SRAM parser shift (git-fixes).\n- net: netrom: Fix potential nr_neigh refcnt leak in nr_add_node (networking-stable-20_04_27).\n- net/packet: tpacket_rcv: do not increment ring index on drop (networking-stable-20_03_14).\n- net: phy: fix aneg restart in phy_ethtool_set_eee (networking-stable-20_05_16).\n- net: phy: micrel: kszphy_resume(): add delay after genphy_resume() before accessing PHY registers (bsc#1051510).\n- net: phy: restore mdio regs in the iproc mdio driver (networking-stable-20_03_01).\n- netprio_cgroup: Fix unlimited memory leak of v2 cgroups (networking-stable-20_05_16).\n- net: qede: stop adding events on an already destroyed workqueue (git-fixes).\n- net: qed: fix excessive QM ILT lines consumption (git-fixes).\n- net: qed: fix NVMe login fails over VFs (git-fixes).\n- net: qmi_wwan: add support for ASKEY WWHC050 (networking-stable-20_03_28).\n- net: qrtr: Fix passing invalid reference to qrtr_local_enqueue() (networking-stable-20_05_27).\n- net: revert default NAPI poll timeout to 2 jiffies (networking-stable-20_04_17).\n- net: revert \u0027net: get rid of an signed integer overflow in ip_idents_reserve()\u0027 (networking-stable-20_05_27).\n- net_sched: cls_route: remove the right filter from hashtable (networking-stable-20_03_28).\n- net sched: fix reporting the first-time use timestamp (networking-stable-20_05_27).\n- net_sched: sch_skbprio: add message validation to skbprio_change() (bsc#1109837).\n- net/smc: add fallback check to connect() (git-fixes).\n- net/smc: fix refcount non-blocking connect() -part 2 (git-fixes).\n- net: stricter validation of untrusted gso packets (networking-stable-20_05_12).\n- net/tls: Fix sk_psock refcnt leak in bpf_exec_tx_verdict() (networking-stable-20_05_12).\n- net/tls: Fix sk_psock refcnt leak when in tls_data_ready() (networking-stable-20_05_12).\n- net: usb: qmi_wwan: add support for DW5816e (networking-stable-20_05_12).\n- net: vmxnet3: fix possible buffer overflow caused by bad DMA value in vmxnet3_get_rss() (bsc#1172484).\n- net/x25: Fix x25_neigh refcnt leak when receiving frame (networking-stable-20_04_27).\n- nfc: add missing attribute validation for SE API (networking-stable-20_03_14).\n- nfc: add missing attribute validation for vendor subcommand (networking-stable-20_03_14).\n- nfc: pn544: Fix occasional HW initialization failure (networking-stable-20_03_01).\n- nfc: st21nfca: add missed kfree_skb() in an error path (bsc#1051510).\n- nfp: abm: fix a memory leak bug (bsc#1109837).\n- nfp: bpf: fix code-gen bug on BPF_ALU | BPF_XOR | BPF_K (git-fixes).\n- nfsd4: fix up replay_matches_cache() (git-fixes).\n- nfsd: Ensure CLONE persists data and metadata changes to the target file (git-fixes).\n- nfsd: fix delay timer on 32-bit architectures (git-fixes).\n- nfsd: fix jiffies/time_t mixup in LRU list (git-fixes).\n- nfs: Directory page cache pages need to be locked when read (git-fixes).\n- nfsd: memory corruption in nfsd4_lock() (git-fixes).\n- nfs: Do not call generic_error_remove_page() while holding locks (bsc#1170457).\n- NFS: Fix an RCU lock leak in nfs4_refresh_delegation_stateid() (bsc#1170592).\n- nfs: Fix memory leaks and corruption in readdir (git-fixes).\n- nfs: Fix O_DIRECT accounting of number of bytes read/written (git-fixes).\n- nfs: Fix potential posix_acl refcnt leak in nfs3_set_acl (git-fixes).\n- nfs: fix racey wait in nfs_set_open_stateid_locked (bsc#1170592).\n- nfs/flexfiles: Use the correct TCP timeout for flexfiles I/O (git-fixes).\n- nfs/pnfs: Fix pnfs_generic_prepare_to_resend_writes() (git-fixes).\n- nfs: Revalidate the file size on a fatal write error (git-fixes).\n- NFSv4.0: nfs4_do_fsinfo() should not do implicit lease renewals (git-fixes).\n- NFSv4: Do not allow a cached open with a revoked delegation (git-fixes).\n- NFSv4: Fix leak of clp-\u003ecl_acceptor string (git-fixes).\n- NFSv4/pnfs: Return valid stateids in nfs_layout_find_inode_by_stateid() (git-fixes).\n- NFSv4: Retry CLOSE and DELEGRETURN on NFS4ERR_OLD_STATEID (bsc#1170592).\n- NFSv4: try lease recovery on NFS4ERR_EXPIRED (git-fixes).\n- NFSv4.x: Drop the slot if nfs4_delegreturn_prepare waits for layoutreturn (git-fixes).\n- nilfs2: fix null pointer dereference at nilfs_segctor_do_construct() (bsc#1173857).\n- nl80211: fix NL80211_ATTR_CHANNEL_WIDTH attribute type (bsc#1111666).\n- nl802154: add missing attribute validation for dev_type (networking-stable-20_03_14).\n- nl802154: add missing attribute validation (networking-stable-20_03_14).\n- nvdimm: Avoid race between probe and reading device attributes (bsc#1170442).\n- nvme: check for NVME_CTRL_LIVE in nvme_report_ns_ids() (bcs#1171558 bsc#1159058).\n- nvme: do not update multipath disk information if the controller is down (bcs#1171558 bsc#1159058).\n- nvme: fail cancelled commands with NVME_SC_HOST_PATH_ERROR (bsc#1158983 bsc#1172538).\n- nvme-fc: Fail transport errors with NVME_SC_HOST_PATH (bsc#1158983 bsc#1172538).\n- nvme-fc: print proper nvme-fc devloss_tmo value (bsc#1172391).\n- nvme-tcp: fail command with NVME_SC_HOST_PATH_ERROR send failed (bsc#1158983 bsc#1172538).\n- objtool: Add is_static_jump() helper (bsc#1169514).\n- objtool: Add relocation check for alternative sections (bsc#1169514).\n- objtool: Clean instruction state before each function validation (bsc#1169514).\n- objtool: Fix stack offset tracking for indirect CFAs (bsc#1169514).\n- objtool: Fix switch table detection in .text.unlikely (bsc#1169514).\n- objtool: Ignore empty alternatives (bsc#1169514).\n- objtool: Make BP scratch register warning more robust (bsc#1169514).\n- ocfs2: no need try to truncate file beyond i_size (bsc#1171841).\n- OMAP: DSS2: remove non-zero check on variable r (bsc#1114279)\n- overflow: Fix -Wtype-limits compilation warnings (git fixes).\n- overflow.h: Add arithmetic shift helper (git fixes).\n- p54usb: add AirVasT USB stick device-id (bsc#1051510).\n- padata: ensure the reorder timer callback runs on the correct CPU (git-fixes).\n- padata: Remove broken queue flushing (git-fixes).\n- padata: reorder work kABI fixup (git-fixes).\n- Partially revert \u0027kfifo: fix kfifo_alloc() and kfifo_init()\u0027 (git fixes (block drivers)).\n- partitions/efi: Fix partition name parsing in GUID partition entry (bsc#1168763).\n- PCI: Allow pci_resize_resource() for devices on root bus (bsc#1051510).\n- PCI: Fix pci_register_host_bridge() device_register() error handling (bsc#1051510).\n- PCI: Generalize multi-function power dependency device links (bsc#1111666).\n- PCI: hv: Add support for protocol 1.3 and support PCI_BUS_RELATIONS2 (bsc#1172201, bsc#1172202).\n- PCI: hv: Decouple the func definition in hv_dr_state from VSP message (bsc#1172201, bsc#1172202).\n- PCI: pciehp: Fix indefinite wait on sysfs requests (git-fixes).\n- PCI: pciehp: Fix MSI interrupt race (bsc#1159037).\n- PCI: pciehp: Support interrupts sent from D3hot (git-fixes).\n- PCI/PM: Call .bridge_d3() hook only if non-NULL (git-fixes).\n- PCI: Program MPS for RCiEP devices (bsc#1051510).\n- PCI/PTM: Inherit Switch Downstream Port PTM settings from Upstream Port (bsc#1051510).\n- PCI: sanity test on PCI vendor to be sure we do not touch everything (bsc#1141558).\n- pcm_native: result of put_user() needs to be checked (bsc#1111666).\n- perf: Allocate context task_ctx_data for child event (git-fixes).\n- perf: Allocate context task_ctx_data for child event (git-fixes).\n- perf/cgroup: Fix perf cgroup hierarchy support (git-fixes).\n- perf/cgroup: Fix perf cgroup hierarchy support (git-fixes).\n- perf: Copy parent\u0027s address filter offsets on clone (git-fixes).\n- perf: Copy parent\u0027s address filter offsets on clone (git-fixes).\n- perf/core: Add sanity check to deal with pinned event failure (git-fixes).\n- perf/core: Add sanity check to deal with pinned event failure (git-fixes).\n- perf/core: Avoid freeing static PMU contexts when PMU is unregistered (git-fixes).\n- perf/core: Avoid freeing static PMU contexts when PMU is unregistered (git-fixes).\n- perf/core: Correct event creation with PERF_FORMAT_GROUP (git-fixes).\n- perf/core: Correct event creation with PERF_FORMAT_GROUP (git-fixes).\n- perf/core: Do not WARN() for impossible ring-buffer sizes (git-fixes).\n- perf/core: Do not WARN() for impossible ring-buffer sizes (git-fixes).\n- perf/core: Fix bad use of igrab() (git fixes (dependent patch)).\n- perf/core: Fix crash when using HW tracing kernel filters (git-fixes).\n- perf/core: Fix ctx_event_type in ctx_resched() (git-fixes).\n- perf/core: Fix ctx_event_type in ctx_resched() (git-fixes).\n- perf/core: Fix error handling in perf_event_alloc() (git-fixes).\n- perf/core: Fix error handling in perf_event_alloc() (git-fixes).\n- perf/core: Fix exclusive events\u0027 grouping (git-fixes).\n- perf/core: Fix exclusive events\u0027 grouping (git-fixes).\n- perf/core: Fix group scheduling with mixed hw and sw events (git-fixes).\n- perf/core: Fix group scheduling with mixed hw and sw events (git-fixes).\n- perf/core: Fix impossible ring-buffer sizes warning (git-fixes).\n- perf/core: Fix impossible ring-buffer sizes warning (git-fixes).\n- perf/core: Fix locking for children siblings group read (git-fixes).\n- perf/core: Fix locking for children siblings group read (git-fixes).\n- perf/core: Fix lock inversion between perf,trace,cpuhp (git-fixes (dependent patch for 18736eef1213)).\n- perf/core: Fix perf_event_read_value() locking (git-fixes).\n- perf/core: Fix perf_event_read_value() locking (git-fixes).\n- perf/core: Fix perf_pmu_unregister() locking (git-fixes).\n- perf/core: Fix perf_pmu_unregister() locking (git-fixes).\n- perf/core: Fix __perf_read_group_add() locking (git-fixes (dependent patch)).\n- perf/core: Fix perf_sample_regs_user() mm check (git-fixes).\n- perf/core: Fix perf_sample_regs_user() mm check (git-fixes).\n- perf/core: Fix possible Spectre-v1 indexing for -\u003eaux_pages (git-fixes).\n- perf/core: Fix possible Spectre-v1 indexing for -\u003eaux_pages (git-fixes).\n- perf/core: Fix race between close() and fork() (git-fixes).\n- perf/core: Fix race between close() and fork() (git-fixes).\n- perf/core: Fix the address filtering fix (git-fixes).\n- perf/core: Fix the address filtering fix (git-fixes).\n- perf/core: Fix use-after-free in uprobe_perf_close() (git-fixes).\n- perf/core: Fix use-after-free in uprobe_perf_close() (git-fixes).\n- perf/core: Force USER_DS when recording user stack data (git-fixes).\n- perf/core: Force USER_DS when recording user stack data (git-fixes).\n- perf/core: Restore mmap record type correctly (git-fixes).\n- perf/core: Restore mmap record type correctly (git-fixes).\n- perf: Fix header.size for namespace events (git-fixes).\n- perf: Fix header.size for namespace events (git-fixes).\n- perf/ioctl: Add check for the sample_period value (git-fixes).\n- perf/ioctl: Add check for the sample_period value (git-fixes).\n- perf, pt, coresight: Fix address filters for vmas with non-zero offset (git-fixes).\n- perf, pt, coresight: Fix address filters for vmas with non-zero offset (git-fixes).\n- perf: Return proper values for user stack errors (git-fixes).\n- perf: Return proper values for user stack errors (git-fixes).\n- perf/x86/amd: Add support for Large Increment per Cycle Events (jsc#SLE-11831).\n- perf/x86/amd: Constrain Large Increment per Cycle events (git-fixes).\n- perf/x86/amd: Constrain Large Increment per Cycle events (jsc#SLE-11831).\n- perf/x86/amd/ibs: Fix reading of the IBS OpData register and thus precise RIP validity (git-fixes).\n- perf/x86/amd/ibs: Fix sample bias for dispatched micro-ops (git-fixes).\n- perf/x86/amd/ibs: Handle erratum #420 only on the affected CPU family (10h) (git-fixes).\n- perf/x86/amd/iommu: Make the \u0027amd_iommu_attr_groups\u0027 symbol static (git-fixes).\n- perf/x86/amd/uncore: Do not set \u0027ThreadMask\u0027 and \u0027SliceMask\u0027 for non-L3 PMCs (git-fixes stable).\n- perf/x86/amd/uncore: Set the thread mask for F17h L3 PMCs (git-fixes).\n- perf/x86/amd/uncore: Set ThreadMask and SliceMask for L3 Cache perf events (git-fixes stable).\n- perf/x86: Enable free running PEBS for REGS_USER/INTR (git-fixes).\n- perf/x86: Fix incorrect PEBS_REGS (git-fixes).\n- perf/x86/intel: Add generic branch tracing check to intel_pmu_has_bts() (git-fixes).\n- perf/x86/intel: Add proper condition to run sched_task callbacks (git-fixes).\n- perf/x86/intel/bts: Fix the use of page_private() (git-fixes).\n- perf/x86/intel: Fix PT PMI handling (git-fixes).\n- perf/x86/intel: Move branch tracing setup to the Intel-specific source file (git-fixes).\n- perf/x86/intel/uncore: Add Node ID mask (git-fixes).\n- perf/x86/intel/uncore: Fix PCI BDF address of M3UPI on SKX (git-fixes).\n- perf/x86/intel/uncore: Handle invalid event coding for free-running counter (git-fixes).\n- perf/x86/pt, coresight: Clean up address filter structure (git fixes (dependent patch)).\n- perf/x86/uncore: Fix event group support (git-fixes).\n- pid: Improve the comment about waiting in zap_pid_ns_processes (git fixes)).\n- pinctrl: baytrail: Enable pin configuration setting for GPIO chip (git-fixes).\n- pinctrl: cherryview: Add missing spinlock usage in chv_gpio_irq_handler (git-fixes).\n- pinctrl: freescale: imx: Fix an error handling path in \u0027imx_pinctrl_probe()\u0027 (bsc#1051510).\n- pinctrl: imxl: Fix an error handling path in \u0027imx1_pinctrl_core_probe()\u0027 (bsc#1051510).\n- pinctrl: samsung: Save/restore eint_mask over suspend for EINT_TYPE GPIOs (bsc#1051510).\n- pinctrl: sunrisepoint: Fix PAD lock register offset for SPT-H (git-fixes).\n- platform/x86: asus-nb-wmi: Do not load on Asus T100TA and T200TA (bsc#1051510).\n- platform/x86: dell-laptop: do not register micmute LED if there is no token (bsc#1111666).\n- platform/x86: hp-wmi: Convert simple_strtoul() to kstrtou32() (bsc#1111666).\n- PM / Domains: Allow genpd users to specify default active wakeup behavior (git-fixes).\n- pNFS: Ensure we do clear the return-on-close layout stateid on fatal errors (git-fixes).\n- pnp: Use list_for_each_entry() instead of open coding (git fixes).\n- powerpc/64s: Do not let DT CPU features set FSCR_DSCR (bsc#1065729).\n- powerpc/64s: Save FSCR to init_task.thread.fscr after feature init (bsc#1065729).\n- powerpc: Add attributes for setjmp/longjmp (bsc#1065729).\n- powerpc/book3s64: Export has_transparent_hugepage() related functions (bsc#1171759).\n- powerpc/book3s64/pkeys: Fix pkey_access_permitted() for execute disable pkey (bsc#1065729).\n- powerpc/fadump: fix race between pstore write and fadump crash trigger (bsc#1168959 ltc#185010).\n- powerpc/hash64/devmap: Use H_PAGE_THP_HUGE when setting up huge devmap PTE entries (bsc#1065729).\n- powerpc/pci/of: Parse unassigned resources (bsc#1065729).\n- powerpc/setup_64: Set cache-line-size based on cache-block-size (bsc#1065729).\n- powerpc/sstep: Fix DS operand in ld encoding to appropriate value (bsc#1065729).\n- powerpc/xive: Clear the page tables for the ESB IO mapping (bsc#1085030).\n- powerpc/xmon: Reset RCU and soft lockup watchdogs (bsc#1065729).\n- power: supply: bq24257_charger: Replace depends on REGMAP_I2C with select (bsc#1051510).\n- power: supply: lp8788: Fix an error handling path in \u0027lp8788_charger_probe()\u0027 (bsc#1051510).\n- power: supply: smb347-charger: IRQSTAT_D is volatile (bsc#1051510).\n- power: vexpress: add suppress_bind_attrs to true (bsc#1111666).\n- pppoe: only process PADT targeted at local interfaces (networking-stable-20_05_16).\n- pwm: bcm2835: Dynamically allocate base (bsc#1051510).\n- pwm: meson: Fix confusing indentation (bsc#1051510).\n- pwm: pca9685: Fix PWM/GPIO inter-operation (bsc#1051510).\n- pwm: rcar: Fix late Runtime PM enablement (bsc#1051510).\n- pwm: renesas-tpu: Fix late Runtime PM enablement (bsc#1051510).\n- qede: Fix race between rdma destroy workqueue and link change event (networking-stable-20_03_01).\n- qed: reduce maximum stack frame size (git-fixes).\n- qlcnic: fix missing release in qlcnic_83xx_interrupt_test (git-fixes).\n- r8152: check disconnect status after long sleep (networking-stable-20_03_14).\n- r8152: support additional Microsoft Surface Ethernet Adapter variant (networking-stable-20_05_27).\n- raid5: remove gfp flags from scribble_alloc() (bsc#1166985).\n- raid5: remove gfp flags from scribble_alloc() (git fixes (block drivers)).\n- raid6/ppc: Fix build for clang (git fixes (block drivers)).\n- random: always use batched entropy for get_random_u{32,64} (bsc#1164871).\n- rcu: locking and unlocking need to always be at least barriers (git fixes (block drivers)).\n- RDMA/efa: Fix setting of wrong bit in get/set_feature commands (bsc#1111666)\n- RDMA/efa: Set maximum pkeys device attribute (bsc#1111666)\n- RDMA/efa: Support remote read access in MR registration (bsc#1111666)\n- RDMA/efa: Unified getters/setters for device structs bitmask access (bsc#1111666)\n- RDMA/ipoib: Fix use of sizeof() (bsc#1168503).\n- RDMA/netdev: Fix netlink support in IPoIB (bsc#1168503).\n- RDMA/netdev: Hoist alloc_netdev_mqs out of the driver (bsc#1168503).\n- RDMA/netdev: Use priv_destructor for netdev cleanup (bsc#1168503).\n- regmap: debugfs: Do not sleep while atomic for fast_io regmaps (bsc#1111666).\n- resolve KABI warning for perf-pt-coresight (git-fixes).\n- rpm/kernel-docs.spec.in: Require python-packaging for build.\n- rtlwifi: Fix a double free in _rtl_usb_tx_urb_setup() (bsc#1051510).\n- s390/bpf: Maintain 8-byte stack alignment (bsc#1169194).\n- s390/cio: avoid duplicated \u0027ADD\u0027 uevents (git-fixes).\n- s390/cio: generate delayed uevent for vfio-ccw subchannels (git-fixes).\n- s390/cpuinfo: fix wrong output when CPU0 is offline (git-fixes).\n- s390/cpum_cf: Add new extended counters for IBM z15 (bsc#1169762 LTC#185291).\n- s390/diag: fix display of diagnose call statistics (git-fixes).\n- s390: fix syscall_get_error for compat processes (git-fixes).\n- s390/ftrace: fix potential crashes when switching tracers (git-fixes).\n- s390/gmap: return proper error code on ksm unsharing (git-fixes).\n- s390/ism: fix error return code in ism_probe() (git-fixes).\n- s390/ism: fix error return code in ism_probe() (git-fixes).\n- s390/pci: do not set affinity for floating irqs (git-fixes).\n- s390/pci: Fix possible deadlock in recover_store() (bsc#1165183 LTC#184103).\n- s390/pci: Recover handle in clp_set_pci_fn() (bsc#1165183 LTC#184103).\n- s390/qdio: consistently restore the IRQ handler (git-fixes).\n- s390/qdio: lock device while installing IRQ handler (git-fixes).\n- s390/qdio: put thinint indicator after early error (git-fixes).\n- s390/qdio: tear down thinint indicator after early error (git-fixes).\n- s390/qeth: cancel RX reclaim work earlier (git-fixes).\n- s390/qeth: do not return -ENOTSUPP to userspace (git-fixes).\n- s390/qeth: do not warn for napi with 0 budget (git-fixes).\n- s390/qeth: fix error handling for isolation mode cmds (git-fixes).\n- s390/qeth: fix off-by-one in RX copybreak check (git-fixes).\n- s390/qeth: fix promiscuous mode after reset (git-fixes).\n- s390/qeth: fix qdio teardown after early init error (git-fixes).\n- s390/qeth: handle error due to unsupported transport mode (git-fixes).\n- s390/qeth: handle error when backing RX buffer (git-fixes).\n- s390/qeth: lock the card while changing its hsuid (git-fixes).\n- s390/qeth: support net namespaces for L3 devices (git-fixes).\n- s390/time: Fix clk type in get_tod_clock (git-fixes).\n- sch_choke: avoid potential panic in choke_reset() (networking-stable-20_05_12).\n- sch_sfq: validate silly quantum values (networking-stable-20_05_12).\n- scripts/decodecode: fix trapping instruction formatting (bsc#1065729).\n- scripts/dtc: Remove redundant YYLOC global declaration (bsc#1160388).\n- scsi: aacraid: fix a signedness bug (bsc#1174296).\n- scsi: bnx2i: fix potential use after free (bsc#1171600).\n- scsi: core: avoid repetitive logging of device offline messages (bsc#1145929).\n- scsi: core: Handle drivers which set sg_tablesize to zero (bsc#1171601) This commit also required: \u003e scsi: core: avoid preallocating big SGL for data\n- scsi: core: kABI fix offline_already (bsc#1145929).\n- scsi: core: save/restore command resid for error handling (bsc#1171602).\n- scsi: core: scsi_trace: Use get_unaligned_be*() (bsc#1171604).\n- scsi: core: try to get module before removing device (bsc#1171605).\n- scsi: csiostor: Adjust indentation in csio_device_reset (bsc#1171606).\n- scsi: csiostor: Do not enable IRQs too early (bsc#1171607).\n- scsi: esas2r: unlock on error in esas2r_nvram_read_direct() (bsc#1171608).\n- scsi: fnic: fix invalid stack access (bsc#1171609).\n- scsi: fnic: fix msix interrupt allocation (bsc#1171610).\n- scsi: hisi_sas: fix calls to dma_set_mask_and_coherent() (bsc#1174296).\n- scsi: ibmvscsi: Do not send host info in adapter info MAD after LPM (bsc#1172759 ltc#184814).\n- scsi: ibmvscsi: Fix WARN_ON during event pool release (bsc#1170791 ltc#185128).\n- scsi: iscsi: Avoid potential deadlock in iscsi_if_rx func (bsc#1171611).\n- scsi: iscsi: Fix a potential deadlock in the timeout handler (bsc#1171612).\n- scsi: iscsi: qla4xxx: fix double free in probe (bsc#1171613).\n- scsi: lpfc: Add an internal trace log buffer (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Add blk_io_poll support for latency improvment (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Add support to display if adapter dumps are available (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Allow applications to issue Common Set Features mailbox command (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Avoid another null dereference in lpfc_sli4_hba_unset() (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Change default queue allocation for reduced memory consumption (bsc#1164780).\n- scsi: lpfc: fix: Coverity: lpfc_cmpl_els_rsp(): Null pointer dereferences (bsc#1171614).\n- scsi: lpfc: Fix crash in target side cable pulls hitting WAIT_FOR_UNREG (bsc#1171615).\n- scsi: lpfc: Fix inconsistent indenting (bsc#1158983).\n- scsi: lpfc: Fix interrupt assignments when multiple vectors are supported on same CPU (bsc#1158983).\n- scsi: lpfc: Fix kdump hang on PPC (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix language in 0373 message to reflect non-error message (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix less-than-zero comparison of unsigned value (bsc#1158983).\n- scsi: lpfc: Fix lpfc_nodelist leak when processing unsolicited event (bsc#1164780).\n- scsi: lpfc: Fix MDS Diagnostic Enablement definition (bsc#1164780).\n- scsi: lpfc: Fix missing MDS functionality (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix negation of else clause in lpfc_prep_node_fc4type (bsc#1164780).\n- scsi: lpfc: Fix noderef and address space warnings (bsc#1164780).\n- scsi: lpfc: Fix NVMe rport deregister and registration during ADISC (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix oops due to overrun when reading SLI3 data (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix shost refcount mismatch when deleting vport (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix stack trace seen while setting rrq active (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix unused assignment in lpfc_sli4_bsg_link_diag_test (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Maintain atomic consistency of queue_claimed flag (bsc#1164780).\n- scsi: lpfc: remove duplicate unloading checks (bsc#1164780).\n- scsi: lpfc: Remove re-binding of nvme rport during registration (bsc#1164780).\n- scsi: lpfc: Remove redundant initialization to variable rc (bsc#1164780).\n- scsi: lpfc: Remove unnecessary lockdep_assert_held calls (bsc#1164780).\n- scsi: lpfc: Update lpfc version to 12.8.0.1 (bsc#1164780).\n- scsi: lpfc: Update lpfc version to 12.8.0.2 (bsc#1158983).\n- scsi: megaraid_sas: Do not initiate OCR if controller is not in ready state (bsc#1171616).\n- scsi: megaraid_sas: Fix a compilation warning (bsc#1174296).\n- scsi: mpt3sas: Fix double free in attach error handling (bsc#1174296).\n- scsi: qedf: Add port_id getter (bsc#1150660).\n- scsi: qla2xxx: add ring buffer for tracing debug logs (bsc#1157169).\n- scsi: qla2xxx: check UNLOADING before posting async work (bsc#1157169).\n- scsi: qla2xxx: Delete all sessions before unregister local nvme port (bsc#1157169).\n- scsi: qla2xxx: Do not log message when reading port speed via sysfs (bsc#1157169).\n- scsi: qla2xxx: Fix a condition in qla2x00_find_all_fabric_devs() (bsc#1174296).\n- scsi: qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV (bsc#1157169).\n- scsi: qla2xxx: Fix regression warnings (bsc#1157169).\n- scsi: qla2xxx: Remove non functional code (bsc#1157169).\n- scsi: qla2xxx: Set NVMe status code for failed NVMe FCP request (bsc#1158983).\n- scsi: qla2xxx: set UNLOADING before waiting for session deletion (bsc#1157169).\n- scsi: qla4xxx: Adjust indentation in qla4xxx_mem_free (bsc#1171617).\n- scsi: qla4xxx: fix double free bug (bsc#1171618).\n- scsi: sd: Clear sdkp-\u003eprotection_type if disk is reformatted without PI (bsc#1171619).\n- scsi: sg: add sg_remove_request in sg_common_write (bsc#1171620).\n- scsi: tracing: Fix handling of TRANSFER LENGTH == 0 for READ(6) and WRITE(6) (bsc#1171621).\n- scsi: ufs: change msleep to usleep_range (bsc#1171622).\n- scsi: ufs: Clean up ufshcd_scale_clks() and clock scaling error out path (bsc#1171623).\n- scsi: ufs: Fix ufshcd_hold() caused scheduling while atomic (bsc#1171624).\n- scsi: ufs: Fix ufshcd_probe_hba() reture value in case ufshcd_scsi_add_wlus() fails (bsc#1171625).\n- scsi: ufs: Recheck bkops level if bkops is disabled (bsc#1171626).\n- scsi: zfcp: fix missing erp_lock in port recovery trigger for point-to-point (git-fixes).\n- sctp: Do not add the shutdown timer if its already been added (networking-stable-20_05_27).\n- sctp: fix possibly using a bad saddr with a given dst (networking-stable-20_04_02).\n- sctp: fix refcount bug in sctp_wfree (networking-stable-20_04_02).\n- sctp: move the format error check out of __sctp_sf_do_9_1_abort (networking-stable-20_03_01).\n- sctp: Start shutdown on association restart if in SHUTDOWN-SENT state and socket is closed (networking-stable-20_05_27).\n- selftests/powerpc: Fix build errors in powerpc ptrace selftests (boo#1124278).\n- Separate one more kABI fixup from the functional change:\n- seq_file: fix problem when seeking mid-record (bsc#1170125).\n- serial: uartps: Move the spinlock after the read of the tx empty (git-fixes).\n- sfc: detach from cb_page in efx_copy_channel() (networking-stable-20_03_14).\n- signal/pid_namespace: Fix reboot_pid_ns to use send_sig not force_sig (bsc#1172185).\n- slcan: not call free_netdev before rtnl_unlock in slcan_open (networking-stable-20_03_28).\n- slip: make slhc_compress() more robust against malicious packets (networking-stable-20_03_14).\n- smb3: Add new compression flags (bsc#1144333).\n- smb3: change noisy error message to FYI (bsc#1144333).\n- smb3: enable swap on SMB3 mounts (bsc#1144333).\n- smb3: Minor cleanup of protocol definitions (bsc#1144333).\n- smb3: remove overly noisy debug line in signing errors (bsc#1144333).\n- smb3: smbdirect support can be configured by default (bsc#1144333).\n- smb3: use SMB2_SIGNATURE_SIZE define (bsc#1144333).\n- snb3: Additional compression structures (bsc#1144333).\n- spi: bcm2835: Fix 3-wire mode if DMA is enabled (git-fixes).\n- spi: bcm63xx-hsspi: Really keep pll clk enabled (bsc#1051510).\n- spi: bcm-qspi: when tx/rx buffer is NULL set to 0 (bsc#1051510).\n- spi: dw: Add SPI Rx-done wait method to DMA-based transfer (bsc#1051510).\n- spi: dw: Add SPI Tx-done wait method to DMA-based transfer (bsc#1051510).\n- spi: dw: use \u0027smp_mb()\u0027 to avoid sending spi data error (bsc#1051510).\n- spi: dw: Zero DMA Tx and Rx configurations on stack (bsc#1051510).\n- spi: fsl: do not map irq during probe (git-fixes).\n- spi: fsl: use platform_get_irq() instead of of_irq_to_resource() (git-fixes).\n- spi: pxa2xx: Add CS control clock quirk (bsc#1051510).\n- spi: pxa2xx: Apply CS clk quirk to BXT (bsc#1111666).\n- spi: qup: call spi_qup_pm_resume_runtime before suspending (bsc#1051510).\n- spi: spi-fsl-dspi: Replace interruptible wait queue with a simple completion (git-fixes).\n- spi: spi-mem: Fix Dual/Quad modes on Octal-capable devices (bsc#1111666).\n- spi: spi-s3c64xx: Fix system resume support (git-fixes).\n- spi: spi-sun6i: sun6i_spi_transfer_one(): fix setting of clock rate (bsc#1111666).\n- spi/zynqmp: remove entry that causes a cs glitch (bsc#1051510).\n- staging: comedi: dt2815: fix writing hi byte of analog output (bsc#1051510).\n- staging: comedi: Fix comedi_device refcnt leak in comedi_open (bsc#1051510).\n- staging: comedi: verify array index is correct before using it (bsc#1111666).\n- staging: iio: ad2s1210: Fix SPI reading (bsc#1051510).\n- staging: rtl8712: Fix IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK (bsc#1051510).\n- staging: sm750fb: add missing case while setting FB_VISUAL (bsc#1051510).\n- staging: vt6656: Do not set RCR_MULTICAST or RCR_BROADCAST by default (git-fixes).\n- staging: vt6656: Fix drivers TBTT timing counter (git-fixes).\n- staging: vt6656: Fix pairwise key entry save (git-fixes).\n- SUNRPC: defer slow parts of rpc_free_client() to a workqueue (bsc#1168202).\n- SUNRPC: expiry_time should be seconds not timeval (git-fixes).\n- SUNRPC: Fix a potential buffer overflow in \u0027svc_print_xprts()\u0027 (git-fixes).\n- SUNRPC: The TCP back channel mustn\u0027t disappear while requests are outstanding (bsc#1152624).\n- supported.conf: Add br_netfilter to base (bsc#1169020).\n- supported.conf: support w1 core and thermometer support\n- svcrdma: Fix double svc_rdma_send_ctxt_put() in an error path (bsc#1103992).\n- svcrdma: Fix leak of transport addresses (git-fixes).\n- svcrdma: Fix trace point use-after-free race (bsc#1103992 ).\n- taskstats: fix data-race (bsc#1172188).\n- tcp: cache line align MAX_TCP_HEADER (networking-stable-20_04_27).\n- tcp: repair: fix TCP_QUEUE_SEQ implementation (networking-stable-20_03_28).\n- team: add missing attribute validation for array index (networking-stable-20_03_14).\n- team: add missing attribute validation for port ifindex (networking-stable-20_03_14).\n- team: fix hang in team_mode_get() (networking-stable-20_04_27).\n- tg3: driver sleeps indefinitely when EEH errors exceed eeh_max_freezes (bsc#1173284).\n- timers: Add a function to start/reduce a timer (networking-stable-20_05_27).\n- tools lib traceevent: Remove unneeded qsort and uses memmove instead (git-fixes).\n- tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send() (bsc#1065729).\n- tpm_tis: Remove the HID IFX0102 (bsc#1111666).\n- tpm/tpm_tis: Free IRQ if probing fails (bsc#1082555).\n- tpm/tpm_tis: Free IRQ if probing fails (git-fixes).\n- tracing: Add a vmalloc_sync_mappings() for safe measure (git-fixes).\n- tracing: Disable trace_printk() on post poned tests (git-fixes).\n- tracing: Fix event trigger to accept redundant spaces (git-fixes).\n- tracing: Fix the race between registering \u0027snapshot\u0027 event trigger and triggering \u0027snapshot\u0027 operation (git-fixes).\n- tty: n_gsm: Fix bogus i++ in gsm_data_kick (bsc#1051510).\n- tty: n_gsm: Fix SOF skipping (bsc#1051510).\n- tty: n_gsm: Fix waking up upper tty layer when room available (bsc#1051510).\n- tty: rocket, avoid OOB access (git-fixes).\n- tun: Do not put_page() for all negative return values from XDP program (bsc#1109837).\n- tunnel: Propagate ECT(1) when decapsulating as recommended by RFC6040 (networking-stable-20_05_12).\n- UAS: fix deadlock in error handling and PM flushing work (git-fixes).\n- UAS: no use logging any details in case of ENODEV (git-fixes).\n- ubifs: remove broken lazytime support (bsc#1173826).\n- Update config files: Build w1 bus on arm64 (jsc#SLE-11048)\n- USB: Add USB_QUIRK_DELAY_CTRL_MSG and USB_QUIRK_DELAY_INIT for Corsair K70 RGB RAPIDFIRE (git-fixes).\n- usb: add USB_QUIRK_DELAY_INIT for Logitech C922 (git-fixes).\n- USB: c67x00: fix use after free in c67x00_giveback_urb (bsc#1111666).\n- USB: cdc-acm: restore capability check order (git-fixes).\n- usb: chipidea: core: add wakeup support for extcon (bsc#1111666).\n- USB: core: Fix misleading driver bug report (bsc#1051510).\n- usb: dwc2: Fix shutdown callback in platform (bsc#1111666).\n- usb: dwc2: gadget: move gadget resume after the core is in L0 state (bsc#1051510).\n- USB: dwc3: do not set gadget-\u003eis_otg flag (git-fixes).\n- USB: dwc3: gadget: Do link recovery for SS and SSP (git-fixes).\n- usb: dwc3: gadget: introduce cancelled_list (git-fixes).\n- usb: dwc3: gadget: never call -\u003ecomplete() from -\u003eep_queue() (git-fixes).\n- usb: dwc3: gadget: Properly handle ClearFeature(halt) (git-fixes).\n- usb: dwc3: gadget: Properly handle failed kick_transfer (git-fixes).\n- USB: early: Handle AMD\u0027s spec-compliant identifiers, too (git-fixes).\n- USB: ehci: reopen solution for Synopsys HC bug (git-fixes).\n- USB: f_fs: Clear OS Extended descriptor counts to zero in ffs_data_reset() (git-fixes).\n- USB: gadget: audio: Fix a missing error return value in audio_bind() (git-fixes).\n- USB: gadget: composite: Inform controller driver of self-powered (git-fixes).\n- usb: gadget: fix potential double-free in m66592_probe (bsc#1111666).\n- USB: gadget: legacy: fix error return code in cdc_bind() (git-fixes).\n- USB: gadget: legacy: fix error return code in gncm_bind() (git-fixes).\n- USB: gadget: legacy: fix redundant initialization warnings (bsc#1051510).\n- usb: gadget: lpc32xx_udc: do not dereference ep pointer before null check (bsc#1051510).\n- USB: gadget: net2272: Fix a memory leak in an error handling path in \u0027net2272_plat_probe()\u0027 (git-fixes).\n- usb: gadget: udc: atmel: fix uninitialized read in debug printk (bsc#1111666).\n- USB: gadget: udc: atmel: Fix vbus disconnect handling (git-fixes).\n- USB: gadget: udc: atmel: Make some symbols static (git-fixes).\n- usb: gadget: udc: atmel: remove outdated comment in usba_ep_disable() (bsc#1111666).\n- USB: gadget: udc: bdc: Remove unnecessary NULL checks in bdc_req_complete (git-fixes).\n- usb: gadget: udc: Potential Oops in error handling code (bsc#1111666).\n- USB: gadget: udc: s3c2410_udc: Remove pointless NULL check in s3c2410_udc_nuke (bsc#1051510).\n- usb: host: ehci-exynos: Fix error check in exynos_ehci_probe() (bsc#1111666).\n- USB: host: ehci-mxc: Add error handling in ehci_mxc_drv_probe() (bsc#1051510).\n- USB: host: xhci-plat: keep runtime active when removing host (git-fixes).\n- USB: hub: Fix handling of connect changes during sleep (git-fixes).\n- usb: musb: Fix runtime PM imbalance on error (bsc#1051510).\n- usb: musb: start session in resume for host port (bsc#1051510).\n- usbnet: silence an unnecessary warning (bsc#1170770).\n- usbnet: smsc95xx: Fix use-after-free after removal (bsc#1111666).\n- USB: ohci-sm501: Add missed iounmap() in remove (bsc#1111666).\n- USB: serial: garmin_gps: add sanity checking for data length (git-fixes).\n- USB: serial: iuu_phoenix: fix memory corruption (bsc#1111666).\n- USB: serial: option: add BroadMobi BM806U (git-fixes).\n- USB: serial: option: add support for ASKEY WWHC050 (git-fixes).\n- USB: serial: option: add Telit LE910C1-EUX compositions (bsc#1051510).\n- USB: serial: option: add Wistron Neweb D19Q1 (git-fixes).\n- USB: serial: qcserial: add DW5816e QDL support (bsc#1051510).\n- USB: serial: qcserial: Add DW5816e support (git-fixes).\n- USB: serial: usb_wwan: do not resubmit rx urb on fatal errors (bsc#1051510).\n- USB: serial: usb_wwan: do not resubmit rx urb on fatal errors (git-fixes).\n- USB: sisusbvga: Change port variable from signed to unsigned (git-fixes).\n- usb-storage: Add unusual_devs entry for JMicron JMS566 (git-fixes).\n- USB: uas: add quirk for LaCie 2Big Quadra (git-fixes).\n- USB: xhci: Fix NULL pointer dereference when enqueuing trbs from urb sg list (git-fixes).\n- vfio/pci: Fix SR-IOV VF handling with MMIO blocking (bsc#1174123).\n- vfs: Fix EOVERFLOW testing in put_compat_statfs64 (bnc#1151927 5.3.6).\n- video: fbdev: sis: Remove unnecessary parentheses and commented code (bsc#1114279)\n- video: fbdev: w100fb: Fix a potential double free (bsc#1051510).\n- virtio-blk: handle block_device_operations callbacks after hot unplug (git fixes (block drivers)).\n- vmxnet3: add geneve and vxlan tunnel offload support (bsc#1172484).\n- vmxnet3: add support to get/set rx flow hash (bsc#1172484).\n- vmxnet3: allow rx flow hash ops only when rss is enabled (bsc#1172484).\n- vmxnet3: avoid format strint overflow warning (bsc#1172484).\n- vmxnet3: prepare for version 4 changes (bsc#1172484).\n- vmxnet3: Remove always false conditional statement (bsc#1172484).\n- vmxnet3: remove redundant initialization of pointer \u0027rq\u0027 (bsc#1172484).\n- vmxnet3: remove unused flag \u0027rxcsum\u0027 from struct vmxnet3_adapter (bsc#1172484).\n- vmxnet3: Replace msleep(1) with usleep_range() (bsc#1172484).\n- vmxnet3: update to version 4 (bsc#1172484).\n- vmxnet3: use correct hdr reference when packet is encapsulated (bsc#1172484).\n- vrf: Check skb for XFRM_TRANSFORMED flag (networking-stable-20_04_27).\n- vt: ioctl, switch VT_IS_IN_USE and VT_BUSY to inlines (git-fixes).\n- vt: selection, introduce vc_is_sel (git-fixes).\n- vt: vt_ioctl: fix race in VT_RESIZEX (git-fixes).\n- vt: vt_ioctl: fix use-after-free in vt_in_use() (git-fixes).\n- vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console (git-fixes).\n- vxlan: Avoid infinite loop when suppressing NS messages with invalid options (git-fixes).\n- vxlan: check return value of gro_cells_init() (networking-stable-20_03_28).\n- w1: Add subsystem kernel public interface (jsc#SLE-11048).\n- w1: Fix slave count on 1-Wire bus (resend) (jsc#SLE-11048).\n- w1: keep balance of mutex locks and refcnts (jsc#SLE-11048).\n- w1: omap-hdq: cleanup to add missing newline for some dev_dbg (bsc#1051510).\n- w1: use put_device() if device_register() fail (jsc#SLE-11048).\n- watchdog: reset last_hw_keepalive time at start (git-fixes).\n- watchdog: sp805: fix restart handler (bsc#1111666).\n- wcn36xx: Fix error handling path in \u0027wcn36xx_probe()\u0027 (bsc#1051510).\n- wil6210: add general initialization/size checks (bsc#1111666).\n- wil6210: check rx_buff_mgmt before accessing it (bsc#1111666).\n- wil6210: ignore HALP ICR if already handled (bsc#1111666).\n- wil6210: make sure Rx ring sizes are correlated (git-fixes).\n- wil6210: remove reset file from debugfs (git-fixes).\n- wimax/i2400m: Fix potential urb refcnt leak (bsc#1051510).\n- work around mvfs bug (bsc#1162063).\n- workqueue: do not use wq_select_unbound_cpu() for bound works (bsc#1172130).\n- x86/amd_nb: Add Family 19h PCI IDs (jsc#SLE-11834).\n- x86/apic: Install an empty physflat_init_apic_ldr (bsc#1163309).\n- x86/cpu/amd: Make erratum #1054 a legacy erratum (bsc#1114279).\n- x86/entry/64: Fix unwind hints in kernel exit path (bsc#1058115).\n- x86/entry/64: Fix unwind hints in register clearing code (bsc#1058115).\n- x86/entry/64: Fix unwind hints in rewind_stack_do_exit() (bsc#1058115).\n- x86/entry/64: Fix unwind hints in __switch_to_asm() (bsc#1058115).\n- x86/events/intel/ds: Add PERF_SAMPLE_PERIOD into PEBS_FREERUNNING_FLAGS (git-fixes).\n- x86/events/intel/ds: Add PERF_SAMPLE_PERIOD into PEBS_FREERUNNING_FLAGS (git-fixes).\n- x86: Fix early boot crash on gcc-10, third try (bsc#1114279).\n- x86/Hyper-V: Allow guests to enable InvariantTSC (bsc#1170620).\n- x86/Hyper-V: Free hv_panic_page when fail to register kmsg dump (bsc#1170617, bsc#1170618).\n- x86/Hyper-V: Free hv_panic_page when fail to register kmsg dump (bsc#1170618).\n- x86/Hyper-V: Report crash data in die() when panic_on_oops is set (bsc#1170617, bsc#1170618).\n- x86/Hyper-V: Report crash data in die() when panic_on_oops is set (bsc#1170618).\n- x86/Hyper-V: Report crash register data or kmsg before running crash kernel (bsc#1170617, bsc#1170618).\n- x86/Hyper-V: Report crash register data or kmsg before running crash kernel (bsc#1170618).\n- x86/Hyper-V: Report crash register data when sysctl_record_panic_msg is not set (bsc#1170617, bsc#1170618).\n- x86/Hyper-V: Report crash register data when sysctl_record_panic_msg is not set (bsc#1170618).\n- x86/Hyper-V: report value of misc_features (git fixes).\n- x86/Hyper-V: report value of misc_features (git-fixes).\n- x86/Hyper-V: Trigger crash enlightenment only once during system crash (bsc#1170617, bsc#1170618).\n- x86/Hyper-V: Trigger crash enlightenment only once during system crash (bsc#1170618).\n- x86/Hyper-V: Unload vmbus channel in hv panic callback (bsc#1170617, bsc#1170618).\n- x86/Hyper-V: Unload vmbus channel in hv panic callback (bsc#1170618).\n- x86/Hyperv-V: Allow guests to enable InvariantTSC (bsc#1170621, bsc#1170620).\n- x86/kprobes: Avoid kretprobe recursion bug (bsc#1114279).\n- x86/MCE/AMD: Add a KABI workaround for enum smca_bank_types (jsc#SLE-11833).\n- x86/MCE/AMD, EDAC/mce_amd: Add new Load Store unit McaType (jsc#SLE-11833).\n- x86/{mce,mm}: Unmap the entire page if the whole page is affected and poisoned (bsc#1172257).\n- x86/microcode/AMD: Increase microcode PATCH_MAX_SIZE (bsc#1169005).\n- x86/reboot/quirks: Add MacBook6,1 reboot quirk (bsc#1114279).\n- x86/resctrl: Fix invalid attempt at removing the default resource group (git-fixes).\n- x86/resctrl: Preserve CDP enable over CPU hotplug (bsc#1114279).\n- x86/unwind/orc: Do not skip the first frame for inactive tasks (bsc#1058115).\n- x86/unwind/orc: Fix error handling in __unwind_start() (bsc#1058115).\n- x86/unwind/orc: Fix error path for bad ORC entry type (bsc#1058115).\n- x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks (bsc#1058115).\n- x86/unwind/orc: Prevent unwinding before ORC initialization (bsc#1058115).\n- x86/unwind: Prevent false warnings for non-current tasks (bsc#1058115).\n- x86/xen: fix booting 32-bit pv guest (bsc#1071995).\n- x86/xen: Make the boot CPU idle task reliable (bsc#1071995).\n- x86/xen: Make the secondary CPU idle tasks reliable (bsc#1071995).\n- xen/blkfront: fix memory allocation flags in blkfront_setup_indirect() (bsc#1168486).\n- xen/pci: reserve MCFG areas earlier (bsc#1170145).\n- xfrm: Always set XFRM_TRANSFORMED in xfrm{4,6}_output_finish (networking-stable-20_04_27).\n- xfrm: fix error in comment (git fixes).\n- xfs: clear PF_MEMALLOC before exiting xfsaild thread (git-fixes).\n- xfs: Correctly invert xfs_buftarg LRU isolation logic (git-fixes).\n- xfs: do not ever return a stale pointer from __xfs_dir3_free_read (git-fixes).\n- xhci: Fix incorrect EP_STATE_MASK (git-fixes).\n- xprtrdma: Fix completion wait during device removal (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-2478,SUSE-SLE-RT-12-SP5-2020-2478", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2478-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:2478-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20202478-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:2478-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1058115", "url": "https://bugzilla.suse.com/1058115" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1082555", "url": "https://bugzilla.suse.com/1082555" }, { "category": "self", "summary": "SUSE Bug 1083647", "url": "https://bugzilla.suse.com/1083647" }, { "category": "self", "summary": "SUSE Bug 1085030", "url": "https://bugzilla.suse.com/1085030" }, { "category": "self", "summary": "SUSE Bug 1089895", "url": "https://bugzilla.suse.com/1089895" }, { "category": "self", "summary": "SUSE Bug 1103990", "url": "https://bugzilla.suse.com/1103990" }, { "category": "self", "summary": "SUSE Bug 1103991", "url": "https://bugzilla.suse.com/1103991" }, { "category": "self", "summary": "SUSE Bug 1103992", "url": "https://bugzilla.suse.com/1103992" }, { "category": "self", "summary": "SUSE Bug 1104745", "url": "https://bugzilla.suse.com/1104745" }, { "category": "self", "summary": "SUSE Bug 1104967", "url": "https://bugzilla.suse.com/1104967" }, { "category": "self", "summary": "SUSE Bug 1109837", "url": "https://bugzilla.suse.com/1109837" }, { "category": "self", "summary": "SUSE Bug 1111666", "url": "https://bugzilla.suse.com/1111666" }, { "category": "self", "summary": "SUSE Bug 1112178", "url": "https://bugzilla.suse.com/1112178" }, { "category": "self", "summary": "SUSE Bug 1112374", "url": "https://bugzilla.suse.com/1112374" }, { "category": "self", "summary": "SUSE Bug 1113956", "url": "https://bugzilla.suse.com/1113956" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1124278", "url": "https://bugzilla.suse.com/1124278" }, { "category": "self", "summary": "SUSE Bug 1127354", "url": "https://bugzilla.suse.com/1127354" }, { "category": "self", "summary": "SUSE Bug 1127355", "url": "https://bugzilla.suse.com/1127355" }, { "category": "self", "summary": "SUSE Bug 1127371", "url": "https://bugzilla.suse.com/1127371" }, { "category": "self", "summary": "SUSE Bug 1133021", "url": "https://bugzilla.suse.com/1133021" }, { "category": "self", "summary": "SUSE Bug 1137325", "url": "https://bugzilla.suse.com/1137325" }, { "category": "self", "summary": "SUSE Bug 1141558", "url": "https://bugzilla.suse.com/1141558" }, { "category": "self", "summary": "SUSE Bug 1142685", "url": "https://bugzilla.suse.com/1142685" }, { "category": "self", "summary": "SUSE Bug 1144333", "url": "https://bugzilla.suse.com/1144333" }, { "category": "self", "summary": "SUSE Bug 1145929", "url": "https://bugzilla.suse.com/1145929" }, { "category": "self", "summary": "SUSE Bug 1148868", "url": "https://bugzilla.suse.com/1148868" }, { "category": "self", "summary": "SUSE Bug 1150660", "url": "https://bugzilla.suse.com/1150660" }, { "category": "self", "summary": "SUSE Bug 1151794", "url": "https://bugzilla.suse.com/1151794" }, { "category": "self", "summary": "SUSE Bug 1151927", "url": "https://bugzilla.suse.com/1151927" }, { "category": "self", "summary": "SUSE Bug 1152107", "url": "https://bugzilla.suse.com/1152107" }, { "category": "self", "summary": "SUSE Bug 1152489", "url": "https://bugzilla.suse.com/1152489" }, { "category": "self", "summary": "SUSE Bug 1152624", "url": "https://bugzilla.suse.com/1152624" }, { "category": "self", "summary": "SUSE Bug 1154824", "url": "https://bugzilla.suse.com/1154824" }, { "category": "self", "summary": "SUSE Bug 1157169", "url": "https://bugzilla.suse.com/1157169" }, { "category": "self", "summary": "SUSE Bug 1158265", "url": "https://bugzilla.suse.com/1158265" }, { "category": "self", "summary": "SUSE Bug 1158983", "url": "https://bugzilla.suse.com/1158983" }, { "category": "self", "summary": "SUSE Bug 1159037", "url": "https://bugzilla.suse.com/1159037" }, { "category": "self", "summary": "SUSE Bug 1159058", "url": "https://bugzilla.suse.com/1159058" }, { "category": "self", "summary": "SUSE Bug 1159199", "url": "https://bugzilla.suse.com/1159199" }, { "category": "self", "summary": "SUSE Bug 1160388", "url": "https://bugzilla.suse.com/1160388" }, { "category": "self", "summary": "SUSE Bug 1160947", "url": "https://bugzilla.suse.com/1160947" }, { "category": "self", "summary": "SUSE Bug 1161016", "url": "https://bugzilla.suse.com/1161016" }, { "category": "self", "summary": "SUSE Bug 1162002", "url": "https://bugzilla.suse.com/1162002" }, { "category": "self", "summary": "SUSE Bug 1162063", "url": "https://bugzilla.suse.com/1162063" }, { "category": "self", "summary": "SUSE Bug 1163309", "url": "https://bugzilla.suse.com/1163309" }, { "category": "self", "summary": "SUSE Bug 1163403", "url": "https://bugzilla.suse.com/1163403" }, { "category": "self", "summary": "SUSE Bug 1163897", "url": "https://bugzilla.suse.com/1163897" }, { "category": "self", "summary": "SUSE Bug 1164284", "url": "https://bugzilla.suse.com/1164284" }, { "category": "self", "summary": "SUSE Bug 1164780", "url": "https://bugzilla.suse.com/1164780" }, { "category": "self", "summary": "SUSE Bug 1164871", "url": "https://bugzilla.suse.com/1164871" }, { "category": "self", "summary": "SUSE Bug 1165183", "url": "https://bugzilla.suse.com/1165183" }, { "category": "self", "summary": "SUSE Bug 1165478", "url": "https://bugzilla.suse.com/1165478" }, { "category": "self", "summary": "SUSE Bug 1165741", "url": "https://bugzilla.suse.com/1165741" }, { "category": "self", "summary": "SUSE Bug 1166780", "url": "https://bugzilla.suse.com/1166780" }, { "category": "self", "summary": "SUSE Bug 1166860", "url": "https://bugzilla.suse.com/1166860" }, { "category": "self", "summary": "SUSE Bug 1166861", "url": "https://bugzilla.suse.com/1166861" }, { "category": "self", "summary": "SUSE Bug 1166862", "url": "https://bugzilla.suse.com/1166862" }, { "category": "self", "summary": "SUSE Bug 1166864", "url": "https://bugzilla.suse.com/1166864" }, { "category": "self", "summary": "SUSE Bug 1166866", "url": "https://bugzilla.suse.com/1166866" }, { "category": "self", "summary": "SUSE Bug 1166867", "url": "https://bugzilla.suse.com/1166867" }, { "category": "self", "summary": "SUSE Bug 1166868", "url": "https://bugzilla.suse.com/1166868" }, { "category": "self", "summary": "SUSE Bug 1166870", "url": "https://bugzilla.suse.com/1166870" }, { "category": "self", "summary": "SUSE Bug 1166940", "url": "https://bugzilla.suse.com/1166940" }, { "category": "self", "summary": "SUSE Bug 1166969", "url": "https://bugzilla.suse.com/1166969" }, { "category": "self", "summary": "SUSE Bug 1166978", "url": "https://bugzilla.suse.com/1166978" }, { "category": "self", "summary": "SUSE Bug 1166985", "url": "https://bugzilla.suse.com/1166985" }, { "category": "self", "summary": "SUSE Bug 1167104", "url": "https://bugzilla.suse.com/1167104" }, { "category": "self", "summary": "SUSE Bug 1167288", "url": "https://bugzilla.suse.com/1167288" }, { "category": "self", "summary": "SUSE Bug 1167574", "url": "https://bugzilla.suse.com/1167574" }, { "category": "self", "summary": "SUSE Bug 1167851", "url": "https://bugzilla.suse.com/1167851" }, { "category": "self", "summary": "SUSE Bug 1167867", "url": "https://bugzilla.suse.com/1167867" }, { "category": "self", "summary": "SUSE Bug 1168081", "url": "https://bugzilla.suse.com/1168081" }, { "category": "self", "summary": "SUSE Bug 1168202", "url": "https://bugzilla.suse.com/1168202" }, { "category": "self", "summary": "SUSE Bug 1168332", "url": "https://bugzilla.suse.com/1168332" }, { "category": "self", "summary": "SUSE Bug 1168486", "url": "https://bugzilla.suse.com/1168486" }, { "category": "self", "summary": "SUSE Bug 1168503", "url": "https://bugzilla.suse.com/1168503" }, { "category": "self", "summary": "SUSE Bug 1168670", "url": "https://bugzilla.suse.com/1168670" }, { "category": "self", "summary": "SUSE Bug 1168760", "url": "https://bugzilla.suse.com/1168760" }, { "category": "self", "summary": "SUSE Bug 1168762", "url": "https://bugzilla.suse.com/1168762" }, { "category": "self", "summary": "SUSE Bug 1168763", "url": "https://bugzilla.suse.com/1168763" }, { "category": "self", "summary": "SUSE Bug 1168764", "url": "https://bugzilla.suse.com/1168764" }, { "category": "self", "summary": "SUSE Bug 1168765", "url": "https://bugzilla.suse.com/1168765" }, { "category": "self", "summary": "SUSE Bug 1168789", "url": "https://bugzilla.suse.com/1168789" }, { "category": "self", "summary": "SUSE Bug 1168881", "url": "https://bugzilla.suse.com/1168881" }, { "category": "self", "summary": "SUSE Bug 1168884", "url": "https://bugzilla.suse.com/1168884" }, { "category": "self", "summary": "SUSE Bug 1168952", "url": "https://bugzilla.suse.com/1168952" }, { "category": "self", "summary": "SUSE Bug 1168959", "url": "https://bugzilla.suse.com/1168959" }, { "category": "self", "summary": "SUSE Bug 1169005", "url": "https://bugzilla.suse.com/1169005" }, { "category": "self", "summary": "SUSE Bug 1169013", "url": "https://bugzilla.suse.com/1169013" }, { "category": "self", "summary": "SUSE Bug 1169020", "url": "https://bugzilla.suse.com/1169020" }, { "category": "self", "summary": "SUSE Bug 1169057", "url": "https://bugzilla.suse.com/1169057" }, { "category": "self", "summary": "SUSE Bug 1169194", "url": "https://bugzilla.suse.com/1169194" }, { "category": "self", "summary": "SUSE Bug 1169390", "url": "https://bugzilla.suse.com/1169390" }, { "category": "self", "summary": "SUSE Bug 1169514", "url": "https://bugzilla.suse.com/1169514" }, { "category": "self", "summary": "SUSE Bug 1169525", "url": "https://bugzilla.suse.com/1169525" }, { "category": "self", "summary": "SUSE Bug 1169625", "url": "https://bugzilla.suse.com/1169625" }, { "category": "self", "summary": "SUSE Bug 1169762", "url": "https://bugzilla.suse.com/1169762" }, { "category": "self", "summary": "SUSE Bug 1169771", "url": "https://bugzilla.suse.com/1169771" }, { "category": "self", "summary": "SUSE Bug 1169795", "url": "https://bugzilla.suse.com/1169795" }, { "category": "self", "summary": "SUSE Bug 1170011", "url": "https://bugzilla.suse.com/1170011" }, { "category": "self", "summary": "SUSE Bug 1170056", "url": "https://bugzilla.suse.com/1170056" }, { "category": "self", "summary": "SUSE Bug 1170125", "url": "https://bugzilla.suse.com/1170125" }, { "category": "self", "summary": "SUSE Bug 1170145", "url": "https://bugzilla.suse.com/1170145" }, { "category": "self", "summary": "SUSE Bug 1170284", "url": "https://bugzilla.suse.com/1170284" }, { "category": "self", "summary": "SUSE Bug 1170345", "url": "https://bugzilla.suse.com/1170345" }, { "category": "self", "summary": "SUSE Bug 1170442", "url": "https://bugzilla.suse.com/1170442" }, { "category": "self", "summary": "SUSE Bug 1170457", "url": "https://bugzilla.suse.com/1170457" }, { "category": "self", "summary": "SUSE Bug 1170522", "url": "https://bugzilla.suse.com/1170522" }, { "category": "self", "summary": "SUSE Bug 1170592", "url": "https://bugzilla.suse.com/1170592" }, { "category": "self", "summary": "SUSE Bug 1170617", "url": "https://bugzilla.suse.com/1170617" }, { "category": "self", "summary": "SUSE Bug 1170618", "url": "https://bugzilla.suse.com/1170618" }, { "category": "self", "summary": "SUSE Bug 1170620", "url": "https://bugzilla.suse.com/1170620" }, { "category": "self", "summary": "SUSE Bug 1170621", "url": "https://bugzilla.suse.com/1170621" }, { "category": "self", "summary": "SUSE Bug 1170770", "url": "https://bugzilla.suse.com/1170770" }, { "category": "self", "summary": "SUSE Bug 1170778", "url": "https://bugzilla.suse.com/1170778" }, { "category": "self", "summary": "SUSE Bug 1170791", "url": "https://bugzilla.suse.com/1170791" }, { "category": "self", "summary": "SUSE Bug 1170901", "url": "https://bugzilla.suse.com/1170901" }, { "category": "self", "summary": "SUSE Bug 1171078", "url": "https://bugzilla.suse.com/1171078" }, { "category": "self", "summary": "SUSE Bug 1171098", "url": "https://bugzilla.suse.com/1171098" }, { "category": "self", "summary": "SUSE Bug 1171118", "url": "https://bugzilla.suse.com/1171118" }, { "category": "self", "summary": "SUSE Bug 1171124", "url": "https://bugzilla.suse.com/1171124" }, { "category": "self", "summary": "SUSE Bug 1171189", "url": "https://bugzilla.suse.com/1171189" }, { "category": "self", "summary": "SUSE Bug 1171191", "url": "https://bugzilla.suse.com/1171191" }, { "category": "self", "summary": "SUSE Bug 1171195", "url": "https://bugzilla.suse.com/1171195" }, { "category": "self", "summary": "SUSE Bug 1171202", "url": "https://bugzilla.suse.com/1171202" }, { "category": "self", "summary": "SUSE Bug 1171205", "url": "https://bugzilla.suse.com/1171205" }, { "category": "self", "summary": "SUSE Bug 1171214", "url": "https://bugzilla.suse.com/1171214" }, { "category": "self", "summary": "SUSE Bug 1171217", "url": "https://bugzilla.suse.com/1171217" }, { "category": "self", "summary": "SUSE Bug 1171218", "url": "https://bugzilla.suse.com/1171218" }, { "category": "self", "summary": "SUSE Bug 1171219", "url": "https://bugzilla.suse.com/1171219" }, { "category": "self", "summary": "SUSE Bug 1171220", "url": "https://bugzilla.suse.com/1171220" }, { "category": "self", "summary": "SUSE Bug 1171244", "url": "https://bugzilla.suse.com/1171244" }, { "category": "self", "summary": "SUSE Bug 1171293", "url": "https://bugzilla.suse.com/1171293" }, { "category": "self", "summary": "SUSE Bug 1171417", "url": "https://bugzilla.suse.com/1171417" }, { "category": "self", "summary": "SUSE Bug 1171424", "url": "https://bugzilla.suse.com/1171424" }, { "category": "self", "summary": "SUSE Bug 1171527", "url": "https://bugzilla.suse.com/1171527" }, { "category": "self", "summary": "SUSE Bug 1171529", "url": "https://bugzilla.suse.com/1171529" }, { "category": "self", "summary": "SUSE Bug 1171530", "url": "https://bugzilla.suse.com/1171530" }, { "category": "self", "summary": "SUSE Bug 1171558", "url": "https://bugzilla.suse.com/1171558" }, { "category": "self", "summary": "SUSE Bug 1171599", "url": "https://bugzilla.suse.com/1171599" }, { "category": "self", "summary": "SUSE Bug 1171600", "url": "https://bugzilla.suse.com/1171600" }, { "category": "self", "summary": "SUSE Bug 1171601", "url": "https://bugzilla.suse.com/1171601" }, { "category": "self", "summary": "SUSE Bug 1171602", "url": "https://bugzilla.suse.com/1171602" }, { "category": "self", "summary": "SUSE Bug 1171604", "url": "https://bugzilla.suse.com/1171604" }, { "category": "self", "summary": "SUSE Bug 1171605", "url": "https://bugzilla.suse.com/1171605" }, { "category": "self", "summary": "SUSE Bug 1171606", "url": "https://bugzilla.suse.com/1171606" }, { "category": "self", "summary": "SUSE Bug 1171607", "url": "https://bugzilla.suse.com/1171607" }, { "category": "self", "summary": "SUSE Bug 1171608", "url": "https://bugzilla.suse.com/1171608" }, { "category": "self", "summary": "SUSE Bug 1171609", "url": "https://bugzilla.suse.com/1171609" }, { "category": "self", "summary": "SUSE Bug 1171610", "url": "https://bugzilla.suse.com/1171610" }, { "category": "self", "summary": "SUSE Bug 1171611", "url": "https://bugzilla.suse.com/1171611" }, { "category": "self", "summary": "SUSE Bug 1171612", "url": "https://bugzilla.suse.com/1171612" }, { "category": "self", "summary": "SUSE Bug 1171613", "url": "https://bugzilla.suse.com/1171613" }, { "category": "self", "summary": "SUSE Bug 1171614", "url": "https://bugzilla.suse.com/1171614" }, { "category": "self", "summary": "SUSE Bug 1171615", "url": "https://bugzilla.suse.com/1171615" }, { "category": "self", "summary": "SUSE Bug 1171616", "url": "https://bugzilla.suse.com/1171616" }, { "category": "self", "summary": "SUSE Bug 1171617", "url": "https://bugzilla.suse.com/1171617" }, { "category": "self", "summary": "SUSE Bug 1171618", "url": "https://bugzilla.suse.com/1171618" }, { "category": "self", "summary": "SUSE Bug 1171619", "url": "https://bugzilla.suse.com/1171619" }, { "category": "self", "summary": "SUSE Bug 1171620", "url": "https://bugzilla.suse.com/1171620" }, { "category": "self", "summary": "SUSE Bug 1171621", "url": "https://bugzilla.suse.com/1171621" }, { "category": "self", "summary": "SUSE Bug 1171622", "url": "https://bugzilla.suse.com/1171622" }, { "category": "self", "summary": "SUSE Bug 1171623", "url": "https://bugzilla.suse.com/1171623" }, { "category": "self", "summary": "SUSE Bug 1171624", "url": "https://bugzilla.suse.com/1171624" }, { "category": "self", "summary": "SUSE Bug 1171625", "url": "https://bugzilla.suse.com/1171625" }, { "category": "self", "summary": "SUSE Bug 1171626", "url": "https://bugzilla.suse.com/1171626" }, { "category": "self", "summary": "SUSE Bug 1171662", "url": "https://bugzilla.suse.com/1171662" }, { "category": "self", "summary": "SUSE Bug 1171673", "url": "https://bugzilla.suse.com/1171673" }, { "category": "self", "summary": "SUSE Bug 1171679", "url": "https://bugzilla.suse.com/1171679" }, { "category": "self", "summary": "SUSE Bug 1171691", "url": "https://bugzilla.suse.com/1171691" }, { "category": "self", "summary": "SUSE Bug 1171692", "url": "https://bugzilla.suse.com/1171692" }, { "category": "self", "summary": "SUSE Bug 1171694", "url": "https://bugzilla.suse.com/1171694" }, { "category": "self", "summary": "SUSE Bug 1171695", "url": "https://bugzilla.suse.com/1171695" }, { "category": "self", "summary": "SUSE Bug 1171732", "url": "https://bugzilla.suse.com/1171732" }, { "category": "self", "summary": "SUSE Bug 1171736", "url": "https://bugzilla.suse.com/1171736" }, { "category": "self", "summary": "SUSE Bug 1171739", "url": "https://bugzilla.suse.com/1171739" }, { "category": "self", "summary": "SUSE Bug 1171743", "url": "https://bugzilla.suse.com/1171743" }, { "category": "self", "summary": "SUSE Bug 1171753", "url": "https://bugzilla.suse.com/1171753" }, { "category": "self", "summary": "SUSE Bug 1171759", "url": "https://bugzilla.suse.com/1171759" }, { "category": "self", "summary": "SUSE Bug 1171761", "url": "https://bugzilla.suse.com/1171761" }, { "category": "self", "summary": "SUSE Bug 1171817", "url": "https://bugzilla.suse.com/1171817" }, { "category": "self", "summary": "SUSE Bug 1171835", "url": "https://bugzilla.suse.com/1171835" }, { "category": "self", "summary": "SUSE Bug 1171841", "url": "https://bugzilla.suse.com/1171841" }, { "category": "self", "summary": "SUSE Bug 1171868", "url": "https://bugzilla.suse.com/1171868" }, { "category": "self", "summary": "SUSE Bug 1171904", "url": "https://bugzilla.suse.com/1171904" }, { "category": "self", "summary": "SUSE Bug 1171948", "url": "https://bugzilla.suse.com/1171948" }, { "category": "self", "summary": "SUSE Bug 1171949", "url": "https://bugzilla.suse.com/1171949" }, { "category": "self", "summary": "SUSE Bug 1171951", "url": "https://bugzilla.suse.com/1171951" }, { "category": "self", "summary": "SUSE Bug 1171952", "url": "https://bugzilla.suse.com/1171952" }, { "category": "self", "summary": "SUSE Bug 1171979", "url": "https://bugzilla.suse.com/1171979" }, { "category": "self", "summary": "SUSE Bug 1171982", "url": "https://bugzilla.suse.com/1171982" }, { "category": "self", "summary": "SUSE Bug 1171983", "url": "https://bugzilla.suse.com/1171983" }, { "category": "self", "summary": "SUSE Bug 1172017", "url": "https://bugzilla.suse.com/1172017" }, { "category": "self", "summary": "SUSE Bug 1172096", "url": "https://bugzilla.suse.com/1172096" }, { "category": "self", "summary": "SUSE Bug 1172097", "url": "https://bugzilla.suse.com/1172097" }, { "category": "self", "summary": "SUSE Bug 1172098", "url": "https://bugzilla.suse.com/1172098" }, { "category": "self", "summary": "SUSE Bug 1172099", "url": "https://bugzilla.suse.com/1172099" }, { "category": "self", "summary": "SUSE Bug 1172101", "url": "https://bugzilla.suse.com/1172101" }, { "category": "self", "summary": "SUSE Bug 1172102", "url": "https://bugzilla.suse.com/1172102" }, { "category": "self", "summary": "SUSE Bug 1172103", "url": "https://bugzilla.suse.com/1172103" }, { "category": "self", "summary": "SUSE Bug 1172104", "url": "https://bugzilla.suse.com/1172104" }, { "category": "self", "summary": "SUSE Bug 1172127", "url": "https://bugzilla.suse.com/1172127" }, { "category": "self", "summary": "SUSE Bug 1172130", "url": "https://bugzilla.suse.com/1172130" }, { "category": "self", "summary": "SUSE Bug 1172185", "url": "https://bugzilla.suse.com/1172185" }, { "category": "self", "summary": "SUSE Bug 1172188", "url": "https://bugzilla.suse.com/1172188" }, { "category": "self", "summary": "SUSE Bug 1172199", "url": "https://bugzilla.suse.com/1172199" }, { "category": "self", "summary": "SUSE Bug 1172201", "url": "https://bugzilla.suse.com/1172201" }, { "category": "self", "summary": "SUSE Bug 1172202", "url": "https://bugzilla.suse.com/1172202" }, { "category": "self", "summary": "SUSE Bug 1172218", "url": "https://bugzilla.suse.com/1172218" }, { "category": "self", "summary": "SUSE Bug 1172221", "url": "https://bugzilla.suse.com/1172221" }, { "category": "self", "summary": "SUSE Bug 1172247", "url": "https://bugzilla.suse.com/1172247" }, { "category": "self", "summary": "SUSE Bug 1172249", "url": "https://bugzilla.suse.com/1172249" }, { "category": "self", "summary": "SUSE Bug 1172251", "url": "https://bugzilla.suse.com/1172251" }, { "category": "self", "summary": "SUSE Bug 1172253", "url": "https://bugzilla.suse.com/1172253" }, { "category": "self", "summary": "SUSE Bug 1172257", "url": "https://bugzilla.suse.com/1172257" }, { "category": "self", "summary": "SUSE Bug 1172317", "url": "https://bugzilla.suse.com/1172317" }, { "category": "self", "summary": "SUSE Bug 1172342", "url": "https://bugzilla.suse.com/1172342" }, { "category": "self", "summary": "SUSE Bug 1172343", "url": "https://bugzilla.suse.com/1172343" }, { "category": "self", "summary": "SUSE Bug 1172344", "url": "https://bugzilla.suse.com/1172344" }, { "category": "self", "summary": "SUSE Bug 1172366", "url": "https://bugzilla.suse.com/1172366" }, { "category": "self", "summary": "SUSE Bug 1172378", "url": "https://bugzilla.suse.com/1172378" }, { "category": "self", "summary": "SUSE Bug 1172391", "url": "https://bugzilla.suse.com/1172391" }, { "category": "self", "summary": "SUSE Bug 1172397", "url": "https://bugzilla.suse.com/1172397" }, { "category": "self", "summary": "SUSE Bug 1172453", "url": "https://bugzilla.suse.com/1172453" }, { "category": "self", "summary": "SUSE Bug 1172458", "url": "https://bugzilla.suse.com/1172458" }, { "category": "self", "summary": "SUSE Bug 1172472", "url": "https://bugzilla.suse.com/1172472" }, { "category": "self", "summary": "SUSE Bug 1172484", "url": "https://bugzilla.suse.com/1172484" }, { "category": "self", "summary": "SUSE Bug 1172537", "url": "https://bugzilla.suse.com/1172537" }, { "category": "self", "summary": "SUSE Bug 1172538", "url": "https://bugzilla.suse.com/1172538" }, { "category": "self", "summary": "SUSE Bug 1172687", "url": "https://bugzilla.suse.com/1172687" }, { "category": "self", "summary": "SUSE Bug 1172719", "url": "https://bugzilla.suse.com/1172719" }, { "category": "self", "summary": "SUSE Bug 1172759", "url": "https://bugzilla.suse.com/1172759" }, { "category": "self", "summary": "SUSE Bug 1172770", "url": "https://bugzilla.suse.com/1172770" }, { "category": "self", "summary": "SUSE Bug 1172775", "url": "https://bugzilla.suse.com/1172775" }, { "category": "self", "summary": "SUSE Bug 1172781", "url": "https://bugzilla.suse.com/1172781" }, { "category": "self", "summary": "SUSE Bug 1172782", "url": "https://bugzilla.suse.com/1172782" }, { "category": "self", "summary": "SUSE Bug 1172783", "url": "https://bugzilla.suse.com/1172783" }, { "category": "self", "summary": "SUSE Bug 1172999", "url": "https://bugzilla.suse.com/1172999" }, { "category": "self", "summary": "SUSE Bug 1173060", "url": "https://bugzilla.suse.com/1173060" }, { "category": "self", "summary": "SUSE Bug 1173074", "url": "https://bugzilla.suse.com/1173074" }, { "category": "self", "summary": "SUSE Bug 1173146", "url": "https://bugzilla.suse.com/1173146" }, { "category": "self", "summary": "SUSE Bug 1173265", "url": "https://bugzilla.suse.com/1173265" }, { "category": "self", "summary": "SUSE Bug 1173280", "url": "https://bugzilla.suse.com/1173280" }, { "category": "self", "summary": "SUSE Bug 1173284", "url": "https://bugzilla.suse.com/1173284" }, { "category": "self", "summary": "SUSE Bug 1173428", "url": "https://bugzilla.suse.com/1173428" }, { "category": "self", "summary": "SUSE Bug 1173462", "url": "https://bugzilla.suse.com/1173462" }, { "category": "self", "summary": "SUSE Bug 1173514", "url": "https://bugzilla.suse.com/1173514" }, { "category": "self", "summary": "SUSE Bug 1173567", "url": "https://bugzilla.suse.com/1173567" }, { "category": "self", "summary": "SUSE Bug 1173573", "url": "https://bugzilla.suse.com/1173573" }, { "category": "self", "summary": "SUSE Bug 1173659", "url": "https://bugzilla.suse.com/1173659" }, { "category": "self", "summary": "SUSE Bug 1173746", "url": "https://bugzilla.suse.com/1173746" }, { "category": "self", "summary": "SUSE Bug 1173818", "url": "https://bugzilla.suse.com/1173818" }, { "category": "self", "summary": "SUSE Bug 1173820", "url": "https://bugzilla.suse.com/1173820" }, { "category": "self", "summary": "SUSE Bug 1173825", "url": "https://bugzilla.suse.com/1173825" }, { "category": "self", "summary": "SUSE Bug 1173826", "url": "https://bugzilla.suse.com/1173826" }, { "category": "self", "summary": "SUSE Bug 1173833", "url": "https://bugzilla.suse.com/1173833" }, { "category": "self", "summary": "SUSE Bug 1173838", "url": "https://bugzilla.suse.com/1173838" }, { "category": "self", "summary": "SUSE Bug 1173839", "url": "https://bugzilla.suse.com/1173839" }, { "category": "self", "summary": "SUSE Bug 1173845", "url": "https://bugzilla.suse.com/1173845" }, { "category": "self", "summary": "SUSE Bug 1173857", "url": "https://bugzilla.suse.com/1173857" }, { "category": "self", "summary": "SUSE Bug 1174113", "url": "https://bugzilla.suse.com/1174113" }, { "category": "self", "summary": "SUSE Bug 1174115", "url": "https://bugzilla.suse.com/1174115" }, { "category": "self", "summary": "SUSE Bug 1174122", "url": "https://bugzilla.suse.com/1174122" }, { "category": "self", "summary": "SUSE Bug 1174123", "url": "https://bugzilla.suse.com/1174123" }, { "category": "self", "summary": "SUSE Bug 1174130", "url": "https://bugzilla.suse.com/1174130" }, { "category": "self", "summary": "SUSE Bug 1174186", "url": "https://bugzilla.suse.com/1174186" }, { "category": "self", "summary": "SUSE Bug 1174187", "url": "https://bugzilla.suse.com/1174187" }, { "category": "self", "summary": "SUSE Bug 1174296", "url": "https://bugzilla.suse.com/1174296" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000199 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000199/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16746 page", "url": "https://www.suse.com/security/cve/CVE-2019-16746/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19462 page", "url": "https://www.suse.com/security/cve/CVE-2019-19462/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20806 page", "url": "https://www.suse.com/security/cve/CVE-2019-20806/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20810 page", "url": "https://www.suse.com/security/cve/CVE-2019-20810/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20812 page", "url": "https://www.suse.com/security/cve/CVE-2019-20812/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20908 page", "url": "https://www.suse.com/security/cve/CVE-2019-20908/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9455 page", "url": "https://www.suse.com/security/cve/CVE-2019-9455/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0543 page", "url": "https://www.suse.com/security/cve/CVE-2020-0543/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10690 page", "url": "https://www.suse.com/security/cve/CVE-2020-10690/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10711 page", "url": "https://www.suse.com/security/cve/CVE-2020-10711/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10720 page", "url": "https://www.suse.com/security/cve/CVE-2020-10720/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10732 page", "url": "https://www.suse.com/security/cve/CVE-2020-10732/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10751 page", "url": "https://www.suse.com/security/cve/CVE-2020-10751/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10757 page", "url": "https://www.suse.com/security/cve/CVE-2020-10757/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10766 page", "url": "https://www.suse.com/security/cve/CVE-2020-10766/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10767 page", "url": "https://www.suse.com/security/cve/CVE-2020-10767/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10768 page", "url": "https://www.suse.com/security/cve/CVE-2020-10768/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10769 page", "url": "https://www.suse.com/security/cve/CVE-2020-10769/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10773 page", "url": "https://www.suse.com/security/cve/CVE-2020-10773/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10781 page", "url": "https://www.suse.com/security/cve/CVE-2020-10781/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11669 page", "url": "https://www.suse.com/security/cve/CVE-2020-11669/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12114 page", "url": "https://www.suse.com/security/cve/CVE-2020-12114/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12464 page", "url": "https://www.suse.com/security/cve/CVE-2020-12464/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12652 page", "url": "https://www.suse.com/security/cve/CVE-2020-12652/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12653 page", "url": "https://www.suse.com/security/cve/CVE-2020-12653/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12654 page", "url": "https://www.suse.com/security/cve/CVE-2020-12654/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12655 page", "url": "https://www.suse.com/security/cve/CVE-2020-12655/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12656 page", "url": "https://www.suse.com/security/cve/CVE-2020-12656/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12657 page", "url": "https://www.suse.com/security/cve/CVE-2020-12657/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12659 page", "url": "https://www.suse.com/security/cve/CVE-2020-12659/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12769 page", "url": "https://www.suse.com/security/cve/CVE-2020-12769/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12771 page", "url": "https://www.suse.com/security/cve/CVE-2020-12771/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12888 page", "url": "https://www.suse.com/security/cve/CVE-2020-12888/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-13143 page", "url": "https://www.suse.com/security/cve/CVE-2020-13143/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-13974 page", "url": "https://www.suse.com/security/cve/CVE-2020-13974/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14416 page", "url": "https://www.suse.com/security/cve/CVE-2020-14416/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15393 page", "url": "https://www.suse.com/security/cve/CVE-2020-15393/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15780 page", "url": "https://www.suse.com/security/cve/CVE-2020-15780/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-09-03T10:12:56Z", "generator": { "date": "2020-09-03T10:12:56Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:2478-1", "initial_release_date": "2020-09-03T10:12:56Z", "revision_history": [ { "date": "2020-09-03T10:12:56Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-rt-4.12.14-10.13.1.noarch", "product": { "name": "kernel-devel-rt-4.12.14-10.13.1.noarch", "product_id": "kernel-devel-rt-4.12.14-10.13.1.noarch" } }, { "category": "product_version", "name": "kernel-source-rt-4.12.14-10.13.1.noarch", "product": { "name": "kernel-source-rt-4.12.14-10.13.1.noarch", "product_id": "kernel-source-rt-4.12.14-10.13.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "product": { "name": "cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "product_id": "cluster-md-kmp-rt-4.12.14-10.13.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt-4.12.14-10.13.1.x86_64", "product": { "name": "dlm-kmp-rt-4.12.14-10.13.1.x86_64", "product_id": "dlm-kmp-rt-4.12.14-10.13.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "product": { "name": "gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "product_id": "gfs2-kmp-rt-4.12.14-10.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-4.12.14-10.13.1.x86_64", "product": { "name": "kernel-rt-4.12.14-10.13.1.x86_64", "product_id": "kernel-rt-4.12.14-10.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-base-4.12.14-10.13.1.x86_64", "product": { "name": "kernel-rt-base-4.12.14-10.13.1.x86_64", "product_id": "kernel-rt-base-4.12.14-10.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-4.12.14-10.13.1.x86_64", "product": { "name": "kernel-rt-devel-4.12.14-10.13.1.x86_64", "product_id": "kernel-rt-devel-4.12.14-10.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-4.12.14-10.13.1.x86_64", "product": { "name": "kernel-rt_debug-4.12.14-10.13.1.x86_64", "product_id": "kernel-rt_debug-4.12.14-10.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "product": { "name": "kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "product_id": "kernel-rt_debug-devel-4.12.14-10.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-4.12.14-10.13.1.x86_64", "product": { "name": "kernel-syms-rt-4.12.14-10.13.1.x86_64", "product_id": "kernel-syms-rt-4.12.14-10.13.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt-4.12.14-10.13.1.x86_64", "product": { "name": "ocfs2-kmp-rt-4.12.14-10.13.1.x86_64", "product_id": "ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Real Time 12 SP5", "product": { "name": "SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-linux-enterprise-rt:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-rt-4.12.14-10.13.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64" }, "product_reference": "cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-rt-4.12.14-10.13.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64" }, "product_reference": "dlm-kmp-rt-4.12.14-10.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-rt-4.12.14-10.13.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64" }, "product_reference": "gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-rt-4.12.14-10.13.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch" }, "product_reference": "kernel-devel-rt-4.12.14-10.13.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-4.12.14-10.13.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64" }, "product_reference": "kernel-rt-4.12.14-10.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-base-4.12.14-10.13.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64" }, "product_reference": "kernel-rt-base-4.12.14-10.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-4.12.14-10.13.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64" }, "product_reference": "kernel-rt-devel-4.12.14-10.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-4.12.14-10.13.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64" }, "product_reference": "kernel-rt_debug-4.12.14-10.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-devel-4.12.14-10.13.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64" }, "product_reference": "kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-4.12.14-10.13.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch" }, "product_reference": "kernel-source-rt-4.12.14-10.13.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-4.12.14-10.13.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64" }, "product_reference": "kernel-syms-rt-4.12.14-10.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-rt-4.12.14-10.13.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", "product_id": "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" }, "product_reference": "ocfs2-kmp-rt-4.12.14-10.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-1000199", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000199" } ], "notes": [ { "category": "general", "text": "The Linux Kernel version 3.18 contains a dangerous feature vulnerability in modify_user_hw_breakpoint() that can result in crash and possibly memory corruption. This attack appear to be exploitable via local code execution and the ability to use ptrace. This vulnerability appears to have been fixed in git commit f67b15037a7a50c57f72e69a6d59941ad90a0f0f.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000199", "url": "https://www.suse.com/security/cve/CVE-2018-1000199" }, { "category": "external", "summary": "SUSE Bug 1089895 for CVE-2018-1000199", "url": "https://bugzilla.suse.com/1089895" }, { "category": "external", "summary": "SUSE Bug 1090036 for CVE-2018-1000199", "url": "https://bugzilla.suse.com/1090036" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "important" } ], "title": "CVE-2018-1000199" }, { "cve": "CVE-2019-16746", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16746" } ], "notes": [ { "category": "general", "text": "An issue was discovered in net/wireless/nl80211.c in the Linux kernel through 5.2.17. It does not check the length of variable elements in a beacon head, leading to a buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16746", "url": "https://www.suse.com/security/cve/CVE-2019-16746" }, { "category": "external", "summary": "SUSE Bug 1152107 for CVE-2019-16746", "url": "https://bugzilla.suse.com/1152107" }, { "category": "external", "summary": "SUSE Bug 1173659 for CVE-2019-16746", "url": "https://bugzilla.suse.com/1173659" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "moderate" } ], "title": "CVE-2019-16746" }, { "cve": "CVE-2019-19462", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19462" } ], "notes": [ { "category": "general", "text": "relay_open in kernel/relay.c in the Linux kernel through 5.4.1 allows local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19462", "url": "https://www.suse.com/security/cve/CVE-2019-19462" }, { "category": "external", "summary": "SUSE Bug 1158265 for CVE-2019-19462", "url": "https://bugzilla.suse.com/1158265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "low" } ], "title": "CVE-2019-19462" }, { "cve": "CVE-2019-20806", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20806" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.2. There is a NULL pointer dereference in tw5864_handle_frame() in drivers/media/pci/tw5864/tw5864-video.c, which may cause denial of service, aka CID-2e7682ebfc75.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20806", "url": "https://www.suse.com/security/cve/CVE-2019-20806" }, { "category": "external", "summary": "SUSE Bug 1172199 for CVE-2019-20806", "url": "https://bugzilla.suse.com/1172199" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "low" } ], "title": "CVE-2019-20806" }, { "cve": "CVE-2019-20810", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20810" } ], "notes": [ { "category": "general", "text": "go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel before 5.6 does not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20810", "url": "https://www.suse.com/security/cve/CVE-2019-20810" }, { "category": "external", "summary": "SUSE Bug 1172458 for CVE-2019-20810", "url": "https://bugzilla.suse.com/1172458" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "low" } ], "title": "CVE-2019-20810" }, { "cve": "CVE-2019-20812", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20812" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.4.7. The prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20812", "url": "https://www.suse.com/security/cve/CVE-2019-20812" }, { "category": "external", "summary": "SUSE Bug 1172453 for CVE-2019-20812", "url": "https://bugzilla.suse.com/1172453" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "moderate" } ], "title": "CVE-2019-20812" }, { "cve": "CVE-2019-20908", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20908" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/firmware/efi/efi.c in the Linux kernel before 5.4. Incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20908", "url": "https://www.suse.com/security/cve/CVE-2019-20908" }, { "category": "external", "summary": "SUSE Bug 1173567 for CVE-2019-20908", "url": "https://bugzilla.suse.com/1173567" }, { "category": "external", "summary": "SUSE Bug 1174187 for CVE-2019-20908", "url": "https://bugzilla.suse.com/1174187" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "important" } ], "title": "CVE-2019-20908" }, { "cve": "CVE-2019-9455", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9455" } ], "notes": [ { "category": "general", "text": "In the Android kernel in the video driver there is a kernel pointer leak due to a WARN_ON statement. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9455", "url": "https://www.suse.com/security/cve/CVE-2019-9455" }, { "category": "external", "summary": "SUSE Bug 1170345 for CVE-2019-9455", "url": "https://bugzilla.suse.com/1170345" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "moderate" } ], "title": "CVE-2019-9455" }, { "cve": "CVE-2020-0543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0543" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0543", "url": "https://www.suse.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "SUSE Bug 1154824 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1154824" }, { "category": "external", "summary": "SUSE Bug 1172205 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172205" }, { "category": "external", "summary": "SUSE Bug 1172206 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172206" }, { "category": "external", "summary": "SUSE Bug 1172207 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172207" }, { "category": "external", "summary": "SUSE Bug 1172770 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172770" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "moderate" } ], "title": "CVE-2020-0543" }, { "cve": "CVE-2020-10690", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10690" } ], "notes": [ { "category": "general", "text": "There is a use-after-free in kernel versions before 5.5 due to a race condition between the release of ptp_clock and cdev while resource deallocation. When a (high privileged) process allocates a ptp device file (like /dev/ptpX) and voluntarily goes to sleep. During this time if the underlying device is removed, it can cause an exploitable condition as the process wakes up to terminate and clean all attached files. The system crashes due to the cdev structure being invalid (as already freed) which is pointed to by the inode.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10690", "url": "https://www.suse.com/security/cve/CVE-2020-10690" }, { "category": "external", "summary": "SUSE Bug 1170056 for CVE-2020-10690", "url": "https://bugzilla.suse.com/1170056" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "moderate" } ], "title": "CVE-2020-10690" }, { "cve": "CVE-2020-10711", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10711" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s SELinux subsystem in versions before 5.7. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol\u0027s category bitmap into the SELinux extensible bitmap via the\u0027 ebitmap_netlbl_import\u0027 routine. While processing the CIPSO restricted bitmap tag in the \u0027cipso_v4_parsetag_rbm\u0027 routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allows a remote network user to crash the system kernel, resulting in a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10711", "url": "https://www.suse.com/security/cve/CVE-2020-10711" }, { "category": "external", "summary": "SUSE Bug 1171191 for CVE-2020-10711", "url": "https://bugzilla.suse.com/1171191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "moderate" } ], "title": "CVE-2020-10711" }, { "cve": "CVE-2020-10720", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10720" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of GRO in versions before 5.2. This flaw allows an attacker with local access to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10720", "url": "https://www.suse.com/security/cve/CVE-2020-10720" }, { "category": "external", "summary": "SUSE Bug 1170778 for CVE-2020-10720", "url": "https://bugzilla.suse.com/1170778" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "moderate" } ], "title": "CVE-2020-10720" }, { "cve": "CVE-2020-10732", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10732" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10732", "url": "https://www.suse.com/security/cve/CVE-2020-10732" }, { "category": "external", "summary": "SUSE Bug 1171220 for CVE-2020-10732", "url": "https://bugzilla.suse.com/1171220" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "low" } ], "title": "CVE-2020-10732" }, { "cve": "CVE-2020-10751", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10751" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10751", "url": "https://www.suse.com/security/cve/CVE-2020-10751" }, { "category": "external", "summary": "SUSE Bug 1171189 for CVE-2020-10751", "url": "https://bugzilla.suse.com/1171189" }, { "category": "external", "summary": "SUSE Bug 1174963 for CVE-2020-10751", "url": "https://bugzilla.suse.com/1174963" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "moderate" } ], "title": "CVE-2020-10751" }, { "cve": "CVE-2020-10757", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10757" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10757", "url": "https://www.suse.com/security/cve/CVE-2020-10757" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172317 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1172317" }, { "category": "external", "summary": "SUSE Bug 1172437 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1172437" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "important" } ], "title": "CVE-2020-10757" }, { "cve": "CVE-2020-10766", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10766" } ], "notes": [ { "category": "general", "text": "A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10766", "url": "https://www.suse.com/security/cve/CVE-2020-10766" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172781 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1172781" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "moderate" } ], "title": "CVE-2020-10766" }, { "cve": "CVE-2020-10767", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10767" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10767", "url": "https://www.suse.com/security/cve/CVE-2020-10767" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172782 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1172782" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "moderate" } ], "title": "CVE-2020-10767" }, { "cve": "CVE-2020-10768", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10768" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10768", "url": "https://www.suse.com/security/cve/CVE-2020-10768" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172783 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1172783" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "moderate" } ], "title": "CVE-2020-10768" }, { "cve": "CVE-2020-10769", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10769" } ], "notes": [ { "category": "general", "text": "A buffer over-read flaw was found in RH kernel versions before 5.0 in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm\u0027s module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash. This flaw allows a local attacker with user privileges to cause a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10769", "url": "https://www.suse.com/security/cve/CVE-2020-10769" }, { "category": "external", "summary": "SUSE Bug 1173265 for CVE-2020-10769", "url": "https://bugzilla.suse.com/1173265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "moderate" } ], "title": "CVE-2020-10769" }, { "cve": "CVE-2020-10773", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10773" } ], "notes": [ { "category": "general", "text": "A stack information leak flaw was found in s390/s390x in the Linux kernel\u0027s memory manager functionality, where it incorrectly writes to the /proc/sys/vm/cmm_timeout file. This flaw allows a local user to see the kernel data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10773", "url": "https://www.suse.com/security/cve/CVE-2020-10773" }, { "category": "external", "summary": "SUSE Bug 1172999 for CVE-2020-10773", "url": "https://bugzilla.suse.com/1172999" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "low" } ], "title": "CVE-2020-10773" }, { "cve": "CVE-2020-10781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10781" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel before 5.8-rc6 in the ZRAM kernel module, where a user with a local account and the ability to read the /sys/class/zram-control/hot_add file can create ZRAM device nodes in the /dev/ directory. This read allocates kernel memory and is not accounted for a user that triggers the creation of that ZRAM device. With this vulnerability, continually reading the device may consume a large amount of system memory and cause the Out-of-Memory (OOM) killer to activate and terminate random userspace processes, possibly making the system inoperable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10781", "url": "https://www.suse.com/security/cve/CVE-2020-10781" }, { "category": "external", "summary": "SUSE Bug 1173074 for CVE-2020-10781", "url": "https://bugzilla.suse.com/1173074" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "moderate" } ], "title": "CVE-2020-10781" }, { "cve": "CVE-2020-11669", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11669" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.2 on the powerpc platform. arch/powerpc/kernel/idle_book3s.S does not have save/restore functionality for PNV_POWERSAVE_AMR, PNV_POWERSAVE_UAMOR, and PNV_POWERSAVE_AMOR, aka CID-53a712bae5dd.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11669", "url": "https://www.suse.com/security/cve/CVE-2020-11669" }, { "category": "external", "summary": "SUSE Bug 1169390 for CVE-2020-11669", "url": "https://bugzilla.suse.com/1169390" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "moderate" } ], "title": "CVE-2020-11669" }, { "cve": "CVE-2020-12114", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12114" } ], "notes": [ { "category": "general", "text": "A pivot_root race condition in fs/namespace.c in the Linux kernel 4.4.x before 4.4.221, 4.9.x before 4.9.221, 4.14.x before 4.14.178, 4.19.x before 4.19.119, and 5.x before 5.3 allows local users to cause a denial of service (panic) by corrupting a mountpoint reference counter.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12114", "url": "https://www.suse.com/security/cve/CVE-2020-12114" }, { "category": "external", "summary": "SUSE Bug 1171098 for CVE-2020-12114", "url": "https://bugzilla.suse.com/1171098" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "moderate" } ], "title": "CVE-2020-12114" }, { "cve": "CVE-2020-12464", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12464" } ], "notes": [ { "category": "general", "text": "usb_sg_cancel in drivers/usb/core/message.c in the Linux kernel before 5.6.8 has a use-after-free because a transfer occurs without a reference, aka CID-056ad39ee925.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12464", "url": "https://www.suse.com/security/cve/CVE-2020-12464" }, { "category": "external", "summary": "SUSE Bug 1170901 for CVE-2020-12464", "url": "https://bugzilla.suse.com/1170901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 1.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "low" } ], "title": "CVE-2020-12464" }, { "cve": "CVE-2020-12652", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12652" } ], "notes": [ { "category": "general", "text": "The __mptctl_ioctl function in drivers/message/fusion/mptctl.c in the Linux kernel before 5.4.14 allows local users to hold an incorrect lock during the ioctl operation and trigger a race condition, i.e., a \"double fetch\" vulnerability, aka CID-28d76df18f0a. NOTE: the vendor states \"The security impact of this bug is not as bad as it could have been because these operations are all privileged and root already has enormous destructive power.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12652", "url": "https://www.suse.com/security/cve/CVE-2020-12652" }, { "category": "external", "summary": "SUSE Bug 1171218 for CVE-2020-12652", "url": "https://bugzilla.suse.com/1171218" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "moderate" } ], "title": "CVE-2020-12652" }, { "cve": "CVE-2020-12653", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12653" } ], "notes": [ { "category": "general", "text": "An issue was found in Linux kernel before 5.5.4. The mwifiex_cmd_append_vsie_tlv() function in drivers/net/wireless/marvell/mwifiex/scan.c allows local users to gain privileges or cause a denial of service because of an incorrect memcpy and buffer overflow, aka CID-b70261a288ea.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12653", "url": "https://www.suse.com/security/cve/CVE-2020-12653" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-12653", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1171195 for CVE-2020-12653", "url": "https://bugzilla.suse.com/1171195" }, { "category": "external", "summary": "SUSE Bug 1171254 for CVE-2020-12653", "url": "https://bugzilla.suse.com/1171254" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "important" } ], "title": "CVE-2020-12653" }, { "cve": "CVE-2020-12654", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12654" } ], "notes": [ { "category": "general", "text": "An issue was found in Linux kernel before 5.5.4. mwifiex_ret_wmm_get_status() in drivers/net/wireless/marvell/mwifiex/wmm.c allows a remote AP to trigger a heap-based buffer overflow because of an incorrect memcpy, aka CID-3a9b153c5591.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12654", "url": "https://www.suse.com/security/cve/CVE-2020-12654" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-12654", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1171202 for CVE-2020-12654", "url": "https://bugzilla.suse.com/1171202" }, { "category": "external", "summary": "SUSE Bug 1171252 for CVE-2020-12654", "url": "https://bugzilla.suse.com/1171252" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "important" } ], "title": "CVE-2020-12654" }, { "cve": "CVE-2020-12655", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12655" } ], "notes": [ { "category": "general", "text": "An issue was discovered in xfs_agf_verify in fs/xfs/libxfs/xfs_alloc.c in the Linux kernel through 5.6.10. Attackers may trigger a sync of excessive duration via an XFS v5 image with crafted metadata, aka CID-d0c7feaf8767.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12655", "url": "https://www.suse.com/security/cve/CVE-2020-12655" }, { "category": "external", "summary": "SUSE Bug 1171217 for CVE-2020-12655", "url": "https://bugzilla.suse.com/1171217" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "moderate" } ], "title": "CVE-2020-12655" }, { "cve": "CVE-2020-12656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12656" } ], "notes": [ { "category": "general", "text": "gss_mech_free in net/sunrpc/auth_gss/gss_mech_switch.c in the rpcsec_gss_krb5 implementation in the Linux kernel through 5.6.10 lacks certain domain_release calls, leading to a memory leak. Note: This was disputed with the assertion that the issue does not grant any access not already available. It is a problem that on unloading a specific kernel module some memory is leaked, but loading kernel modules is a privileged operation. A user could also write a kernel module to consume any amount of memory they like and load that replicating the effect of this bug", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12656", "url": "https://www.suse.com/security/cve/CVE-2020-12656" }, { "category": "external", "summary": "SUSE Bug 1171219 for CVE-2020-12656", "url": "https://bugzilla.suse.com/1171219" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "low" } ], "title": "CVE-2020-12656" }, { "cve": "CVE-2020-12657", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12657" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.6.5. There is a use-after-free in block/bfq-iosched.c related to bfq_idle_slice_timer_body.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12657", "url": "https://www.suse.com/security/cve/CVE-2020-12657" }, { "category": "external", "summary": "SUSE Bug 1171205 for CVE-2020-12657", "url": "https://bugzilla.suse.com/1171205" }, { "category": "external", "summary": "SUSE Bug 1201585 for CVE-2020-12657", "url": "https://bugzilla.suse.com/1201585" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "important" } ], "title": "CVE-2020-12657" }, { "cve": "CVE-2020-12659", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12659" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.6.7. xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write (by a user with the CAP_NET_ADMIN capability) because of a lack of headroom validation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12659", "url": "https://www.suse.com/security/cve/CVE-2020-12659" }, { "category": "external", "summary": "SUSE Bug 1171214 for CVE-2020-12659", "url": "https://bugzilla.suse.com/1171214" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "moderate" } ], "title": "CVE-2020-12659" }, { "cve": "CVE-2020-12769", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12769" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.4.17. drivers/spi/spi-dw.c allows attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one, aka CID-19b61392c5a8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12769", "url": "https://www.suse.com/security/cve/CVE-2020-12769" }, { "category": "external", "summary": "SUSE Bug 1171983 for CVE-2020-12769", "url": "https://bugzilla.suse.com/1171983" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "moderate" } ], "title": "CVE-2020-12769" }, { "cve": "CVE-2020-12771", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12771" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.6.11. btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12771", "url": "https://www.suse.com/security/cve/CVE-2020-12771" }, { "category": "external", "summary": "SUSE Bug 1171732 for CVE-2020-12771", "url": "https://bugzilla.suse.com/1171732" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "moderate" } ], "title": "CVE-2020-12771" }, { "cve": "CVE-2020-12888", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12888" } ], "notes": [ { "category": "general", "text": "The VFIO PCI driver in the Linux kernel through 5.6.13 mishandles attempts to access disabled memory space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12888", "url": "https://www.suse.com/security/cve/CVE-2020-12888" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1171868 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1171868" }, { "category": "external", "summary": "SUSE Bug 1176979 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1176979" }, { "category": "external", "summary": "SUSE Bug 1179612 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1179612" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "moderate" } ], "title": "CVE-2020-12888" }, { "cve": "CVE-2020-13143", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-13143" } ], "notes": [ { "category": "general", "text": "gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c in the Linux kernel 3.16 through 5.6.13 relies on kstrdup without considering the possibility of an internal \u0027\\0\u0027 value, which allows attackers to trigger an out-of-bounds read, aka CID-15753588bcd4.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-13143", "url": "https://www.suse.com/security/cve/CVE-2020-13143" }, { "category": "external", "summary": "SUSE Bug 1171982 for CVE-2020-13143", "url": "https://bugzilla.suse.com/1171982" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "moderate" } ], "title": "CVE-2020-13143" }, { "cve": "CVE-2020-13974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-13974" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel 4.4 through 5.7.1. drivers/tty/vt/keyboard.c has an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. NOTE: Members in the community argue that the integer overflow does not lead to a security issue in this case.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-13974", "url": "https://www.suse.com/security/cve/CVE-2020-13974" }, { "category": "external", "summary": "SUSE Bug 1172775 for CVE-2020-13974", "url": "https://bugzilla.suse.com/1172775" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "moderate" } ], "title": "CVE-2020-13974" }, { "cve": "CVE-2020-14416", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14416" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.4.16, a race condition in tty-\u003edisc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14416", "url": "https://www.suse.com/security/cve/CVE-2020-14416" }, { "category": "external", "summary": "SUSE Bug 1162002 for CVE-2020-14416", "url": "https://bugzilla.suse.com/1162002" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "moderate" } ], "title": "CVE-2020-14416" }, { "cve": "CVE-2020-15393", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15393" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.4 through 5.7.6, usbtest_disconnect in drivers/usb/misc/usbtest.c has a memory leak, aka CID-28ebeb8db770.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15393", "url": "https://www.suse.com/security/cve/CVE-2020-15393" }, { "category": "external", "summary": "SUSE Bug 1173514 for CVE-2020-15393", "url": "https://bugzilla.suse.com/1173514" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "moderate" } ], "title": "CVE-2020-15393" }, { "cve": "CVE-2020-15780", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15780" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15780", "url": "https://www.suse.com/security/cve/CVE-2020-15780" }, { "category": "external", "summary": "SUSE Bug 1173573 for CVE-2020-15780", "url": "https://bugzilla.suse.com/1173573" }, { "category": "external", "summary": "SUSE Bug 1174186 for CVE-2020-15780", "url": "https://bugzilla.suse.com/1174186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.13.1.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.13.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-03T10:12:56Z", "details": "important" } ], "title": "CVE-2020-15780" } ] }
suse-su-2020:2487-1
Vulnerability from csaf_suse
Published
2020-09-04 06:06
Modified
2020-09-04 06:06
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP1 RT kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-10135: Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key (bnc#1171988).
- CVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).
- CVE-2019-20908: An issue was discovered in drivers/firmware/efi/efi.c where incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032 (bnc#1173567).
- CVE-2020-10781: zram sysfs resource consumption was fixed (bnc#1173074).
- CVE-2020-15780: An issue was discovered in drivers/acpi/acpi_configfs.c where injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30 (bnc#1173573).
- CVE-2020-15393: usbtest_disconnect in drivers/usb/misc/usbtest.c had a memory leak, aka CID-28ebeb8db770 (bnc#1173514).
- CVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c had a deadlock if a coalescing operation fails (bnc#1171732).
- CVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).
- CVE-2020-10769: A buffer over-read flaw was found in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm's module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash. This flaw allowed a local attacker with user privileges to cause a denial of service (bnc#1173265).
- CVE-2020-10773: A kernel stack information leak on s390/s390x was fixed (bnc#1172999).
- CVE-2020-14416: A race condition in tty->disc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).
- CVE-2020-10766: Fixed an issue which allowed an attacker with a local account to disable SSBD protection (bnc#1172781).
- CVE-2020-10767: Fixed an issue where Indirect Branch Prediction Barrier was disabled in certain circumstances, leaving the system open to a spectre v2 style attack (bnc#1172782).
- CVE-2020-10768: Fixed an issue with the prctl() function, where indirect branch speculation could be enabled even though it was diabled before (bnc#1172783).
- CVE-2020-13974: Fixed a integer overflow in drivers/tty/vt/keyboard.c, if k_ascii is called several times in a row (bnc#1172775).
- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it.
This attack is known as Special Register Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).
- CVE-2020-13143: Fixed an out-of-bounds read in gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c (bsc#1171982).
- CVE-2020-12769: Fixed an issue which could have allowed attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one (bsc#1171983).
- CVE-2020-12659: Fixed an out-of-bounds write (by a user with the CAP_NET_ADMIN capability) due to improper headroom validation (bsc#1171214).
- CVE-2020-12657: An a use-after-free in block/bfq-iosched.c (bsc#1171205).
- CVE-2020-12656: Fixed an improper handling of certain domain_release calls leadingch could have led to a memory leak (bsc#1171219).
- CVE-2020-12655: Fixed an issue which could have allowed attackers to trigger a sync of excessive duration via an XFS v5 image with crafted metadata (bsc#1171217).
- CVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a remote AP to trigger a heap-based buffer overflow (bsc#1171202).
- CVE-2020-12653: Fixed an issue in the wifi driver which could have allowed local users to gain privileges or cause a denial of service (bsc#1171195).
- CVE-2020-12652: Fixed an issue which could have allowed local users to hold an incorrect lock during the ioctl operation and trigger a race condition (bsc#1171218).
- CVE-2020-12464: Fixed a use-after-free due to a transfer without a reference (bsc#1170901).
- CVE-2020-12114: Fixed a pivot_root race condition which could have allowed local users to cause a denial of service (panic) by corrupting a mountpoint reference counter (bsc#1171098).
- CVE-2020-11669: Fixed an issue where arch/powerpc/kernel/idle_book3s.S did not have save/restore functionality for PNV_POWERSAVE_AMR, PNV_POWERSAVE_UAMOR, and PNV_POWERSAVE_AMOR (bnc#1169390).
- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172317).
- CVE-2020-10751: Fixed an improper implementation in SELinux LSM hook where it was assumed that an skb would only contain a single netlink message (bsc#1171189).
- CVE-2020-10732: Fixed kernel data leak in userspace coredumps due to uninitialized data (bsc#1171220).
- CVE-2020-10720: Fixed a use-after-free read in napi_gro_frags() (bsc#1170778).
- CVE-2020-10711: Fixed a null pointer dereference in SELinux subsystem which could have allowed a remote network user to crash the kernel resulting in a denial of service (bsc#1171191).
- CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev (bsc#1170056).
- CVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a video driver. This could lead to local information disclosure with System execution privileges needed (bsc#1170345).
- CVE-2019-20812: Fixed an issue in prb_calc_retire_blk_tmo() which could have resulted in a denial of service (bsc#1172453).
- CVE-2019-20806: Fixed a null pointer dereference which may had lead to denial of service (bsc#1172199).
- CVE-2019-19462: Fixed an issue which could have allowed local user to cause denial of service (bsc#1158265).
- CVE-2019-20810: go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c did not call snd_card_free for a failure path, which caused a memory leak, aka CID-9453264ef586 (bnc#1172458).
- CVE-2018-1000199: Fixed a potential local code execution via ptrace (bsc#1089895).
The following non-security bugs were fixed:
- ACPI: CPPC: Fix reference count leak in acpi_cppc_processor_probe() (bsc#1051510).
- ACPI: GED: add support for _Exx / _Lxx handler methods (bsc#1111666).
- ACPI: GED: use correct trigger type field in _Exx / _Lxx handling (bsc#1111666).
- ACPI: NFIT: Fix unlock on error in scrub_show() (bsc#1171753).
- ACPI: PM: Avoid using power resources if there are none for D0 (bsc#1051510).
- ACPI: sysfs: Fix pm_profile_attr type (bsc#1111666).
- ACPI: sysfs: Fix reference count leak in acpi_sysfs_add_hotplug_profile() (bsc#1051510).
- ACPI: video: Use native backlight on Acer Aspire 5783z (bsc#1111666).
- ACPI: video: Use native backlight on Acer TravelMate 5735Z (bsc#1111666).
- acpi/x86: ignore unspecified bit positions in the ACPI global lock field (bsc#1051510).
- Add br_netfilter to kernel-default-base (bsc#1169020)
- Add commit for git-fix that's not a fix This commit cleans up debug code but does not fix anything, and it relies on a new kernel function that isn't yet in this version of SLE.
- agp/intel: Reinforce the barrier after GTT updates (bsc#1051510).
- ALSA: ctxfi: Remove unnecessary cast in kfree (bsc#1051510).
- ALSA: doc: Document PC Beep Hidden Register on Realtek ALC256 (bsc#1051510).
- ALSA: dummy: Fix PCM format loop in proc output (bsc#1111666).
- ALSA: es1688: Add the missed snd_card_free() (bsc#1051510).
- ALSA: hda: Add driver blacklist (bsc#1051510).
- ALSA: hda: Add ElkhartLake HDMI codec vid (bsc#1111666).
- ALSA: hda: add sienna_cichlid audio asic id for sienna_cichlid up (bsc#1111666).
- ALSA: hda: Always use jackpoll helper for jack update after resume (bsc#1051510).
- ALSA: hda: call runtime_allow() for all hda controllers (bsc#1051510).
- ALSA: hda: Do not release card at firmware loading error (bsc#1051510).
- ALSA: hda: Explicitly permit using autosuspend if runtime PM is supported (bsc#1051510).
- ALSA: hda: Fix potential access overflow in beep helper (bsc#1051510).
- ALSA: hda/hdmi - enable runtime pm for newer AMD display audio (bsc#1111666).
- ALSA: hda/hdmi: fix race in monitor detection during probe (bsc#1051510).
- ALSA: hda/hdmi: fix without unlocked before return (bsc#1051510).
- ALSA: hda: Honor PM disablement in PM freeze and thaw_noirq ops (bsc#1051510).
- ALSA: hda: Keep the controller initialization even if no codecs found (bsc#1051510).
- ALSA: hda - let hs_mic be picked ahead of hp_mic (bsc#1111666).
- ALSA: hda: Match both PCI ID and SSID for driver blacklist (bsc#1111666).
- ALSA: hda/realtek - Add a model for Thinkpad T570 without DAC workaround (bsc#1172017).
- ALSA: hda/realtek - add a pintbl quirk for several Lenovo machines (bsc#1111666).
- ALSA: hda/realtek - Add COEF workaround for ASUS ZenBook UX431DA (git-fixes).
- ALSA: hda/realtek - Add HP new mute led supported for ALC236 (git-fixes).
- ALSA: hda/realtek - Add LED class support for micmute LED (bsc#1111666).
- ALSA: hda/realtek - Add more fixup entries for Clevo machines (git-fixes).
- ALSA: hda/realtek - Add new codec supported for ALC245 (bsc#1051510).
- ALSA: hda/realtek - Add new codec supported for ALC287 (git-fixes).
- ALSA: hda/realtek: Add quirk for Samsung Notebook (git-fixes).
- ALSA: hda/realtek - Add supported new mute Led for HP (git-fixes).
- ALSA: hda/realtek - Enable headset mic of ASUS GL503VM with ALC295 (git-fixes).
- ALSA: hda/realtek - Enable headset mic of ASUS UX550GE with ALC295 (git-fixes).
- ALSA: hda/realtek: Enable headset mic of ASUS UX581LV with ALC295 (git-fixes).
- ALSA: hda/realtek - Enable micmute LED on and HP system (bsc#1111666).
- ALSA: hda/realtek - Enable Speaker for ASUS UX533 and UX534 (bsc#1111666).
- ALSA: hda/realtek - Enable the headset mic on Asus FX505DT (bsc#1051510).
- ALSA: hda/realtek - Fix S3 pop noise on Dell Wyse (git-fixes).
- ALSA: hda/realtek - Fix silent output on Gigabyte X570 Aorus Xtreme (bsc#1111666).
- ALSA: hda/realtek - Fix unexpected init_amp override (bsc#1051510).
- ALSA: hda/realtek - Fix unused variable warning w/o CONFIG_LEDS_TRIGGER_AUDIO (bsc#1111666).
- ALSA: hda/realtek - Introduce polarity for micmute LED GPIO (bsc#1111666).
- ALSA: hda/realtek - Limit int mic boost for Thinkpad T530 (git-fixes bsc#1171293).
- ALSA: hda/realtek - Two front mics on a Lenovo ThinkCenter (bsc#1051510).
- ALSA: hda: Release resources at error in delayed probe (bsc#1051510).
- ALSA: hda: Remove ASUS ROG Zenith from the blacklist (bsc#1051510).
- ALSA: hda: Skip controller resume if not needed (bsc#1051510).
- ALSA: hwdep: fix a left shifting 1 by 31 UB bug (git-fixes).
- ALSA: ice1724: Fix invalid access for enumerated ctl items (bsc#1051510).
- ALSA: iec1712: Initialize STDSP24 properly when using the model=staudio option (git-fixes).
- ALSA: lx6464es - add support for LX6464ESe pci express variant (bsc#1111666).
- ALSA: opl3: fix infoleak in opl3 (bsc#1111666).
- ALSA: opti9xx: shut up gcc-10 range warning (bsc#1051510).
- ALSA: pcm: disallow linking stream to itself (bsc#1111666).
- ALSA: pcm: fix incorrect hw_base increase (git-fixes).
- ALSA: pcm: oss: Fix regression by buffer overflow fix (bsc#1051510).
- ALSA: pcm: oss: Place the plugin buffer overflow checks correctly (bsc#1170522).
- ALSA: rawmidi: Fix racy buffer resize under concurrent accesses (git-fixes).
- ALSA: usb-audio: Add connector notifier delegation (bsc#1051510).
- ALSA: usb-audio: Add control message quirk delay for Kingston HyperX headset (git-fixes).
- ALSA: usb-audio: Add duplex sound support for USB devices using implicit feedback (bsc#1111666).
- ALSA: usb-audio: add mapping for ASRock TRX40 Creator (git-fixes).
- ALSA: usb-audio: Add mixer workaround for TRX40 and co (bsc#1051510).
- ALSA: usb-audio: Add Pioneer DJ DJM-900NXS2 support (bsc#1111666).
- ALSA: usb-audio: Add quirk for Focusrite Scarlett 2i2 (bsc#1051510).
- ALSA: usb-audio: add quirk for MacroSilicon MS2109 (bsc#1111666).
- ALSA: usb-audio: Add static mapping table for ALC1220-VB-based mobos (bsc#1051510).
- ALSA: usb-audio: Add vendor, product and profile name for HP Thunderbolt Dock (bsc#1111666).
- ALSA: usb-audio: Apply async workaround for Scarlett 2i4 2nd gen (bsc#1051510).
- ALSA: usb-audio: Check mapping at creating connector controls, too (bsc#1051510).
- ALSA: usb-audio: Clean up quirk entries with macros (bsc#1111666).
- ALSA: usb-audio: Correct a typo of NuPrime DAC-10 USB ID (bsc#1051510).
- ALSA: usb-audio: Do not create jack controls for PCM terminals (bsc#1051510).
- ALSA: usb-audio: Do not override ignore_ctl_error value from the map (bsc#1051510).
- ALSA: usb-audio: Filter error from connector kctl ops, too (bsc#1051510).
- ALSA: usb-audio: Fix inconsistent card PM state after resume (bsc#1111666).
- ALSA: usb-audio: Fix packet size calculation (bsc#1111666).
- ALSA: usb-audio: Fix racy list management in output queue (bsc#1111666).
- ALSA: usb-audio: Fix usb audio refcnt leak when getting spdif (bsc#1051510).
- ALSA: usb-audio: Improve frames size computation (bsc#1111666).
- ALSA: usb-audio: Manage auto-pm of all bundled interfaces (bsc#1111666).
- ALSA: usb-audio: mixer: volume quirk for ESS Technology Asus USB DAC (git-fixes).
- ALSA: usb-audio: Quirks for Gigabyte TRX40 Aorus Master onboard audio (git-fixes).
- ALSA: usb-audio: Use the new macro for HP Dock rename quirks (bsc#1111666).
- ALSA: usx2y: Fix potential NULL dereference (bsc#1051510).
- amdgpu: a NULL ->mm does not mean a thread is a kthread (git-fixes).
- arm64: map FDT as RW for early_init_dt_scan() (jsc#SLE-12423).
- ASoC: codecs: hdac_hdmi: Fix incorrect use of list_for_each_entry (bsc#1051510).
- ASoC: dapm: connect virtual mux with default value (bsc#1051510).
- ASoC: dapm: fixup dapm kcontrol widget (bsc#1051510).
- ASoC: dpcm: allow start or stop during pause for backend (bsc#1051510).
- ASoC: fix regwmask (bsc#1051510).
- ASoC: Intel: atom: Take the drv->lock mutex before calling sst_send_slot_map() (bsc#1051510).
- ASoC: msm8916-wcd-digital: Reset RX interpolation path after use (bsc#1051510).
- ASoC: samsung: Prevent clk_get_rate() calls in atomic context (bsc#1111666).
- ASoC: topology: Check return value of pcm_new_ver (bsc#1051510).
- ASoC: topology: use name_prefix for new kcontrol (bsc#1051510).
- ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb (bsc#1111666).
- ath9k: Fix use-after-free Read in ath9k_wmi_ctrl_rx (bsc#1111666).
- ath9k: Fix use-after-free Write in ath9k_htc_rx_msg (bsc#1111666).
- ath9x: Fix stack-out-of-bounds Write in ath9k_hif_usb_rx_cb (bsc#1111666).
- ax25: fix setsockopt(SO_BINDTODEVICE) (networking-stable-20_05_27).
- b43: Fix connection problem with WPA3 (bsc#1111666).
- b43legacy: Fix case where channel status is corrupted (bsc#1051510).
- b43_legacy: Fix connection problem with WPA3 (bsc#1111666).
- batman-adv: Avoid spurious warnings from bat_v neigh_cmp implementation (bsc#1051510).
- batman-adv: Do not schedule OGM for disabled interface (bsc#1051510).
- batman-adv: fix batadv_nc_random_weight_tq (git-fixes).
- batman-adv: Fix refcnt leak in batadv_show_throughput_override (git-fixes).
- batman-adv: Fix refcnt leak in batadv_store_throughput_override (git-fixes).
- batman-adv: Fix refcnt leak in batadv_v_ogm_process (git-fixes).
- batman-adv: prevent TT request storms by not sending inconsistent TT TLVLs (bsc#1051510).
- bcache: avoid unnecessary btree nodes flushing in btree_flush_write() (git fixes (block drivers)).
- bcache: Fix an error code in bch_dump_read() (git fixes (block drivers)).
- bcache: fix incorrect data type usage in btree_flush_write() (git fixes (block drivers)).
- bcache: Revert 'bcache: shrink btree node cache after bch_btree_check()' (git fixes (block drivers)).
- be2net: fix link failure after ethtool offline test (git-fixes).
- blk-mq: honor IO scheduler for multiqueue devices (bsc#1165478).
- blk-mq: simplify blk_mq_make_request() (bsc#1165478).
- block, bfq: fix use-after-free in bfq_idle_slice_timer_body (bsc#1168760).
- block/drbd: delete invalid function drbd_md_mark_dirty_ (bsc#1171527).
- block: drbd: remove a stray unlock in __drbd_send_protocol() (bsc#1171599).
- block: fix busy device checking in blk_drop_partitions again (bsc#1171948).
- block: fix busy device checking in blk_drop_partitions (bsc#1171948).
- block: fix memleak of bio integrity data (git fixes (block drivers)).
- block: keep bdi->io_pages in sync with max_sectors_kb for stacked devices (bsc#1168762).
- block: nr_sects_write(): Disable preemption on seqcount write (bsc#1173818).
- block: remove QUEUE_FLAG_STACKABLE (git fixes (block drivers)).
- block: remove the bd_openers checks in blk_drop_partitions (bsc#1171948).
- block: sed-opal: fix sparse warning: convert __be64 data (git fixes (block drivers)).
- Bluetooth: Add SCO fallback for invalid LMP parameters error (bsc#1111666).
- Bluetooth: RFCOMM: fix ODEBUG bug in rfcomm_dev_ioctl (bsc#1051510).
- bnxt_en: Fix AER reset logic on 57500 chips (git-fixes).
- bnxt_en: Fix ethtool selftest crash under error conditions (git-fixes).
- bnxt_en: Fix handling FRAG_ERR when NVM_INSTALL_UPDATE cmd fails (git-fixes).
- bnxt_en: Fix ipv6 RFS filter matching logic (git-fixes).
- bnxt_en: fix memory leaks in bnxt_dcbnl_ieee_getets() (networking-stable-20_03_28).
- bnxt_en: fix NULL dereference in case SR-IOV configuration fails (git-fixes).
- bnxt_en: Fix VF anti-spoof filter setup (networking-stable-20_05_12).
- bnxt_en: Fix VLAN acceleration handling in bnxt_fix_features() (networking-stable-20_05_12).
- bnxt_en: Improve AER slot reset (networking-stable-20_05_12).
- bnxt_en: Reduce BNXT_MSIX_VEC_MAX value to supported CQs per PF (bsc#1104745).
- bnxt_en: reinitialize IRQs when MTU is modified (networking-stable-20_03_14).
- bnxt_en: Return error if bnxt_alloc_ctx_mem() fails (bsc#1104745 ).
- bnxt_en: Return error when allocating zero size context memory (bsc#1104745).
- bonding/alb: make sure arp header is pulled before accessing it (networking-stable-20_03_14).
- bpf: Fix sk_psock refcnt leak when receiving message (bsc#1083647).
- bpf: Forbid XADD on spilled pointers for unprivileged users (bsc#1083647).
- brcmfmac: abort and release host after error (bsc#1051510).
- brcmfmac: fix wrong location to get firmware feature (bsc#1111666).
- brcmfmac: Transform compatible string for FW loading (bsc#1169771).
- btrfs: add assertions for tree == inode->io_tree to extent IO helpers (bsc#1174438).
- btrfs: add new helper btrfs_lock_and_flush_ordered_range (bsc#1174438).
- btrfs: Always use a cached extent_state in btrfs_lock_and_flush_ordered_range (bsc#1174438).
- btrfs: do not zero f_bavail if we have available space (bsc#1168081).
- btrfs: do not zero f_bavail if we have available space (bsc#1168081).
- btrfs: drop argument tree from btrfs_lock_and_flush_ordered_range (bsc#1174438).
- Btrfs: fix deadlock with memory reclaim during scrub (bsc#1172127).
- btrfs: fix extent_state leak in btrfs_lock_and_flush_ordered_range (bsc#1174438).
- btrfs: fix failure of RWF_NOWAIT write into prealloc extent beyond eof (bsc#1174438).
- btrfs: fix hang on snapshot creation after RWF_NOWAIT write (bsc#1174438).
- btrfs: fix log context list corruption after rename whiteout error (bsc#1172342).
- btrfs: fix partial loss of prealloc extent past i_size after fsync (bsc#1172343).
- btrfs: fix RWF_NOWAIT write not failling when we need to cow (bsc#1174438).
- btrfs: fix RWF_NOWAIT writes blocking on extent locks and waiting for IO (bsc#1174438).
- btrfs: qgroup: Fix a bug that prevents qgroup to be re-enabled after disable (bsc#1172247).
- btrfs: relocation: add error injection points for cancelling balance (bsc#1171417).
- btrfs: relocation: Check cancel request after each data page read (bsc#1171417).
- btrfs: relocation: Check cancel request after each extent found (bsc#1171417).
- btrfs: relocation: Clear the DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417).
- btrfs: relocation: Fix reloc root leakage and the NULL pointer reference caused by the leakage (bsc#1171417).
- btrfs: relocation: Work around dead relocation stage loop (bsc#1171417).
- btrfs: reloc: clear DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417 bsc#1160947 bsc#1172366).
- btrfs: reloc: fix reloc root leak and NULL pointer dereference (bsc#1171417 bsc#1160947 bsc#1172366).
- btrfs: Return EAGAIN if we can't start no snpashot write in check_can_nocow (bsc#1174438).
- Btrfs: setup a nofs context for memory allocation at btrfs_create_tree() (bsc#1172127).
- Btrfs: setup a nofs context for memory allocation at __btrfs_set_acl (bsc#1172127).
- btrfs: use correct count in btrfs_file_write_iter() (bsc#1174438).
- btrfs: Use newly introduced btrfs_lock_and_flush_ordered_range (bsc#1174438).
- Btrfs: use nofs context when initializing security xattrs to avoid deadlock (bsc#1172127).
- btrfs: volumes: Remove ENOSPC-prone btrfs_can_relocate() (bsc#1171124).
- bus: sunxi-rsb: Return correct data when mixing 16-bit and 8-bit reads (bsc#1111666).
- can: add missing attribute validation for termination (networking-stable-20_03_14).
- carl9170: remove P2P_GO support (bsc#1111666).
- cdc-acm: close race betrween suspend() and acm_softint (git-fixes).
- CDC-ACM: heed quirk also in error handling (git-fixes).
- cdc-acm: introduce a cool down (git-fixes).
- ceph: check if file lock exists before sending unlock request (bsc#1168789).
- ceph: convert mdsc->cap_dirty to a per-session list (bsc#1167104).
- ceph: demote quotarealm lookup warning to a debug message (bsc#1171692).
- ceph: fix double unlock in handle_cap_export() (bsc#1171694).
- ceph: fix endianness bug when handling MDS session feature bits (bsc#1171695).
- ceph: request expedited service on session's last cap flush (bsc#1167104).
- cgroup, blkcg: Prepare some symbols for module and !CONFIG_CGROUP usages (bsc#1173857).
- cgroup, netclassid: periodically release file_lock on classid updating (networking-stable-20_03_14).
- char/random: Add a newline at the end of the file (jsc#SLE-12423).
- CIFS: Allocate crypto structures on the fly for calculating signatures of incoming packets (bsc#1144333).
- CIFS: Allocate encryption header through kmalloc (bsc#1144333).
- CIFS: allow unlock flock and OFD lock across fork (bsc#1144333).
- CIFS: check new file size when extending file by fallocate (bsc#1144333).
- CIFS: cifspdu.h: Replace zero-length array with flexible-array member (bsc#1144333).
- CIFS: clear PF_MEMALLOC before exiting demultiplex thread (bsc#1144333).
- CIFS: do not share tcons with DFS (bsc#1144333).
- CIFS: dump the session id and keys also for SMB2 sessions (bsc#1144333).
- CIFS: ensure correct super block for DFS reconnect (bsc#1144333).
- CIFS: Fix bug which the return value by asynchronous read is error (bsc#1144333).
- CIFS: fix uninitialised lease_key in open_shroot() (bsc#1144333).
- cifs: get rid of unused parameter in reconn_setup_dfs_targets() (bsc#1144333).
- cifs: handle hostnames that resolve to same ip in failover (bsc#1144333 bsc#1161016).
- CIFS: ignore cached share root handle closing errors (bsc#1166780).
- CIFS: improve read performance for page size 64KB & cache=strict & vers=2.1+ (bsc#1144333).
- CIFS: Increment num_remote_opens stats counter even in case of smb2_query_dir_first (bsc#1144333).
- CIFS: minor update to comments around the cifs_tcp_ses_lock mutex (bsc#1144333).
- CIFS: protect updating server->dstaddr with a spinlock (bsc#1144333).
- cifs: set up next DFS target before generic_ip_connect() (bsc#1144333 bsc#1161016).
- CIFS: smb2pdu.h: Replace zero-length array with flexible-array member (bsc#1144333).
- CIFS: smbd: Calculate the correct maximum packet size for segmented SMBDirect send/receive (bsc#1144333).
- CIFS: smbd: Check and extend sender credits in interrupt context (bsc#1144333).
- CIFS: smbd: Check send queue size before posting a send (bsc#1144333).
- CIFS: smbd: Do not schedule work to send immediate packet on every receive (bsc#1144333).
- CIFS: smbd: Merge code to track pending packets (bsc#1144333).
- CIFS: smbd: Properly process errors on ib_post_send (bsc#1144333).
- CIFS: smbd: Update receive credits before sending and deal with credits roll back on failure before sending (bsc#1144333).
- CIFS: Warn less noisily on default mount (bsc#1144333).
- clk: Add clk_hw_unregister_composite helper function definition (bsc#1051510).
- clk: bcm2835: Fix return type of bcm2835_register_gate (bsc#1051510).
- clk: clk-flexgen: fix clock-critical handling (bsc#1051510).
- clk: imx6ull: use OSC clock during AXI rate change (bsc#1051510).
- clk: imx: make mux parent strings const (bsc#1051510).
- clk: mediatek: correct the clocks for MT2701 HDMI PHY module (bsc#1051510).
- clk: qcom: rcg: Return failure for RCG update (bsc#1051510).
- clk: sunxi: Fix incorrect usage of round_down() (bsc#1051510).
- clk: sunxi-ng: a64: Fix gate bit of DSI DPHY (bsc#1051510).
- clocksource/drivers/hyper-v: Set TSC clocksource as default w/ InvariantTSC (bsc#1170620, bsc#1170621).
- clocksource: dw_apb_timer: Make CPU-affiliation being optional (bsc#1111666).
- clocksource: dw_apb_timer_of: Fix missing clockevent timers (bsc#1051510).
- compat_ioctl: block: handle BLKREPORTZONE/BLKRESETZONE (git fixes (block drivers)).
- compat_ioctl: block: handle Persistent Reservations (git fixes (block drivers)).
- component: Silence bind error on -EPROBE_DEFER (bsc#1051510).
- config: Enable CONFIG_RCU_BOOST
- configfs: Fix bool initialization/comparison (bsc#1051510).
- copy_{to,from}_user(): consolidate object size checks (git fixes).
- coresight: do not use the BIT() macro in the UAPI header (git fixes (block drivers)).
- cpufreq: Register drivers only after CPU devices have been registered (bsc#1051510).
- cpufreq: s3c64xx: Remove pointless NULL check in s3c64xx_cpufreq_driver_init (bsc#1051510).
- cpuidle: Do not unset the driver if it is there already (bsc#1051510).
- crypto: algboss - do not wait during notifier callback (bsc#1111666).
- crypto: algif_skcipher - Cap recv SG list at ctx->used (bsc#1111666).
- crypto: arm64/sha-ce - implement export/import (bsc#1051510).
- crypto: caam - update xts sector size for large input length (bsc#1111666).
- crypto: cavium/nitrox - Fix 'nitrox_get_first_device()' when ndevlist is fully iterated (bsc#1111666).
- crypto: cavium/nitrox - Fix 'nitrox_get_first_device()' when ndevlist is fully iterated (git-fixes).
- crypto: ccp - AES CFB mode is a stream cipher (git-fixes).
- crypto: ccp - Clean up and exit correctly on allocation failure (git-fixes).
- crypto: ccp - Cleanup misc_dev on sev_exit() (bsc#1114279).
- crypto: ccp - Cleanup sp_dev_master in psp_dev_destroy() (bsc#1114279).
- Crypto/chcr: fix for ccm(aes) failed test (bsc#1111666).
- crypto: chelsio/chtls: properly set tp->lsndtime (bsc#1111666).
- crypto: mxs-dcp - fix scatterlist linearization for hash (bsc#1051510).
- crypto: talitos - fix IPsec cipher in length (git-fixes).
- crypto: talitos - reorder code in talitos_edesc_alloc() (git-fixes).
- crypto: tcrypt - fix printed skcipher [a]sync mode (bsc#1051510).
- cxgb4: fix MPS index overwrite when setting MAC address (bsc#1127355).
- cxgb4: fix Txq restart check during backpressure (bsc#1127354 bsc#1127371).
- debugfs: Add debugfs_create_xul() for hexadecimal unsigned long (git-fixes).
- debugfs: Check module state before warning in {full/open}_proxy_open() (bsc#1173746).
- debugfs_lookup(): switch to lookup_one_len_unlocked() (bsc#1171979).
- Deprecate NR_UNSTABLE_NFS, use NR_WRITEBACK (bsc#1163403).
- devinet: fix memleak in inetdev_init() (networking-stable-20_06_07).
- devlink: fix return value after hitting end in region read (bsc#1109837).
- devlink: validate length of param values (bsc#1109837).
- devlink: validate length of region addr/len (bsc#1109837).
- /dev/mem: Add missing memory barriers for devmem_inode (git-fixes).
- /dev/mem: Revoke mappings when a driver claims the region (git-fixes).
- dmaengine: dmatest: Fix iteration non-stop logic (bsc#1051510).
- dmaengine: ste_dma40: fix unneeded variable warning (bsc#1051510).
- dmaengine: tegra210-adma: Fix an error handling path in 'tegra_adma_probe()' (bsc#1111666).
- dm btree: increase rebalance threshold in __rebalance2() (git fixes (block drivers)).
- dm cache: fix a crash due to incorrect work item cancelling (git fixes (block drivers)).
- dm crypt: fix benbi IV constructor crash if used in authenticated mode (git fixes (block drivers)).
- dm: fix potential for q->make_request_fn NULL pointer (git fixes (block drivers)).
- dm mpath: switch paths in dm_blk_ioctl() code path (bsc#1167574).
- dm-raid1: fix invalid return value from dm_mirror (bsc#1172378).
- dm space map common: fix to ensure new block isn't already in use (git fixes (block drivers)).
- dm: various cleanups to md->queue initialization code (git fixes).
- dm verity fec: fix hash block number in verity_fec_decode (git fixes (block drivers)).
- dm verity fec: fix memory leak in verity_fec_dtr (git fixes (block drivers)).
- dm writecache: fix data corruption when reloading the target (git fixes (block drivers)).
- dm writecache: fix incorrect flush sequence when doing SSD mode commit (git fixes (block drivers)).
- dm writecache: verify watermark during resume (git fixes (block drivers)).
- dm zoned: fix invalid memory access (git fixes (block drivers)).
- dm zoned: reduce overhead of backing device checks (git fixes (block drivers)).
- dm zoned: remove duplicate nr_rnd_zones increase in dmz_init_zone() (git fixes (block drivers)).
- dm zoned: support zone sizes smaller than 128MiB (git fixes (block drivers)).
- dp83640: reverse arguments to list_add_tail (git-fixes).
- dpaa_eth: fix usage as DSA master, try 3 (networking-stable-20_05_27).
- driver-core, libnvdimm: Let device subsystems add local lockdep coverage (bsc#1171753).
- drivers: hv: Add a module description line to the hv_vmbus driver (bsc#1172249, bsc#1172251).
- Drivers: hv: Change flag to write log level in panic msg to false (bsc#1170617, bsc#1170618).
- drivers/net/ibmvnic: Update VNIC protocol version reporting (bsc#1065729).
- drivers: soc: ti: knav_qmss_queue: Make knav_gp_range_ops static (bsc#1051510).
- drivers: w1: add hwmon support structures (jsc#SLE-11048).
- drivers: w1: add hwmon temp support for w1_therm (jsc#SLE-11048).
- drivers: w1: refactor w1_slave_show to make the temp reading functionality separate (jsc#SLE-11048).
- drm: amd/acp: fix broken menu structure (bsc#1114279) * context changes
- drm: amd/display: fix Kconfig help text (bsc#1113956) * only fix DEBUG_KERNEL_DC
- drm/amdgpu: Correctly initialize thermal controller for GPUs with Powerplay table v0 (e.g Hawaii) (bsc#1111666).
- drm/amdgpu: Fix oops when pp_funcs is unset in ACPI event (bsc#1111666).
- drm/amd/powerplay: force the trim of the mclk dpm_levels if OD is (bsc#1113956)
- drm/atomic: Take the atomic toys away from X (bsc#1112178) * context changes
- drm/bochs: downgrade pci_request_region failure from error to warning (bsc#1051510).
- drm: bridge: adv7511: Extend list of audio sample rates (bsc#1111666).
- drm/crc: Actually allow to change the crc source (bsc#1114279) * offset changes
- drm/dp_mst: Fix clearing payload state on topology disable (bsc#1051510).
- drm/dp_mst: Increase ACT retry timeout to 3s (bsc#1113956) * context changes
- drm/dp_mst: Reformat drm_dp_check_act_status() a bit (bsc#1051510).
- drm_dp_mst_topology: fix broken drm_dp_sideband_parse_remote_dpcd_read() (bsc#1051510).
- drm/drm_dp_mst:remove set but not used variable 'origlen' (bsc#1051510).
- drm/edid: Fix off-by-one in DispID DTD pixel clock (bsc#1114279)
- drm: encoder_slave: fix refcouting error for modules (bsc#1111666).
- drm: encoder_slave: fix refcouting error for modules (bsc#1114279)
- drm/etnaviv: fix perfmon domain interation (bsc#1113956)
- drm/etnaviv: rework perfmon query infrastructure (bsc#1112178)
- drm/i915: Apply Wa_1406680159:icl,ehl as an engine workaround (bsc#1112178) * rename gt/intel_workarounds.c to intel_workarounds.c * context changes
- drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of (bsc#1114279)
- drm/i915: HDCP: fix Ri prime check done during link check (bsc#1112178) * rename display/intel_hdmi.c to intel_hdmi.c * context changes
- drm/i915/icl+: Fix hotplug interrupt disabling after storm detection (bsc#1112178)
- drm/i915: properly sanity check batch_start_offset (bsc#1114279) * renamed display/intel_fbc.c -> intel_fb.c * renamed gt/intel_rc6.c -> intel_pm.c * context changes
- drm/i915: Whitelist context-local timestamp in the gen9 cmdparser (bsc#1111666).
- drm/mediatek: Check plane visibility in atomic_update (bsc#1113956) * context changes
- drm/meson: Delete an error message in meson_dw_hdmi_bind() (bsc#1051510).
- drm/msm/dpu: fix error return code in dpu_encoder_init (bsc#1111666).
- drm/msm: stop abusing dma_map/unmap for cache (bsc#1051510).
- drm/msm: Use the correct dma_sync calls harder (bsc#1051510).
- drm/msm: Use the correct dma_sync calls in msm_gem (bsc#1051510).
- drm: NULL pointer dereference [null-pointer-deref] (CWE 476) problem (bsc#1114279)
- drm: panel-orientation-quirks: Add quirk for Asus T101HA panel (bsc#1111666).
- drm: panel-orientation-quirks: Use generic orientation-data for Acer S1003 (bsc#1111666).
- drm/qxl: qxl_release leak in qxl_draw_dirty_fb() (bsc#1051510).
- drm/qxl: qxl_release leak in qxl_hw_surface_alloc() (bsc#1051510).
- drm/qxl: qxl_release use after free (bsc#1051510).
- drm/qxl: Use correct notify port address when creating cursor ring (bsc#1113956)
- drm/radeon: fix double free (bsc#1113956)
- drm/radeon: fix fb_div check in ni_init_smc_spll_table() (bsc#1113956)
- drm: Remove PageReserved manipulation from drm_pci_alloc (bsc#1114279) * offset changes
- drm/sun4i: dsi: Allow binding the host without a panel (bsc#1113956)
- drm/sun4i: dsi: Avoid hotplug race with DRM driver bind (bsc#1113956)
- drm/sun4i: dsi: Remove incorrect use of runtime PM (bsc#1113956) * context changes
- drm/sun4i: dsi: Remove unused drv from driver context (bsc#1113956) * context changes * keep include of sun4i_drv.h
- drm/sun4i: hdmi ddc clk: Fix size of m divider (bsc#1111666).
- drm/tegra: hub: Do not enable orphaned window group (bsc#1111666).
- drm/vkms: Hold gem object while still in-use (bsc#1113956) * context changes
- dump_stack: avoid the livelock of the dump_lock (git fixes (block drivers)).
- e1000: Distribute switch variables for initialization (bsc#1111666).
- e1000e: Disable TSO for buffer overrun workaround (bsc#1051510).
- e1000e: Do not wake up the system via WOL if device wakeup is disabled (bsc#1051510).
- e1000e: Relax condition to trigger reset for ME workaround (bsc#1111666).
- EDAC/amd64: Read back the scrub rate PCI register on F15h (bsc#1114279).
- EDAC, sb_edac: Add support for systems with segmented PCI buses (bsc#1169525).
- efi/random: Increase size of firmware supplied randomness (jsc#SLE-12423).
- efi/random: Treat EFI_RNG_PROTOCOL output as bootloader randomness (jsc#SLE-12423).
- efi: READ_ONCE rng seed size before munmap (jsc#SLE-12423).
- efi: Reorder pr_notice() with add_device_randomness() call (jsc#SLE-12423).
- evm: Check also if *tfm is an error pointer in init_desc() (bsc#1051510).
- evm: Fix a small race in init_desc() (bsc#1051510).
- ext4: add cond_resched() to __ext4_find_entry() (bsc#1166862).
- ext4: Check for non-zero journal inum in ext4_calculate_overhead (bsc#1167288).
- ext4: do not assume that mmp_nodename/bdevname have NUL (bsc#1166860).
- ext4: do not zeroout extents beyond i_disksize (bsc#1167851).
- ext4: fix a data race at inode->i_blocks (bsc#1171835).
- ext4: fix a data race in EXT4_I(inode)->i_disksize (bsc#1166861).
- ext4: fix extent_status fragmentation for plain files (bsc#1171949).
- ext4: fix incorrect group count in ext4_fill_super error message (bsc#1168765).
- ext4: fix incorrect inodes per group in error message (bsc#1168764).
- ext4: fix partial cluster initialization when splitting extent (bsc#1173839).
- ext4: fix potential race between online resizing and write operations (bsc#1166864).
- ext4: fix potential race between s_flex_groups online resizing and access (bsc#1166867).
- ext4: fix potential race between s_group_info online resizing and access (bsc#1166866).
- ext4: fix race between ext4_sync_parent() and rename() (bsc#1173838).
- ext4: fix race between writepages and enabling EXT4_EXTENTS_FL (bsc#1166870).
- ext4: fix support for inode sizes > 1024 bytes (bsc#1164284).
- ext4, jbd2: ensure panic by fix a race between jbd2 abort and ext4 error handlers (bsc#1173833).
- ext4: potential crash on allocation error in ext4_alloc_flex_bg_array() (bsc#1166940).
- ext4: rename s_journal_flag_rwsem to s_writepages_rwsem (bsc#1166868).
- ext4: use non-movable memory for superblock readahead (bsc#1171952).
- ext4: validate the debug_want_extra_isize mount option at parse time (bsc#1163897).
- extcon: adc-jack: Fix an error handling path in 'adc_jack_probe()' (bsc#1051510).
- fanotify: fix ignore mask logic for events on child and on dir (bsc#1172719).
- fanotify: fix merging marks masks with FAN_ONDIR (bsc#1171679).
- fat: fix uninit-memory access for partial initialized inode (bsc#1051510).
- fat: work around race with userspace's read via blockdev while mounting (bsc#1051510).
- fbcon: fix null-ptr-deref in fbcon_switch (bsc#1114279) * rename drivers/video/fbdev/core to drivers/video/console * context changes
- fbdev: potential information leak in do_fb_ioctl() (bsc#1114279)
- fbmem: Adjust indentation in fb_prepare_logo and fb_blank (bsc#1114279)
- fdt: add support for rng-seed (jsc#SLE-12423).
- fdt: Update CRC check for rng-seed (jsc#SLE-12423).
- fib: add missing attribute validation for tun_id (networking-stable-20_03_14).
- firmware: imx: scu: Fix corruption of header (git-fixes).
- firmware: imx: scu: Fix possible memory leak in imx_scu_probe() (bsc#1111666).
- firmware: qcom: scm: fix compilation error when disabled (bsc#1051510).
- Fix boot crash with MD (bsc#1174343)
- fix multiplication overflow in copy_fdtable() (bsc#1173825).
- fpga: dfl: afu: Corrected error handling levels (git-fixes).
- fq_codel: fix TCA_FQ_CODEL_DROP_BATCH_SIZE sanity checks (networking-stable-20_05_12).
- fs/cifs: fix gcc warning in sid_to_id (bsc#1144333).
- fs/seq_file.c: simplify seq_file iteration code and interface (bsc#1170125).
- gpiolib: Document that GPIO line names are not globally unique (bsc#1051510).
- gpio: tegra: mask GPIO IRQs during IRQ shutdown (bsc#1051510).
- gpu: host1x: Detach driver on unregister (bsc#1111666).
- gpu: ipu-v3: pre: do not trigger update if buffer address does not change (bsc#1111666).
- gre: fix uninit-value in __iptunnel_pull_header (networking-stable-20_03_14).
- HID: hid-input: clear unmapped usages (git-fixes).
- HID: hyperv: Add a module description line (bsc#1172249, bsc#1172251).
- HID: i2c-hid: add Trekstor Primebook C11B to descriptor override (git-fixes).
- HID: i2c-hid: override HID descriptors for certain devices (git-fixes).
- HID: magicmouse: do not set up autorepeat (git-fixes).
- HID: multitouch: add eGalaxTouch P80H84 support (bsc#1051510).
- HID: sony: Fix for broken buttons on DS3 USB dongles (bsc#1051510).
- HID: wacom: Read HID_DG_CONTACTMAX directly for non-generic devices (git-fixes).
- hrtimer: Annotate lockless access to timer->state (git fixes (block drivers)).
- hsr: add restart routine into hsr_get_node_list() (networking-stable-20_03_28).
- hsr: check protocol version in hsr_newlink() (networking-stable-20_04_17).
- hsr: fix general protection fault in hsr_addr_is_self() (networking-stable-20_03_28).
- hsr: set .netnsok flag (networking-stable-20_03_28).
- hsr: use rcu_read_lock() in hsr_get_node_{list/status}() (networking-stable-20_03_28).
- hv_netvsc: Fix netvsc_start_xmit's return type (git-fixes).
- hwmon: (acpi_power_meter) Fix potential memory leak in acpi_power_meter_add() (bsc#1111666).
- hwmon: (emc2103) fix unable to change fan pwm1_enable attribute (bsc#1111666).
- hwmon: (max6697) Make sure the OVERT mask is set correctly (bsc#1111666).
- i2c: acpi: Force bus speed to 400KHz if a Silead touchscreen is present (git-fixes).
- i2c: acpi: put device when verifying client fails (git-fixes).
- i2c: algo-pca: Add 0x78 as SCL stuck low status for PCA9665 (bsc#1111666).
- i2c: brcmstb: remove unused struct member (git-fixes).
- i2c: core: Allow empty id_table in ACPI case as well (git-fixes).
- i2c: core: decrease reference count of device node in i2c_unregister_device (git-fixes).
- i2c: dev: Fix the race between the release of i2c_dev and cdev (bsc#1051510).
- i2c: eg20t: Load module automatically if ID matches (bsc#1111666).
- i2c: fix missing pm_runtime_put_sync in i2c_device_probe (git-fixes).
- i2c-hid: properly terminate i2c_hid_dmi_desc_override_table array (git-fixes).
- i2c: hix5hd2: add missed clk_disable_unprepare in remove (bsc#1051510).
- i2c: i801: Do not add ICH_RES_IO_SMI for the iTCO_wdt device (git-fixes).
- i2c: iproc: Stop advertising support of SMBUS quick cmd (git-fixes).
- i2c: isch: Remove unnecessary acpi.h include (git-fixes).
- i2c: jz4780: silence log flood on txabrt (bsc#1051510).
- i2c: mlxcpld: check correct size of maximum RECV_LEN packet (bsc#1111666).
- i2c: mux: demux-pinctrl: Fix an error handling path in 'i2c_demux_pinctrl_probe()' (bsc#1051510).
- i2c: st: fix missing struct parameter description (bsc#1051510).
- i40e: reduce stack usage in i40e_set_fc (git-fixes).
- IB/hfi1: Do not destroy hfi1_wq when the device is shut down (bsc#1174409).
- IB/hfi1: Do not destroy link_wq when the device is shut down (bsc#1174409).
- IB/mlx5: Fix missing congestion control debugfs on rep rdma device (bsc#1103991).
- ibmveth: Fix max MTU limit (bsc#1173428 ltc#186397).
- ibmvfc: do not send implicit logouts prior to NPIV login (bsc#1169625 ltc#184611).
- ibmvnic: continue to init in CRQ reset returns H_CLOSED (bsc#1173280 ltc#185369).
- ibmvnic: Flush existing work items before device removal (bsc#1065729).
- ibmvnic: Harden device login requests (bsc#1170011 ltc#183538).
- ibmvnic: Skip fatal error reset after passive init (bsc#1171078 ltc#184239).
- iio:ad7797: Use correct attribute_group (bsc#1051510).
- iio: adc: stm32-adc: fix device used to request dma (bsc#1051510).
- iio: adc: stm32-adc: fix sleep in atomic context (git-fixes).
- iio: adc: stm32-adc: Use dma_request_chan() instead dma_request_slave_channel() (bsc#1051510).
- iio: buffer: Do not allow buffers without any channels enabled to be activated (bsc#1051510).
- iio: dac: vf610: Fix an error handling path in 'vf610_dac_probe()' (bsc#1051510).
- iio:health:afe4404 Fix timestamp alignment and prevent data leak (bsc#1111666).
- iio:humidity:hdc100x Fix alignment and data leak issues (bsc#1111666).
- iio:magnetometer:ak8974: Fix alignment and data leak issues (bsc#1111666).
- iio: mma8452: Add missed iio_device_unregister() call in mma8452_probe() (bsc#1111666).
- iio: potentiostat: lmp9100: fix iio_triggered_buffer_{predisable,postenable} positions (bsc#1051510).
- iio: pressure: bmp280: Tolerate IRQ before registering (bsc#1051510).
- iio:pressure:ms5611 Fix buffer element alignment (bsc#1111666).
- iio: pressure: zpa2326: handle pm_runtime_get_sync failure (bsc#1111666).
- iio: sca3000: Remove an erroneous 'get_device()' (bsc#1051510).
- iio: xilinx-xadc: Fix ADC-B powerdown (bsc#1051510).
- iio: xilinx-xadc: Fix clearing interrupt when enabling trigger (bsc#1051510).
- iio: xilinx-xadc: Fix sequencer configuration for aux channels in simultaneous mode (bsc#1051510).
- ima: Directly assign the ima_default_policy pointer to ima_rules (bsc#1051510).
- ima: Fix ima digest hash table key calculation (bsc#1051510).
- ima: Fix return value of ima_write_policy() (git-fixes).
- include/asm-generic/topology.h: guard cpumask_of_node() macro argument (bsc#1148868).
- Input: evdev - call input_flush_device() on release(), not flush() (bsc#1051510).
- Input: hyperv-keyboard - add module description (bsc#1172249, bsc#1172251).
- Input: i8042 - add Acer Aspire 5738z to nomux list (bsc#1051510).
- Input: i8042 - add Lenovo XiaoXin Air 12 to i8042 nomux list (bsc#1111666).
- Input: i8042 - add ThinkPad S230u to i8042 reset list (bsc#1051510).
- input: i8042 - Remove special PowerPC handling (git-fixes).
- Input: raydium_i2c_ts - use true and false for boolean values (bsc#1051510).
- Input: synaptics - add a second working PNP_ID for Lenovo T470s (bsc#1111666).
- Input: synaptics - enable RMI on HP Envy 13-ad105ng (bsc#1051510).
- Input: synaptics-rmi4 - fix error return code in rmi_driver_probe() (bsc#1051510).
- Input: synaptics-rmi4 - really fix attn_data use-after-free (git-fixes).
- Input: usbtouchscreen - add support for BonXeon TP (bsc#1051510).
- Input: xpad - add custom init packet for Xbox One S controllers (bsc#1051510).
- intel_idle: Graceful probe failure when MWAIT is disabled (bsc#1174115).
- intel_th: Fix a NULL dereference when hub driver is not loaded (bsc#1111666).
- intel_th: pci: Add Elkhart Lake CPU support (bsc#1051510).
- iommu/amd: Call domain_flush_complete() in update_domain() (bsc#1172096).
- iommu/amd: Do not flush Device Table in iommu_map_page() (bsc#1172097).
- iommu/amd: Do not loop forever when trying to increase address space (bsc#1172098).
- iommu/amd: Fix legacy interrupt remapping for x2APIC-enabled system (bsc#1172099).
- iommu/amd: Fix over-read of ACPI UID from IVRS table (bsc#1172101).
- iommu/amd: Fix race in increase_address_space()/fetch_pte() (bsc#1172102).
- iommu/amd: Fix the configuration of GCR3 table root pointer (bsc#1169057).
- iommu/amd: Update Device Table in increase_address_space() (bsc#1172103).
- iommu: Fix reference count leak in iommu_group_alloc (bsc#1172397).
- ip6_tunnel: Allow rcv/xmit even if remote address is a local address (bsc#1166978).
- ipmi: fix hung processes in __get_guid() (git-fixes).
- ipv4: fix a RCU-list lock in fib_triestat_seq_show (networking-stable-20_04_02).
- ipv6/addrconf: call ipv6_mc_up() for non-Ethernet interface (networking-stable-20_03_14).
- ipv6: do not auto-add link-local address to lag ports (networking-stable-20_04_09).
- ipv6: fix IPV6_ADDRFORM operation logic (bsc#1171662).
- ipv6: Fix nlmsg_flags when splitting a multipath route (networking-stable-20_03_01).
- ipv6: fix restrict IPV6_ADDRFORM operation (bsc#1171662).
- ipv6: Fix route replacement with dev-only route (networking-stable-20_03_01).
- ipvlan: add cond_resched_rcu() while processing muticast backlog (networking-stable-20_03_14).
- ipvlan: call dev_change_flags when ipvlan mode is reset (git-fixes).
- ipvlan: do not add hardware address of master to its unicast filter list (bsc#1137325).
- ipvlan: do not deref eth hdr before checking it's set (networking-stable-20_03_14).
- ipvlan: do not use cond_resched_rcu() in ipvlan_process_multicast() (networking-stable-20_03_14).
- irqchip/bcm2835: Quiesce IRQs left enabled by bootloader (bsc#1051510).
- irqdomain: Fix a memory leak in irq_domain_push_irq() (bsc#1051510).
- iwlwifi: pcie: actually release queue memory in TVQM (bsc#1051510).
- ixgbe: do not check firmware errors (bsc#1170284).
- ixgbevf: Remove limit of 10 entries for unicast filter list (git-fixes).
- jbd2: avoid leaking transaction credits when unreserving handle (bsc#1173845).
- jbd2: Preserve kABI when adding j_abort_mutex (bsc#1173833).
- kabi fix for (bsc#1168202).
- kabi fix for early XHCI debug (git-fixes).
- kabi for for md: improve handling of bio with REQ_PREFLUSH in md_flush_request() (git-fixes).
- kabi: hv: prevent struct device_node to become defined (bsc#1172871).
- kabi: ppc64le: prevent struct dma_map_ops to become defined (jsc#SLE-12423).
- kABI: protect struct mlx5_cmd_work_ent (kabi).
- kABI: reintroduce inet_hashtables.h include to l2tp_ip (kabi).
- kabi/severities: Do not track KVM internal symbols.
- kabi/severities: Ingnore get_dev_data() The function is internal to the AMD IOMMU driver and must not be called by any third party.
- kabi workaround for snd_rawmidi buffer_ref field addition (git-fixes).
- kernfs: fix barrier usage in __kernfs_new_node() (bsc#1111666).
- KEYS: reaching the keys quotas correctly (bsc#1051510).
- KVM: arm64: Change hyp_panic()s dependency on tpidr_el2 (bsc#1133021).
- KVM: arm64: Stop save/restoring host tpidr_el1 on VHE (bsc#1133021).
- KVM: Check validity of resolved slot when searching memslots (bsc#1172104).
- KVM: nVMX: Do not reread VMCS-agnostic state when switching VMCS (bsc#1114279).
- KVM: nVMX: Skip IBPB when switching between vmcs01 and vmcs02 (bsc#1114279).
- KVM: s390: vsie: Fix delivery of addressing exceptions (git-fixes).
- KVM: s390: vsie: Fix possible race when shadowing region 3 tables (git-fixes).
- KVM: s390: vsie: Fix region 1 ASCE sanity shadow address checks (git-fixes).
- KVM: SVM: Fix potential memory leak in svm_cpu_init() (bsc#1171736).
- KVM x86: Extend AMD specific guest behavior to Hygon virtual CPUs (bsc#1152489).
- KVM: x86: Fix APIC page invalidation race (bsc#1174122).
- kvm: x86: Fix L1TF mitigation for shadow MMU (bsc#1171904).
- KVM: x86/mmu: Set mmio_value to '0' if reserved #PF can't be generated (bsc#1171904).
- KVM: x86: only do L1TF workaround on affected processors (bsc#1171904).
- l2tp: add sk_family checks to l2tp_validate_socket (networking-stable-20_06_07).
- l2tp: Allow management of tunnels and session in user namespace (networking-stable-20_04_17).
- l2tp: do not use inet_hash()/inet_unhash() (networking-stable-20_06_07).
- libata: Remove extra scsi_host_put() in ata_scsi_add_hosts() (bsc#1051510).
- libata: Return correct status in sata_pmp_eh_recover_pm() when ATA_DFLAG_DETACH is set (bsc#1051510).
- libceph: do not omit recovery_deletes in target_copy() (bsc#1174113).
- libceph: ignore pool overlay and cache logic on redirects (bsc#1173146).
- libfs: fix infoleak in simple_attr_read() (bsc#1168881).
- libnvdimm/bus: Fix wait_nvdimm_bus_probe_idle() ABBA deadlock (bsc#1171753).
- libnvdimm/bus: Prepare the nd_ioctl() path to be re-entrant (bsc#1171753).
- libnvdimm/bus: Stop holding nvdimm_bus_list_mutex over __nd_ioctl() (bsc#1171753).
- libnvdimm: cover up changes in struct nvdimm_bus (bsc#1171753).
- libnvdimm: cover up nd_pfn_sb changes (bsc#1171759).
- libnvdimm/dax: Pick the right alignment default when creating dax devices (bsc#1171759).
- libnvdimm/label: Remove the dpa align check (bsc#1171759).
- libnvdimm/of_pmem: Provide a unique name for bus provider (bsc#1171739).
- libnvdimm/pfn_dev: Add a build check to make sure we notice when struct page size change (bsc#1171743).
- libnvdimm/pfn_dev: Add page size and struct page size to pfn superblock (bsc#1171759).
- libnvdimm/pfn: Prevent raw mode fallback if pfn-infoblock valid (bsc#1171743).
- libnvdimm/pmem: Advance namespace seed for specific probe errors (bsc#1171743).
- libnvdimm/region: Initialize bad block for volatile namespaces (bnc#1151927 5.3.6).++ kernel-source-rt.spec (revision 4)Release: <RELEASE>.g93af9dfProvides: %name-srchash-93af9df3581407689c1ac5b0aa06fcfb62b08f1c
- libnvdimm/region: Rewrite _probe_success() to _advance_seeds() (bsc#1171743).
- libnvdimm: Use PAGE_SIZE instead of SZ_4K for align check (bsc#1171759).
- lib: raid6: fix awk build warnings (git fixes (block drivers)).
- lib/raid6/test: fix build on distros whose /bin/sh is not bash (git fixes (block drivers)).
- lib/stackdepot.c: fix global out-of-bounds in stack_slabs (git fixes (block drivers)).
- livepatch: Apply vmlinux-specific KLP relocations early (bsc#1071995).
- livepatch: Disallow vmlinux.ko (bsc#1071995).
- livepatch: Make klp_apply_object_relocs static (bsc#1071995).
- livepatch: Prevent module-specific KLP rela sections from referencing vmlinux symbols (bsc#1071995).
- livepatch: Remove .klp.arch (bsc#1071995).
- locks: print unsigned ino in /proc/locks (bsc#1171951).
- loop: replace kill_bdev with invalidate_bdev (bsc#1173820).
- lpfc_debugfs: get rid of pointless access_ok() (bsc#1172687 bsc#1171530).
- lpfc: Synchronize NVME transport and lpfc driver devloss_tmo (bcs#1173060).
- mac80211: add ieee80211_is_any_nullfunc() (bsc#1051510).
- mac80211: add option for setting control flags (bsc#1111666).
- mac80211: Do not send mesh HWMP PREQ if HWMP is disabled (bsc#1051510).
- mac80211_hwsim: Use kstrndup() in place of kasprintf() (bsc#1051510).
- mac80211: mesh: fix discovery timer re-arming issue / crash (bsc#1051510).
- mac80211: set IEEE80211_TX_CTRL_PORT_CTRL_PROTO for nl80211 TX (bsc#1111666).
- macsec: avoid to set wrong mtu (bsc#1051510).
- macsec: restrict to ethernet devices (networking-stable-20_03_28).
- macvlan: add cond_resched() during multicast processing (networking-stable-20_03_14).
- macvlan: fix null dereference in macvlan_device_event() (bsc#1051510).
- mailbox: imx: Disable the clock on devm_mbox_controller_register() failure (git-fixes).
- md: Avoid namespace collision with bitmap API (git fixes (block drivers)).
- md: improve handling of bio with REQ_PREFLUSH in md_flush_request() (git-fixes).
- md/raid0: Fix an error message in raid0_make_request() (git fixes (block drivers)).
- md/raid10: prevent access of uninitialized resync_pages offset (git-fixes).
- mdraid: fix read/write bytes accounting (bsc#1172537).
- md: use memalloc scope APIs in mddev_suspend()/mddev_resume() (bsc#1166985)).
- media: cec: silence shift wrapping warning in __cec_s_log_addrs() (git-fixes).
- media: dib0700: fix rc endpoint lookup (bsc#1051510).
- media: dvb: return -EREMOTEIO on i2c transfer failure (bsc#1051510).
- media: flexcop-usb: fix endpoint sanity check (git-fixes).
- media: go7007: Fix URB type for interrupt handling (bsc#1051510).
- media: platform: fcp: Set appropriate DMA parameters (bsc#1051510).
- media: si2157: Better check for running tuner in init (bsc#1111666).
- media: tda10071: fix unsigned sign extension overflow (bsc#1051510).
- media: ti-vpe: cal: fix disable_irqs to only the intended target (git-fixes).
- media: usbtv: fix control-message timeouts (bsc#1051510).
- media: v4l2-core: fix entity initialization in device_register_subdev (bsc#1051510).
- media: vsp1: tidyup VI6_HGT_LBn_H() macro (bsc#1051510).
- media: xirlink_cit: add missing descriptor sanity checks (bsc#1051510).
- mei: release me_cl object reference (bsc#1051510).
- mfd: dln2: Fix sanity checking for endpoints (bsc#1051510).
- misc: pci_endpoint_test: Fix to support > 10 pci-endpoint-test devices (bsc#1051510).
- mlxsw: core: Do not use WQ_MEM_RECLAIM for mlxsw ordered workqueue (git-fixes).
- mlxsw: core: Do not use WQ_MEM_RECLAIM for mlxsw workqueue (git-fixes).
- mlxsw: Fix some IS_ERR() vs NULL bugs (networking-stable-20_04_27).
- mlxsw: pci: Return error on PCI reset timeout (git-fixes).
- mlxsw: spectrum_acl_tcam: Position vchunk in a vregion list properly (networking-stable-20_05_12).
- mlxsw: spectrum: Disallow prio-tagged packets when PVID is removed (git-fixes).
- mlxsw: spectrum_dpipe: Add missing error path (git-fixes).
- mlxsw: spectrum_flower: Do not stop at FLOW_ACTION_VLAN_MANGLE (networking-stable-20_04_09).
- mlxsw: spectrum_mr: Fix list iteration in error path (bsc#1112374).
- mlxsw: spectrum: Prevent force of 56G (git-fixes).
- mlxsw: spectrum_router: Refresh nexthop neighbour when it becomes dead (git-fixes).
- mlxsw: spectrum_router: Remove inappropriate usage of WARN_ON() (git-fixes).
- mlxsw: spectrum_switchdev: Add MDB entries in prepare phase (git-fixes).
- mlxsw: spectrum_switchdev: Do not treat static FDB entries as sticky (git-fixes).
- mmc: atmel-mci: Fix debugfs on 64-bit platforms (git-fixes).
- mmc: block: Fix request completion in the CQE timeout path (bsc#1111666).
- mmc: block: Fix use-after-free issue for rpmb (bsc#1111666).
- mmc: core: Check request type before completing the request (git-fixes).
- mmc: core: Fix recursive locking issue in CQE recovery path (git-fixes).
- mmc: cqhci: Avoid false 'cqhci: CQE stuck on' by not open-coding timeout loop (git-fixes).
- mmc: dw_mmc: Fix debugfs on 64-bit platforms (git-fixes).
- mmc: fix compilation of user API (bsc#1051510).
- mmc: meson-gx: make sure the descriptor is stopped on errors (git-fixes).
- mmc: meson-gx: simplify interrupt handler (git-fixes).
- mmc: renesas_sdhi: limit block count to 16 bit for old revisions (git-fixes).
- mmc: sdhci: do not enable card detect interrupt for gpio cd type (bsc#1111666).
- mmc: sdhci-esdhc-imx: fix the mask for tuning start point (bsc#1051510).
- mmc: sdhci-msm: Clear tuning done flag while hs400 tuning (bsc#1051510).
- mmc: sdhci-msm: Set SDHCI_QUIRK_MULTIBLOCK_READ_ACMD12 quirk (bsc#1111666).
- mmc: sdhci-of-at91: fix memleak on clk_get failure (git-fixes).
- mmc: sdhci-pci: Fix eMMC driver strength for BYT-based controllers (bsc#1051510).
- mmc: sdhci-xenon: fix annoying 1.8V regulator warning (bsc#1051510).
- mmc: sdio: Fix potential NULL pointer error in mmc_sdio_init_card() (bsc#1051510).
- mmc: tmio: fix access width of Block Count Register (git-fixes).
- mm/filemap.c: do not initiate writeback if mapping has no dirty pages (bsc#1168884).
- mm: limit boost_watermark on small zones (git fixes (mm/pgalloc)).
- mm/memory_hotplug.c: only respect mem= parameter during boot stage (bsc#1065600).
- mm: replace PF_LESS_THROTTLE with PF_LOCAL_THROTTLE (bsc#1163403).
- mm: thp: handle page cache THP correctly in PageTransCompoundMap (git fixes (block drivers)).
- mtd: cfi: fix deadloop in cfi_cmdset_0002.c do_write_buffer (bsc#1051510).
- mtd: spi-nor: cadence-quadspi: add a delay in write sequence (git-fixes).
- mtd: spi-nor: enable 4B opcodes for mx66l51235l (git-fixes).
- mtd: spi-nor: fsl-quadspi: Do not let -EINVAL on the bus (git-fixes).
- mvpp2: remove misleading comment (git-fixes).
- mwifiex: avoid -Wstringop-overflow warning (bsc#1051510).
- mwifiex: Fix memory corruption in dump_station (bsc#1051510).
- net: bcmgenet: correct per TX/RX ring statistics (networking-stable-20_04_27).
- net: be more gentle about silly gso requests coming from user (networking-stable-20_06_07).
- net: check untrusted gso_size at kernel entry (networking-stable-20_06_07).
- net/cxgb4: Check the return from t4_query_params properly (git-fixes).
- net: dsa: b53: Fix ARL register definitions (networking-stable-20_04_27).
- net: dsa: b53: Rework ARL bin logic (networking-stable-20_04_27).
- net: dsa: bcm_sf2: Do not register slave MDIO bus with OF (networking-stable-20_04_09).
- net: dsa: bcm_sf2: Ensure correct sub-node is parsed (networking-stable-20_04_09).
- net: dsa: bcm_sf2: Fix node reference count (git-fixes).
- net: dsa: bcm_sf2: Fix overflow checks (git-fixes).
- net: dsa: Fix duplicate frames flooded by learning (networking-stable-20_03_28).
- net: dsa: loop: Add module soft dependency (networking-stable-20_05_16).
- net: dsa: mt7530: fix roaming from DSA user ports (networking-stable-20_05_27).
- net: dsa: mv88e6xxx: fix lockup on warm boot (networking-stable-20_03_14).
- net: ena: add intr_moder_rx_interval to struct ena_com_dev and use it (git-fixes).
- net: ena: add missing ethtool TX timestamping indication (git-fixes).
- net: ena: avoid memory access violation by validating req_id properly (git-fixes).
- net: ena: do not wake up tx queue when down (git-fixes).
- net: ena: ena-com.c: prevent NULL pointer dereference (git-fixes).
- net: ena: ethtool: use correct value for crc32 hash (git-fixes).
- net: ena: fix continuous keep-alive resets (git-fixes).
- net: ena: fix corruption of dev_idx_to_host_tbl (git-fixes).
- net: ena: fix default tx interrupt moderation interval (git-fixes).
- net: ena: fix incorrect default RSS key (git-fixes).
- net: ena: fix incorrectly saving queue numbers when setting RSS indirection table (git-fixes).
- net: ena: fix issues in setting interrupt moderation params in ethtool (git-fixes).
- net: ena: fix potential crash when rxfh key is NULL (git-fixes).
- net: ena: fix retrieval of nonadaptive interrupt moderation intervals (git-fixes).
- net: ena: fix uses of round_jiffies() (git-fixes).
- net: ena: make ena rxfh support ETH_RSS_HASH_NO_CHANGE (git-fixes).
- net: ena: reimplement set/get_coalesce() (git-fixes).
- net: ena: rss: do not allocate key when not supported (git-fixes).
- net: ena: rss: fix failure to get indirection table (git-fixes).
- net: ena: rss: store hash function as values and not bits (git-fixes).
- net/ethernet: add Google GVE driver (jsc#SLE-10538)
- net: fec: add phy_reset_after_clk_enable() support (git-fixes).
- net: fec: validate the new settings in fec_enet_set_coalesce() (networking-stable-20_03_14).
- net: fib_rules: Correctly set table field when table number exceeds 8 bits (networking-stable-20_03_01).
- netfilter: connlabels: prefer static lock initialiser (git-fixes).
- netfilter: conntrack: sctp: use distinct states for new SCTP connections (bsc#1159199).
- netfilter: ctnetlink: netns exit must wait for callbacks (bsc#1169795).
- netfilter: not mark a spinlock as __read_mostly (git-fixes).
- net: fix a potential recursive NETDEV_FEAT_CHANGE (networking-stable-20_05_16).
- net: fix race condition in __inet_lookup_established() (bsc#1151794).
- net: fq: add missing attribute validation for orphan mask (networking-stable-20_03_14).
- net: hns3: fix 'tc qdisc del' failed issue (bsc#1109837).
- net: inet_csk: Fix so_reuseport bind-address cache in tb->fast* (networking-stable-20_05_27).
- net: ipip: fix wrong address family in init error path (networking-stable-20_05_27).
- net, ip_tunnel: fix interface lookup with no key (networking-stable-20_04_02).
- net: ipv4: devinet: Fix crash when add/del multicast IP with autojoin (networking-stable-20_04_17).
- net: ipv6: do not consider routes via gateways for anycast address check (networking-stable-20_04_17).
- net: ipvlan: Fix ipvlan device tso disabled while NETIF_F_IP_CSUM is set (git-fixes).
- netlink: Use netlink header as base to calculate bad attribute offset (networking-stable-20_03_14).
- net: macsec: preserve ingress frame ordering (networking-stable-20_05_12).
- net: memcg: fix lockdep splat in inet_csk_accept() (networking-stable-20_03_14).
- net: memcg: late association of sock to memcg (networking-stable-20_03_14).
- net/mlx4_core: drop useless LIST_HEAD (git-fixes).
- net/mlx4_core: fix a memory leak bug (git-fixes).
- net/mlx4_core: Fix use of ENOSPC around mlx4_counter_alloc() (networking-stable-20_05_12).
- net/mlx4_en: avoid indirect call in TX completion (networking-stable-20_04_27).
- net/mlx5: Add command entry handling completion (networking-stable-20_05_27).
- net/mlx5: Add new fields to Port Type and Speed register (bsc#1171118).
- net/mlx5: Avoid panic when setting vport rate (git-fixes).
- net/mlx5: Continue driver initialization despite debugfs failure (git-fixes).
- net/mlx5e: ethtool, Fix a typo in WOL function names (git-fixes).
- net/mlx5e: Fix traffic duplication in ethtool steering (git-fixes).
- net/mlx5e: Remove unnecessary clear_bit()s (git-fixes).
- net/mlx5e: Update netdev txq on completions during closure (networking-stable-20_05_27).
- net/mlx5: Expose link speed directly (bsc#1171118).
- net/mlx5: Expose port speed when possible (bsc#1171118).
- net/mlx5: Fix command entry leak in Internal Error State (networking-stable-20_05_12).
- net/mlx5: Fix crash upon suspend/resume (networking-stable-20_06_07).
- net/mlx5: Fix failing fw tracer allocation on s390 (bsc#1103990 ).
- net/mlx5: Fix forced completion access non initialized command entry (networking-stable-20_05_12).
- net: mvmdio: allow up to four clocks to be specified for orion-mdio (git-fixes).
- net: mvneta: Fix the case where the last poll did not process all rx (networking-stable-20_03_28).
- net: mvpp2: prs: Do not override the sign bit in SRAM parser shift (git-fixes).
- net: netrom: Fix potential nr_neigh refcnt leak in nr_add_node (networking-stable-20_04_27).
- net/packet: tpacket_rcv: do not increment ring index on drop (networking-stable-20_03_14).
- net: phy: fix aneg restart in phy_ethtool_set_eee (networking-stable-20_05_16).
- net: phy: micrel: kszphy_resume(): add delay after genphy_resume() before accessing PHY registers (bsc#1051510).
- net: phy: restore mdio regs in the iproc mdio driver (networking-stable-20_03_01).
- netprio_cgroup: Fix unlimited memory leak of v2 cgroups (networking-stable-20_05_16).
- net: qede: stop adding events on an already destroyed workqueue (git-fixes).
- net: qed: fix excessive QM ILT lines consumption (git-fixes).
- net: qed: fix NVMe login fails over VFs (git-fixes).
- net: qmi_wwan: add support for ASKEY WWHC050 (networking-stable-20_03_28).
- net: qrtr: Fix passing invalid reference to qrtr_local_enqueue() (networking-stable-20_05_27).
- net: revert default NAPI poll timeout to 2 jiffies (networking-stable-20_04_17).
- net: revert 'net: get rid of an signed integer overflow in ip_idents_reserve()' (networking-stable-20_05_27).
- net_sched: cls_route: remove the right filter from hashtable (networking-stable-20_03_28).
- net sched: fix reporting the first-time use timestamp (networking-stable-20_05_27).
- net_sched: sch_skbprio: add message validation to skbprio_change() (bsc#1109837).
- net: stricter validation of untrusted gso packets (networking-stable-20_05_12).
- net/tls: Fix sk_psock refcnt leak in bpf_exec_tx_verdict() (networking-stable-20_05_12).
- net/tls: Fix sk_psock refcnt leak when in tls_data_ready() (networking-stable-20_05_12).
- net: usb: qmi_wwan: add support for DW5816e (networking-stable-20_05_12).
- net: usb: qmi_wwan: add Telit 0x1050 composition (networking-stable-20_06_07).
- net: usb: qmi_wwan: add Telit LE910C1-EUX composition (networking-stable-20_06_07).
- net: vmxnet3: fix possible buffer overflow caused by bad DMA value in vmxnet3_get_rss() (bsc#1172484).
- net/x25: Fix x25_neigh refcnt leak when receiving frame (networking-stable-20_04_27).
- nfc: add missing attribute validation for SE API (networking-stable-20_03_14).
- nfc: add missing attribute validation for vendor subcommand (networking-stable-20_03_14).
- nfc: fdp: Fix a signedness bug in fdp_nci_send_patch() (bsc#1051510).
- nfc: pn544: Fix occasional HW initialization failure (networking-stable-20_03_01).
- nfc: st21nfca: add missed kfree_skb() in an error path (bsc#1051510).
- nfp: abm: fix a memory leak bug (bsc#1109837).
- nfp: bpf: fix code-gen bug on BPF_ALU | BPF_XOR | BPF_K (git-fixes).
- nfsd4: fix up replay_matches_cache() (git-fixes).
- nfsd: Ensure CLONE persists data and metadata changes to the target file (git-fixes).
- nfsd: fix delay timer on 32-bit architectures (git-fixes).
- nfsd: fix jiffies/time_t mixup in LRU list (git-fixes).
- nfs: Directory page cache pages need to be locked when read (git-fixes).
- nfsd: memory corruption in nfsd4_lock() (git-fixes).
- nfs: Do not call generic_error_remove_page() while holding locks (bsc#1170457).
- NFS: Fix an RCU lock leak in nfs4_refresh_delegation_stateid() (bsc#1170592).
- nfs: Fix memory leaks and corruption in readdir (git-fixes).
- nfs: Fix O_DIRECT accounting of number of bytes read/written (git-fixes).
- nfs: Fix potential posix_acl refcnt leak in nfs3_set_acl (git-fixes).
- nfs: fix racey wait in nfs_set_open_stateid_locked (bsc#1170592).
- nfs/flexfiles: Use the correct TCP timeout for flexfiles I/O (git-fixes).
- nfs/pnfs: Fix pnfs_generic_prepare_to_resend_writes() (git-fixes).
- nfs: Revalidate the file size on a fatal write error (git-fixes).
- NFSv4.0: nfs4_do_fsinfo() should not do implicit lease renewals (git-fixes).
- NFSv4: Do not allow a cached open with a revoked delegation (git-fixes).
- NFSv4: Fix leak of clp->cl_acceptor string (git-fixes).
- NFSv4/pnfs: Return valid stateids in nfs_layout_find_inode_by_stateid() (git-fixes).
- NFSv4: Retry CLOSE and DELEGRETURN on NFS4ERR_OLD_STATEID (bsc#1170592).
- NFSv4: try lease recovery on NFS4ERR_EXPIRED (git-fixes).
- NFSv4.x: Drop the slot if nfs4_delegreturn_prepare waits for layoutreturn (git-fixes).
- nilfs2: fix null pointer dereference at nilfs_segctor_do_construct() (bsc#1173857).
- nl80211: fix NL80211_ATTR_CHANNEL_WIDTH attribute type (bsc#1111666).
- nl802154: add missing attribute validation for dev_type (networking-stable-20_03_14).
- nl802154: add missing attribute validation (networking-stable-20_03_14).
- nvdimm: Avoid race between probe and reading device attributes (bsc#1170442).
- nvme: check for NVME_CTRL_LIVE in nvme_report_ns_ids() (bcs#1171558 bsc#1159058).
- nvme: do not update multipath disk information if the controller is down (bcs#1171558 bsc#1159058).
- nvme: fail cancelled commands with NVME_SC_HOST_PATH_ERROR (bsc#1158983 bsc#1172538).
- nvme-fc: Fail transport errors with NVME_SC_HOST_PATH (bsc#1158983 bsc#1172538).
- nvme-fc: print proper nvme-fc devloss_tmo value (bsc#1172391).
- nvme-tcp: fail command with NVME_SC_HOST_PATH_ERROR send failed (bsc#1158983 bsc#1172538).
- objtool: Add is_static_jump() helper (bsc#1169514).
- objtool: Add relocation check for alternative sections (bsc#1169514).
- objtool: Clean instruction state before each function validation (bsc#1169514).
- objtool: Fix stack offset tracking for indirect CFAs (bsc#1169514).
- objtool: Fix switch table detection in .text.unlikely (bsc#1169514).
- objtool: Ignore empty alternatives (bsc#1169514).
- objtool: Make BP scratch register warning more robust (bsc#1169514).
- ocfs2: no need try to truncate file beyond i_size (bsc#1171841).
- OMAP: DSS2: remove non-zero check on variable r (bsc#1114279)
- overflow: Fix -Wtype-limits compilation warnings (git fixes).
- overflow.h: Add arithmetic shift helper (git fixes).
- p54usb: add AirVasT USB stick device-id (bsc#1051510).
- padata: ensure the reorder timer callback runs on the correct CPU (git-fixes).
- padata: Remove broken queue flushing (git-fixes).
- padata: reorder work kABI fixup (git-fixes).
- Partially revert 'kfifo: fix kfifo_alloc() and kfifo_init()' (git fixes (block drivers)).
- partitions/efi: Fix partition name parsing in GUID partition entry (bsc#1168763).
- PCI/AER: Remove HEST/FIRMWARE_FIRST parsing for AER ownership (bsc#1174356).
- PCI/AER: Use only _OSC to determine AER ownership (bsc#1174356).
- PCI: Allow pci_resize_resource() for devices on root bus (bsc#1051510).
- PCI/ASPM: Clear the correct bits when enabling L1 substates (bsc#1051510).
- PCI: endpoint: Fix clearing start entry in configfs (bsc#1051510).
- PCI: Fix pci_register_host_bridge() device_register() error handling (bsc#1051510).
- PCI: Generalize multi-function power dependency device links (bsc#1111666).
- PCI: hv: Add support for protocol 1.3 and support PCI_BUS_RELATIONS2 (bsc#1172201, bsc#1172202).
- PCI: hv: Change pci_protocol_version to per-hbus (bsc#1172871, bsc#1172872).
- PCI: hv: Decouple the func definition in hv_dr_state from VSP message (bsc#1172201, bsc#1172202).
- PCI: hv: Fix the PCI HyperV probe failure path to release resource properly (bsc#1172871, bsc#1172872).
- PCI: hv: Introduce hv_msi_entry (bsc#1172871, bsc#1172872).
- PCI: hv: Move hypercall related definitions into tlfs header (bsc#1172871, bsc#1172872).
- PCI: hv: Move retarget related structures into tlfs header (bsc#1172871, bsc#1172872).
- PCI: hv: Reorganize the code in preparation of hibernation (bsc#1172871, bsc#1172872).
- PCI: hv: Retry PCI bus D0 entry on invalid device state (bsc#1172871, bsc#1172872).
- PCI: pciehp: Fix indefinite wait on sysfs requests (git-fixes).
- PCI: pciehp: Fix MSI interrupt race (bsc#1159037).
- PCI: pciehp: Support interrupts sent from D3hot (git-fixes).
- PCI/PM: Call .bridge_d3() hook only if non-NULL (git-fixes).
- PCI: Program MPS for RCiEP devices (bsc#1051510).
- PCI/PTM: Inherit Switch Downstream Port PTM settings from Upstream Port (bsc#1051510).
- pci: Revive pci_dev __aer_firmware_first* fields for kABI (bsc#1174356).
- PCI/switchtec: Fix init_completion race condition with poll_wait() (bsc#1051510).
- pcm_native: result of put_user() needs to be checked (bsc#1111666).
- perf: Allocate context task_ctx_data for child event (git-fixes).
- perf/cgroup: Fix perf cgroup hierarchy support (git-fixes).
- perf: Copy parent's address filter offsets on clone (git-fixes).
- perf/core: Add sanity check to deal with pinned event failure (git-fixes).
- perf/core: Avoid freeing static PMU contexts when PMU is unregistered (git-fixes).
- perf/core: Correct event creation with PERF_FORMAT_GROUP (git-fixes).
- perf/core: Do not WARN() for impossible ring-buffer sizes (git-fixes).
- perf/core: Fix ctx_event_type in ctx_resched() (git-fixes).
- perf/core: Fix error handling in perf_event_alloc() (git-fixes).
- perf/core: Fix exclusive events' grouping (git-fixes).
- perf/core: Fix group scheduling with mixed hw and sw events (git-fixes).
- perf/core: Fix impossible ring-buffer sizes warning (git-fixes).
- perf/core: Fix locking for children siblings group read (git-fixes).
- perf/core: Fix perf_event_read_value() locking (git-fixes).
- perf/core: Fix perf_pmu_unregister() locking (git-fixes).
- perf/core: Fix perf_sample_regs_user() mm check (git-fixes).
- perf/core: Fix possible Spectre-v1 indexing for ->aux_pages (git-fixes).
- perf/core: Fix race between close() and fork() (git-fixes).
- perf/core: Fix the address filtering fix (git-fixes).
- perf/core: Fix use-after-free in uprobe_perf_close() (git-fixes).
- perf/core: Force USER_DS when recording user stack data (git-fixes).
- perf/core: Restore mmap record type correctly (git-fixes).
- perf: Fix header.size for namespace events (git-fixes).
- perf/ioctl: Add check for the sample_period value (git-fixes).
- perf, pt, coresight: Fix address filters for vmas with non-zero offset (git-fixes).
- perf: Return proper values for user stack errors (git-fixes).
- perf/x86/amd: Constrain Large Increment per Cycle events (git-fixes).
- perf/x86/amd/ibs: Fix reading of the IBS OpData register and thus precise RIP validity (git-fixes).
- perf/x86/amd/ibs: Fix sample bias for dispatched micro-ops (git-fixes).
- perf/x86/amd/ibs: Handle erratum #420 only on the affected CPU family (10h) (git-fixes).
- perf/x86/amd/iommu: Make the 'amd_iommu_attr_groups' symbol static (git-fixes).
- perf/x86/amd/uncore: Do not set 'ThreadMask' and 'SliceMask' for non-L3 PMCs (git-fixes stable).
- perf/x86/amd/uncore: Set the thread mask for F17h L3 PMCs (git-fixes).
- perf/x86/amd/uncore: Set ThreadMask and SliceMask for L3 Cache perf events (git-fixes stable).
- perf/x86: Enable free running PEBS for REGS_USER/INTR (git-fixes).
- perf/x86: Fix incorrect PEBS_REGS (git-fixes).
- perf/x86/intel: Add generic branch tracing check to intel_pmu_has_bts() (git-fixes).
- perf/x86/intel: Add proper condition to run sched_task callbacks (git-fixes).
- perf/x86/intel/bts: Fix the use of page_private() (git-fixes).
- perf/x86/intel: Fix PT PMI handling (git-fixes).
- perf/x86/intel: Move branch tracing setup to the Intel-specific source file (git-fixes).
- perf/x86/intel/uncore: Add Node ID mask (git-fixes).
- perf/x86/intel/uncore: Fix PCI BDF address of M3UPI on SKX (git-fixes).
- perf/x86/intel/uncore: Handle invalid event coding for free-running counter (git-fixes).
- perf/x86/uncore: Fix event group support (git-fixes).
- pid: Improve the comment about waiting in zap_pid_ns_processes (git fixes)).
- pinctrl: baytrail: Enable pin configuration setting for GPIO chip (git-fixes).
- pinctrl: cherryview: Add missing spinlock usage in chv_gpio_irq_handler (git-fixes).
- pinctrl: core: Remove extra kref_get which blocks hogs being freed (bsc#1051510).
- pinctrl: freescale: imx: Fix an error handling path in 'imx_pinctrl_probe()' (bsc#1051510).
- pinctrl: imxl: Fix an error handling path in 'imx1_pinctrl_core_probe()' (bsc#1051510).
- pinctrl: samsung: Save/restore eint_mask over suspend for EINT_TYPE GPIOs (bsc#1051510).
- pinctrl: sunrisepoint: Fix PAD lock register offset for SPT-H (git-fixes).
- platform/x86: asus-nb-wmi: Do not load on Asus T100TA and T200TA (bsc#1051510).
- platform/x86: dell-laptop: do not register micmute LED if there is no token (bsc#1111666).
- platform/x86: hp-wmi: Convert simple_strtoul() to kstrtou32() (bsc#1111666).
- PM / Domains: Allow genpd users to specify default active wakeup behavior (git-fixes).
- pNFS: Ensure we do clear the return-on-close layout stateid on fatal errors (git-fixes).
- pnp: Use list_for_each_entry() instead of open coding (git fixes).
- powerpc/64s: Do not let DT CPU features set FSCR_DSCR (bsc#1065729).
- powerpc/64s: Save FSCR to init_task.thread.fscr after feature init (bsc#1065729).
- powerpc: Add attributes for setjmp/longjmp (bsc#1065729).
- powerpc/book3s64: Export has_transparent_hugepage() related functions (bsc#1171759).
- powerpc/book3s64/pkeys: Fix pkey_access_permitted() for execute disable pkey (bsc#1065729).
- powerpc/fadump: fix race between pstore write and fadump crash trigger (bsc#1168959 ltc#185010).
- powerpc/hash64/devmap: Use H_PAGE_THP_HUGE when setting up huge devmap PTE entries (bsc#1065729).
- powerpc/pci/of: Parse unassigned resources (bsc#1065729).
- powerpc/setup_64: Set cache-line-size based on cache-block-size (bsc#1065729).
- powerpc/sstep: Fix DS operand in ld encoding to appropriate value (bsc#1065729).
- powerpc/xive: Clear the page tables for the ESB IO mapping (bsc#1085030).
- powerpc/xmon: Reset RCU and soft lockup watchdogs (bsc#1065729).
- power: supply: bq24257_charger: Replace depends on REGMAP_I2C with select (bsc#1051510).
- power: supply: lp8788: Fix an error handling path in 'lp8788_charger_probe()' (bsc#1051510).
- power: supply: smb347-charger: IRQSTAT_D is volatile (bsc#1051510).
- power: vexpress: add suppress_bind_attrs to true (bsc#1111666).
- pppoe: only process PADT targeted at local interfaces (networking-stable-20_05_16).
- pwm: bcm2835: Dynamically allocate base (bsc#1051510).
- pwm: meson: Fix confusing indentation (bsc#1051510).
- pwm: pca9685: Fix PWM/GPIO inter-operation (bsc#1051510).
- pwm: rcar: Fix late Runtime PM enablement (bsc#1051510).
- pwm: renesas-tpu: Fix late Runtime PM enablement (bsc#1051510).
- pxa168fb: fix release function mismatch in probe failure (bsc#1051510).
- qede: Fix race between rdma destroy workqueue and link change event (networking-stable-20_03_01).
- qed: reduce maximum stack frame size (git-fixes).
- qlcnic: fix missing release in qlcnic_83xx_interrupt_test (git-fixes).
- qmi_wwan: unconditionally reject 2 ep interfaces (bsc#1051510).
- r8152: check disconnect status after long sleep (networking-stable-20_03_14).
- r8152: support additional Microsoft Surface Ethernet Adapter variant (networking-stable-20_05_27).
- raid5: remove gfp flags from scribble_alloc() (bsc#1166985).
- raid6/ppc: Fix build for clang (git fixes (block drivers)).
- random: always use batched entropy for get_random_u{32,64} (bsc#1164871).
- rcu: locking and unlocking need to always be at least barriers (git fixes (block drivers)).
- RDMA/efa: Fix setting of wrong bit in get/set_feature commands (bsc#1111666)
- RDMA/efa: Set maximum pkeys device attribute (bsc#1111666)
- RDMA/efa: Support remote read access in MR registration (bsc#1111666)
- RDMA/efa: Unified getters/setters for device structs bitmask access (bsc#1111666)
- README.BRANCH: Add Takashi Iwai as primary maintainer.
- README.BRANCH: Replace Matt Fleming with Davidlohr Bueso as maintainer.
- regmap: debugfs: Do not sleep while atomic for fast_io regmaps (bsc#1111666).
- resolve KABI warning for perf-pt-coresight (git-fixes).
- Revert 'ALSA: hda/realtek: Fix pop noise on ALC225' (git-fixes).
- Revert 'bcache: ignore pending signals when creating gc and allocator thread' (git fixes (block drivers)).
- Revert commit e918e570415c ('tpm_tis: Remove the HID IFX0102') (bsc#1111666).
- Revert 'dm crypt: use WQ_HIGHPRI for the IO and crypt workqueues' (git fixes (block drivers)).
- Revert 'drm/panel: simple: Add support for Sharp LQ150X1LG11 panels' (bsc#1114279) * offset changes
- Revert 'HID: i2c-hid: add Trekstor Primebook C11B to descriptor override' Depends on 9b5c747685982d22efffeafc5ec601bd28f6d78b, which was also reverted.
- Revert 'HID: i2c-hid: override HID descriptors for certain devices' This broke i2c-hid.ko's build, there is no way around it without a big file rename or renaming the kernel module.
- Revert 'i2c-hid: properly terminate i2c_hid_dmi_desc_override_table' Fixed 9b5c747685982d22efffeafc5ec601bd28f6d78b, which was also reverted.
- Revert 'ipc,sem: remove uneeded sem_undo_list lock usage in exit_sem()' (bsc#1172221).
- Revert 'RDMA/cma: Simplify rdma_resolve_addr() error flow' (bsc#1103992).
- Revert 'thermal: mediatek: fix register index error' (bsc#1111666).
- Revert 'tools lib traceevent: Remove unneeded qsort and uses memmove'
- rtlwifi: Fix a double free in _rtl_usb_tx_urb_setup() (bsc#1051510).
- rtnetlink: Fix memory(net_device) leak when ->newlink fails (git-fixes).
- s390/bpf: Maintain 8-byte stack alignment (bsc#1169194).
- s390/cio: avoid duplicated 'ADD' uevents (git-fixes).
- s390/cio: generate delayed uevent for vfio-ccw subchannels (git-fixes).
- s390/cpuinfo: fix wrong output when CPU0 is offline (git-fixes).
- s390/cpum_cf: Add new extended counters for IBM z15 (bsc#1169762 LTC#185291).
- s390/diag: fix display of diagnose call statistics (git-fixes).
- s390: fix syscall_get_error for compat processes (git-fixes).
- s390/ftrace: fix potential crashes when switching tracers (git-fixes).
- s390/gmap: return proper error code on ksm unsharing (git-fixes).
- s390/ism: fix error return code in ism_probe() (git-fixes).
- s390/pci: do not set affinity for floating irqs (git-fixes).
- s390/pci: Fix possible deadlock in recover_store() (bsc#1165183 LTC#184103).
- s390/pci: Recover handle in clp_set_pci_fn() (bsc#1165183 LTC#184103).
- s390/qdio: consistently restore the IRQ handler (git-fixes).
- s390/qdio: lock device while installing IRQ handler (git-fixes).
- s390/qdio: put thinint indicator after early error (git-fixes).
- s390/qdio: tear down thinint indicator after early error (git-fixes).
- s390/qeth: cancel RX reclaim work earlier (git-fixes).
- s390/qeth: do not return -ENOTSUPP to userspace (git-fixes).
- s390/qeth: do not warn for napi with 0 budget (git-fixes).
- s390/qeth: fix error handling for isolation mode cmds (git-fixes).
- s390/qeth: fix off-by-one in RX copybreak check (git-fixes).
- s390/qeth: fix promiscuous mode after reset (git-fixes).
- s390/qeth: fix qdio teardown after early init error (git-fixes).
- s390/qeth: handle error due to unsupported transport mode (git-fixes).
- s390/qeth: handle error when backing RX buffer (git-fixes).
- s390/qeth: lock the card while changing its hsuid (git-fixes).
- s390/qeth: support net namespaces for L3 devices (git-fixes).
- s390/time: Fix clk type in get_tod_clock (git-fixes).
- sch_choke: avoid potential panic in choke_reset() (networking-stable-20_05_12).
- sch_sfq: validate silly quantum values (networking-stable-20_05_12).
- scripts/decodecode: fix trapping instruction formatting (bsc#1065729).
- scripts/dtc: Remove redundant YYLOC global declaration (bsc#1160388).
- scripts/git_sort/git_sort.py: add bluetooth/bluetooth-next.git repository
- scsi: aacraid: fix a signedness bug (bsc#1174296).
- scsi: bnx2i: fix potential use after free (bsc#1171600).
- scsi: core: avoid repetitive logging of device offline messages (bsc#1145929).
- scsi: core: Handle drivers which set sg_tablesize to zero (bsc#1171601) This commit also required: > scsi: core: avoid preallocating big SGL for data
- scsi: core: kABI fix offline_already (bsc#1145929).
- scsi: core: save/restore command resid for error handling (bsc#1171602).
- scsi: core: scsi_trace: Use get_unaligned_be*() (bsc#1171604).
- scsi: core: try to get module before removing device (bsc#1171605).
- scsi: csiostor: Adjust indentation in csio_device_reset (bsc#1171606).
- scsi: csiostor: Do not enable IRQs too early (bsc#1171607).
- scsi: esas2r: unlock on error in esas2r_nvram_read_direct() (bsc#1171608).
- scsi: fnic: fix invalid stack access (bsc#1171609).
- scsi: fnic: fix msix interrupt allocation (bsc#1171610).
- scsi: hisi_sas: fix calls to dma_set_mask_and_coherent() (bsc#1174296).
- scsi: ibmvscsi: Do not send host info in adapter info MAD after LPM (bsc#1172759 ltc#184814).
- scsi: ibmvscsi: Fix WARN_ON during event pool release (bsc#1170791 ltc#185128).
- scsi: iscsi: Avoid potential deadlock in iscsi_if_rx func (bsc#1171611).
- scsi: iscsi: Fix a potential deadlock in the timeout handler (bsc#1171612).
- scsi: iscsi: qla4xxx: fix double free in probe (bsc#1171613).
- scsi: lpfc: Add an internal trace log buffer (bsc#1172687 bsc#1171530).
- scsi: lpfc: Add blk_io_poll support for latency improvment (bsc#1172687 bsc#1171530).
- scsi: lpfc: Add support to display if adapter dumps are available (bsc#1172687 bsc#1171530).
- scsi: lpfc: Allow applications to issue Common Set Features mailbox command (bsc#1172687 bsc#1171530).
- scsi: lpfc: Avoid another null dereference in lpfc_sli4_hba_unset() (bsc#1172687 bsc#1171530).
- scsi: lpfc: Change default queue allocation for reduced memory consumption (bsc#1164780).
- scsi: lpfc: fix: Coverity: lpfc_cmpl_els_rsp(): Null pointer dereferences (bsc#1171614).
- scsi: lpfc: Fix crash in target side cable pulls hitting WAIT_FOR_UNREG (bsc#1171615).
- scsi: lpfc: Fix inconsistent indenting (bsc#1158983).
- scsi: lpfc: Fix interrupt assignments when multiple vectors are supported on same CPU (bsc#1158983).
- scsi: lpfc: Fix kdump hang on PPC (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix language in 0373 message to reflect non-error message (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix less-than-zero comparison of unsigned value (bsc#1158983).
- scsi: lpfc: Fix lpfc_nodelist leak when processing unsolicited event (bsc#1164780).
- scsi: lpfc: Fix MDS Diagnostic Enablement definition (bsc#1164780).
- scsi: lpfc: Fix missing MDS functionality (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix negation of else clause in lpfc_prep_node_fc4type (bsc#1164780).
- scsi: lpfc: Fix noderef and address space warnings (bsc#1164780).
- scsi: lpfc: Fix NVMe rport deregister and registration during ADISC (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix oops due to overrun when reading SLI3 data (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix shost refcount mismatch when deleting vport (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix stack trace seen while setting rrq active (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix unused assignment in lpfc_sli4_bsg_link_diag_test (bsc#1172687 bsc#1171530).
- scsi: lpfc: Maintain atomic consistency of queue_claimed flag (bsc#1164780).
- scsi: lpfc: remove duplicate unloading checks (bsc#1164780).
- scsi: lpfc: Remove re-binding of nvme rport during registration (bsc#1164780).
- scsi: lpfc: Remove redundant initialization to variable rc (bsc#1164780).
- scsi: lpfc: Remove unnecessary lockdep_assert_held calls (bsc#1164780).
- scsi: lpfc: Update lpfc version to 12.8.0.1 (bsc#1164780).
- scsi: lpfc: Update lpfc version to 12.8.0.2 (bsc#1158983).
- scsi: megaraid_sas: Do not initiate OCR if controller is not in ready state (bsc#1171616).
- scsi: megaraid_sas: Fix a compilation warning (bsc#1174296).
- scsi: mpt3sas: Fix double free in attach error handling (bsc#1174296).
- scsi: qedf: Add port_id getter (bsc#1150660).
- scsi: qla2xxx: add ring buffer for tracing debug logs (bsc#1157169).
- scsi: qla2xxx: check UNLOADING before posting async work (bsc#1157169).
- scsi: qla2xxx: Delete all sessions before unregister local nvme port (bsc#1157169).
- scsi: qla2xxx: Do not log message when reading port speed via sysfs (bsc#1157169).
- scsi: qla2xxx: Fix a condition in qla2x00_find_all_fabric_devs() (bsc#1174296).
- scsi: qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV (bsc#1157169).
- scsi: qla2xxx: Fix regression warnings (bsc#1157169).
- scsi: qla2xxx: Remove non functional code (bsc#1157169).
- scsi: qla2xxx: Set NVMe status code for failed NVMe FCP request (bsc#1158983).
- scsi: qla2xxx: set UNLOADING before waiting for session deletion (bsc#1157169).
- scsi: qla4xxx: Adjust indentation in qla4xxx_mem_free (bsc#1171617).
- scsi: qla4xxx: fix double free bug (bsc#1171618).
- scsi: sd: Clear sdkp->protection_type if disk is reformatted without PI (bsc#1171619).
- scsi: sg: add sg_remove_request in sg_common_write (bsc#1171620).
- scsi: tracing: Fix handling of TRANSFER LENGTH == 0 for READ(6) and WRITE(6) (bsc#1171621).
- scsi: ufs: change msleep to usleep_range (bsc#1171622).
- scsi: ufs: Clean up ufshcd_scale_clks() and clock scaling error out path (bsc#1171623).
- scsi: ufs: Fix ufshcd_hold() caused scheduling while atomic (bsc#1171624).
- scsi: ufs: Fix ufshcd_probe_hba() reture value in case ufshcd_scsi_add_wlus() fails (bsc#1171625).
- scsi: ufs: Recheck bkops level if bkops is disabled (bsc#1171626).
- scsi: zfcp: fix missing erp_lock in port recovery trigger for point-to-point (git-fixes).
- sctp: Do not add the shutdown timer if its already been added (networking-stable-20_05_27).
- sctp: fix possibly using a bad saddr with a given dst (networking-stable-20_04_02).
- sctp: fix refcount bug in sctp_wfree (networking-stable-20_04_02).
- sctp: move the format error check out of __sctp_sf_do_9_1_abort (networking-stable-20_03_01).
- sctp: Start shutdown on association restart if in SHUTDOWN-SENT state and socket is closed (networking-stable-20_05_27).
- selftests/powerpc: Fix build errors in powerpc ptrace selftests (boo#1124278).
- Separate one more kABI fixup from the functional change:
- seq_file: fix problem when seeking mid-record (bsc#1170125).
- serdev: ttyport: restore client ops on deregistration (bsc#1051510).
- serial: uartps: Move the spinlock after the read of the tx empty (git-fixes).
- sfc: detach from cb_page in efx_copy_channel() (networking-stable-20_03_14).
- signal/pid_namespace: Fix reboot_pid_ns to use send_sig not force_sig (bsc#1172185).
- slcan: not call free_netdev before rtnl_unlock in slcan_open (networking-stable-20_03_28).
- slip: make slhc_compress() more robust against malicious packets (networking-stable-20_03_14).
- smb3: Additional compression structures (bsc#1144333).
- smb3: Add new compression flags (bsc#1144333).
- smb3: change noisy error message to FYI (bsc#1144333).
- smb3: enable swap on SMB3 mounts (bsc#1144333).
- smb3: Minor cleanup of protocol definitions (bsc#1144333).
- smb3: remove overly noisy debug line in signing errors (bsc#1144333).
- smb3: smbdirect support can be configured by default (bsc#1144333).
- smb3: use SMB2_SIGNATURE_SIZE define (bsc#1144333).
- spi: bcm2835: Fix 3-wire mode if DMA is enabled (git-fixes).
- spi: bcm63xx-hsspi: Really keep pll clk enabled (bsc#1051510).
- spi: bcm-qspi: when tx/rx buffer is NULL set to 0 (bsc#1051510).
- spi: dw: Add SPI Rx-done wait method to DMA-based transfer (bsc#1051510).
- spi: dw: Add SPI Tx-done wait method to DMA-based transfer (bsc#1051510).
- spi: dw: use 'smp_mb()' to avoid sending spi data error (bsc#1051510).
- spi: dw: Zero DMA Tx and Rx configurations on stack (bsc#1051510).
- spi: fix initial SPI_SR value in spi-fsl-dspi (bsc#1111666).
- spi: fsl: do not map irq during probe (git-fixes).
- spi: fsl: use platform_get_irq() instead of of_irq_to_resource() (git-fixes).
- spi: pxa2xx: Add CS control clock quirk (bsc#1051510).
- spi: pxa2xx: Apply CS clk quirk to BXT (bsc#1111666).
- spi: qup: call spi_qup_pm_resume_runtime before suspending (bsc#1051510).
- spi: spidev: fix a race between spidev_release and spidev_remove (bsc#1111666).
- spi: spi-fsl-dspi: Replace interruptible wait queue with a simple completion (git-fixes).
- spi: spi-mem: Fix Dual/Quad modes on Octal-capable devices (bsc#1111666).
- spi: spi-s3c64xx: Fix system resume support (git-fixes).
- spi: spi-sun6i: sun6i_spi_transfer_one(): fix setting of clock rate (bsc#1111666).
- spi/zynqmp: remove entry that causes a cs glitch (bsc#1051510).
- staging: comedi: dt2815: fix writing hi byte of analog output (bsc#1051510).
- staging: comedi: Fix comedi_device refcnt leak in comedi_open (bsc#1051510).
- staging: comedi: verify array index is correct before using it (bsc#1111666).
- staging: iio: ad2s1210: Fix SPI reading (bsc#1051510).
- staging: rtl8188eu: Add ASUS USB-N10 Nano B1 to device table (bsc#1051510).
- staging: rtl8712: Fix IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK (bsc#1051510).
- staging: sm750fb: add missing case while setting FB_VISUAL (bsc#1051510).
- staging: vt6656: Do not set RCR_MULTICAST or RCR_BROADCAST by default (git-fixes).
- staging: vt6656: Fix drivers TBTT timing counter (git-fixes).
- staging: vt6656: Fix pairwise key entry save (git-fixes).
- staging: vt6656: fix sign of rx_dbm to bb_pre_ed_rssi (bsc#1051510).
- staging: wlan-ng: fix ODEBUG bug in prism2sta_disconnect_usb (bsc#1051510).
- staging: wlan-ng: fix use-after-free Read in hfa384x_usbin_callback (bsc#1051510).
- SUNRPC: defer slow parts of rpc_free_client() to a workqueue (bsc#1168202).
- SUNRPC: expiry_time should be seconds not timeval (git-fixes).
- SUNRPC: Fix a potential buffer overflow in 'svc_print_xprts()' (git-fixes).
- SUNRPC: The TCP back channel mustn't disappear while requests are outstanding (bsc#1152624).
- supported.conf: Add br_netfilter to base (bsc#1169020).
- svcrdma: Fix double svc_rdma_send_ctxt_put() in an error path (bsc#1103992).
- svcrdma: Fix leak of transport addresses (git-fixes).
- svcrdma: Fix trace point use-after-free race (bsc#1103992 ).
- taskstats: fix data-race (bsc#1172188).
- tcp: cache line align MAX_TCP_HEADER (networking-stable-20_04_27).
- tcp: repair: fix TCP_QUEUE_SEQ implementation (networking-stable-20_03_28).
- team: add missing attribute validation for array index (networking-stable-20_03_14).
- team: add missing attribute validation for port ifindex (networking-stable-20_03_14).
- team: fix hang in team_mode_get() (networking-stable-20_04_27).
- tg3: driver sleeps indefinitely when EEH errors exceed eeh_max_freezes (bsc#1173284).
- thermal: devfreq_cooling: inline all stubs for CONFIG_DEVFREQ_THERMAL=n (bsc#1051510).
- timers: Add a function to start/reduce a timer (networking-stable-20_05_27).
- tools lib traceevent: Remove unneeded qsort and uses memmove instead (git-fixes).
- tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send() (bsc#1065729).
- tpm_tis: extra chip->ops check on error path in tpm_tis_core_init (bsc#1111666).
- tpm_tis: Remove the HID IFX0102 (bsc#1111666).
- tpm/tpm_tis: Free IRQ if probing fails (bsc#1082555).
- tpm/tpm_tis: Free IRQ if probing fails (git-fixes).
- tracing: Add a vmalloc_sync_mappings() for safe measure (git-fixes).
- tracing: Disable trace_printk() on post poned tests (git-fixes).
- tracing: Fix event trigger to accept redundant spaces (git-fixes).
- tracing: Fix the race between registering 'snapshot' event trigger and triggering 'snapshot' operation (git-fixes).
- tty: evh_bytechan: Fix out of bounds accesses (bsc#1051510).
- tty: hvc_console, fix crashes on parallel open/close (git-fixes).
- tty: n_gsm: Fix bogus i++ in gsm_data_kick (bsc#1051510).
- tty: n_gsm: Fix SOF skipping (bsc#1051510).
- tty: n_gsm: Fix waking up upper tty layer when room available (bsc#1051510).
- tty: rocket, avoid OOB access (git-fixes).
- tty/serial: atmel: manage shutdown in case of RS485 or ISO7816 mode (bsc#1051510).
- tty: serial: imx: setup the correct sg entry for tx dma (bsc#1051510).
- tun: Do not put_page() for all negative return values from XDP program (bsc#1109837).
- tunnel: Propagate ECT(1) when decapsulating as recommended by RFC6040 (networking-stable-20_05_12).
- UAS: fix deadlock in error handling and PM flushing work (git-fixes).
- UAS: no use logging any details in case of ENODEV (git-fixes).
- ubifs: remove broken lazytime support (bsc#1173826).
- Update config files: Build w1 bus on arm64 (jsc#SLE-11048)
- USB: Add USB_QUIRK_DELAY_CTRL_MSG and USB_QUIRK_DELAY_INIT for Corsair K70 RGB RAPIDFIRE (git-fixes).
- usb: add USB_QUIRK_DELAY_INIT for Logitech C922 (git-fixes).
- USB: c67x00: fix use after free in c67x00_giveback_urb (bsc#1111666).
- USB: cdc-acm: restore capability check order (git-fixes).
- usb: chipidea: core: add wakeup support for extcon (bsc#1111666).
- USB: core: Fix misleading driver bug report (bsc#1051510).
- usb: dwc2: Fix shutdown callback in platform (bsc#1111666).
- usb: dwc2: gadget: move gadget resume after the core is in L0 state (bsc#1051510).
- USB: dwc3: do not set gadget->is_otg flag (git-fixes).
- USB: dwc3: gadget: Do link recovery for SS and SSP (git-fixes).
- usb: dwc3: gadget: introduce cancelled_list (git-fixes).
- usb: dwc3: gadget: never call ->complete() from ->ep_queue() (git-fixes).
- usb: dwc3: gadget: Properly handle ClearFeature(halt) (git-fixes).
- usb: dwc3: gadget: Properly handle failed kick_transfer (git-fixes).
- USB: early: Handle AMD's spec-compliant identifiers, too (git-fixes).
- USB: ehci: reopen solution for Synopsys HC bug (git-fixes).
- USB: f_fs: Clear OS Extended descriptor counts to zero in ffs_data_reset() (git-fixes).
- USB: gadget: audio: Fix a missing error return value in audio_bind() (git-fixes).
- USB: gadget: composite: Inform controller driver of self-powered (git-fixes).
- USB: gadget: f_fs: Fix use after free issue as part of queue failure (bsc#1051510).
- usb: gadget: fix potential double-free in m66592_probe (bsc#1111666).
- USB: gadget: legacy: fix error return code in cdc_bind() (git-fixes).
- USB: gadget: legacy: fix error return code in gncm_bind() (git-fixes).
- USB: gadget: legacy: fix redundant initialization warnings (bsc#1051510).
- usb: gadget: lpc32xx_udc: do not dereference ep pointer before null check (bsc#1051510).
- USB: gadget: net2272: Fix a memory leak in an error handling path in 'net2272_plat_probe()' (git-fixes).
- usb: gadget: udc: atmel: fix uninitialized read in debug printk (bsc#1111666).
- USB: gadget: udc: atmel: Fix vbus disconnect handling (git-fixes).
- USB: gadget: udc: atmel: Make some symbols static (git-fixes).
- usb: gadget: udc: atmel: remove outdated comment in usba_ep_disable() (bsc#1111666).
- USB: gadget: udc: bdc: Remove unnecessary NULL checks in bdc_req_complete (git-fixes).
- usb: gadget: udc: Potential Oops in error handling code (bsc#1111666).
- USB: gadget: udc: s3c2410_udc: Remove pointless NULL check in s3c2410_udc_nuke (bsc#1051510).
- usb: host: ehci-exynos: Fix error check in exynos_ehci_probe() (bsc#1111666).
- USB: host: ehci-mxc: Add error handling in ehci_mxc_drv_probe() (bsc#1051510).
- USB: host: xhci-plat: keep runtime active when removing host (git-fixes).
- USB: hub: Fix handling of connect changes during sleep (git-fixes).
- USB: musb: fix crash with highmen PIO and usbmon (bsc#1051510).
- usb: musb: Fix runtime PM imbalance on error (bsc#1051510).
- usb: musb: start session in resume for host port (bsc#1051510).
- USBnet: silence an unnecessary warning (bsc#1170770).
- usbnet: smsc95xx: Fix use-after-free after removal (bsc#1111666).
- USB: ohci-sm501: Add missed iounmap() in remove (bsc#1111666).
- USB: serial: ch341: add new Product ID for CH340 (bsc#1111666).
- USB: serial: cypress_m8: enable Simply Automated UPB PIM (bsc#1111666).
- USB: serial: garmin_gps: add sanity checking for data length (git-fixes).
- USB: serial: io_edgeport: fix slab-out-of-bounds read in edge_interrupt_callback (bsc#1051510).
- USB: serial: iuu_phoenix: fix memory corruption (bsc#1111666).
- USB: serial: option: add BroadMobi BM806U (git-fixes).
- USB: serial: option: add GosunCn GM500 series (bsc#1111666).
- USB: serial: option: add Quectel EG95 LTE modem (bsc#1111666).
- USB: serial: option: add support for ASKEY WWHC050 (git-fixes).
- USB: serial: option: add Telit LE910C1-EUX compositions (bsc#1051510).
- USB: serial: option: add Wistron Neweb D19Q1 (git-fixes).
- USB: serial: qcserial: add DW5816e QDL support (bsc#1051510).
- USB: serial: qcserial: Add DW5816e support (git-fixes).
- USB: serial: usb_wwan: do not resubmit rx urb on fatal errors (bsc#1051510).
- USB: serial: usb_wwan: do not resubmit rx urb on fatal errors (git-fixes).
- USB: sisusbvga: Change port variable from signed to unsigned (git-fixes).
- usb-storage: Add unusual_devs entry for JMicron JMS566 (git-fixes).
- USB: uas: add quirk for LaCie 2Big Quadra (git-fixes).
- USB: xhci: Fix NULL pointer dereference when enqueuing trbs from urb sg list (git-fixes).
- vfio/pci: Fix SR-IOV VF handling with MMIO blocking (bsc#1174123).
- vfs: Fix EOVERFLOW testing in put_compat_statfs64 (bnc#1151927 5.3.6).
- video: fbdev: sis: Remove unnecessary parentheses and commented code (bsc#1114279)
- video: fbdev: w100fb: Fix a potential double free (bsc#1051510).
- virtio-blk: handle block_device_operations callbacks after hot unplug (git fixes (block drivers)).
- virtio: virtio_console: add missing MODULE_DEVICE_TABLE() for rproc serial (git-fixes).
- vmxnet3: add geneve and vxlan tunnel offload support (bsc#1172484).
- vmxnet3: add support to get/set rx flow hash (bsc#1172484).
- vmxnet3: allow rx flow hash ops only when rss is enabled (bsc#1172484).
- vmxnet3: avoid format strint overflow warning (bsc#1172484).
- vmxnet3: prepare for version 4 changes (bsc#1172484).
- vmxnet3: Remove always false conditional statement (bsc#1172484).
- vmxnet3: remove redundant initialization of pointer 'rq' (bsc#1172484).
- vmxnet3: remove unused flag 'rxcsum' from struct vmxnet3_adapter (bsc#1172484).
- vmxnet3: Replace msleep(1) with usleep_range() (bsc#1172484).
- vmxnet3: update to version 4 (bsc#1172484).
- vmxnet3: use correct hdr reference when packet is encapsulated (bsc#1172484).
- vrf: Check skb for XFRM_TRANSFORMED flag (networking-stable-20_04_27).
- vsock: fix timeout in vsock_accept() (networking-stable-20_06_07).
- vt: ioctl, switch VT_IS_IN_USE and VT_BUSY to inlines (git-fixes).
- vt: selection, introduce vc_is_sel (git-fixes).
- vt: vt_ioctl: fix race in VT_RESIZEX (git-fixes).
- vt: vt_ioctl: fix use-after-free in vt_in_use() (git-fixes).
- vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console (git-fixes).
- vxlan: Avoid infinite loop when suppressing NS messages with invalid options (git-fixes).
- vxlan: check return value of gro_cells_init() (networking-stable-20_03_28).
- w1: Add subsystem kernel public interface (jsc#SLE-11048).
- w1: Fix slave count on 1-Wire bus (resend) (jsc#SLE-11048).
- w1: keep balance of mutex locks and refcnts (jsc#SLE-11048).
- w1: omap-hdq: cleanup to add missing newline for some dev_dbg (bsc#1051510).
- w1: use put_device() if device_register() fail (jsc#SLE-11048).
- watchdog: reset last_hw_keepalive time at start (git-fixes).
- watchdog: sp805: fix restart handler (bsc#1111666).
- wcn36xx: Fix error handling path in 'wcn36xx_probe()' (bsc#1051510).
- wil6210: add general initialization/size checks (bsc#1111666).
- wil6210: check rx_buff_mgmt before accessing it (bsc#1111666).
- wil6210: ignore HALP ICR if already handled (bsc#1111666).
- wil6210: make sure Rx ring sizes are correlated (git-fixes).
- wil6210: remove reset file from debugfs (git-fixes).
- wimax/i2400m: Fix potential urb refcnt leak (bsc#1051510).
- work around mvfs bug (bsc#1162063).
- workqueue: do not use wq_select_unbound_cpu() for bound works (bsc#1172130).
- x86/apic: Install an empty physflat_init_apic_ldr (bsc#1163309).
- x86/cpu/amd: Make erratum #1054 a legacy erratum (bsc#1114279).
- x86/entry/64: Fix unwind hints in kernel exit path (bsc#1058115).
- x86/entry/64: Fix unwind hints in register clearing code (bsc#1058115).
- x86/entry/64: Fix unwind hints in rewind_stack_do_exit() (bsc#1058115).
- x86/entry/64: Fix unwind hints in __switch_to_asm() (bsc#1058115).
- x86/events/intel/ds: Add PERF_SAMPLE_PERIOD into PEBS_FREERUNNING_FLAGS (git-fixes).
- x86: Fix early boot crash on gcc-10, third try (bsc#1114279).
- x86/hyperv: Allow guests to enable InvariantTSC (bsc#1170621, bsc#1170620).
- x86/Hyper-V: Free hv_panic_page when fail to register kmsg dump (bsc#1170617, bsc#1170618).
- x86/Hyper-V: Report crash data in die() when panic_on_oops is set (bsc#1170617, bsc#1170618).
- x86/Hyper-V: Report crash register data or kmsg before running crash kernel (bsc#1170617, bsc#1170618).
- x86/Hyper-V: Report crash register data when sysctl_record_panic_msg is not set (bsc#1170617, bsc#1170618).
- x86: hyperv: report value of misc_features (git fixes).
- x86/Hyper-V: Trigger crash enlightenment only once during system crash (bsc#1170617, bsc#1170618).
- x86/Hyper-V: Unload vmbus channel in hv panic callback (bsc#1170617, bsc#1170618).
- x86/kprobes: Avoid kretprobe recursion bug (bsc#1114279).
- x86/{mce,mm}: Unmap the entire page if the whole page is affected and poisoned (bsc#1172257).
- x86/reboot/quirks: Add MacBook6,1 reboot quirk (bsc#1114279).
- x86/resctrl: Fix invalid attempt at removing the default resource group (git-fixes).
- x86/resctrl: Preserve CDP enable over CPU hotplug (bsc#1114279).
- x86/unwind/orc: Do not skip the first frame for inactive tasks (bsc#1058115).
- x86/unwind/orc: Fix error handling in __unwind_start() (bsc#1058115).
- x86/unwind/orc: Fix error path for bad ORC entry type (bsc#1058115).
- x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks (bsc#1058115).
- x86/unwind/orc: Prevent unwinding before ORC initialization (bsc#1058115).
- x86/unwind: Prevent false warnings for non-current tasks (bsc#1058115).
- x86/xen: fix booting 32-bit pv guest (bsc#1071995).
- x86/xen: Make the boot CPU idle task reliable (bsc#1071995).
- x86/xen: Make the secondary CPU idle tasks reliable (bsc#1071995).
- xen/blkfront: fix memory allocation flags in blkfront_setup_indirect() (bsc#1168486).
- xen/pci: reserve MCFG areas earlier (bsc#1170145).
- xfrm: Always set XFRM_TRANSFORMED in xfrm{4,6}_output_finish (networking-stable-20_04_27).
- xfrm: fix error in comment (git fixes).
- xfs: clear PF_MEMALLOC before exiting xfsaild thread (git-fixes).
- xfs: Correctly invert xfs_buftarg LRU isolation logic (git-fixes).
- xfs: do not ever return a stale pointer from __xfs_dir3_free_read (git-fixes).
- xhci: Fix incorrect EP_STATE_MASK (git-fixes).
- xprtrdma: Fix completion wait during device removal (git-fixes).
Patchnames
SUSE-2020-2487,SUSE-SLE-Module-RT-15-SP1-2020-2487
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 15 SP1 RT kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2020-10135: Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key (bnc#1171988).\n- CVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).\n- CVE-2019-20908: An issue was discovered in drivers/firmware/efi/efi.c where incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032 (bnc#1173567).\n- CVE-2020-10781: zram sysfs resource consumption was fixed (bnc#1173074).\n- CVE-2020-15780: An issue was discovered in drivers/acpi/acpi_configfs.c where injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30 (bnc#1173573).\n- CVE-2020-15393: usbtest_disconnect in drivers/usb/misc/usbtest.c had a memory leak, aka CID-28ebeb8db770 (bnc#1173514).\n- CVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c had a deadlock if a coalescing operation fails (bnc#1171732).\n- CVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).\n- CVE-2020-10769: A buffer over-read flaw was found in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm\u0027s module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash. This flaw allowed a local attacker with user privileges to cause a denial of service (bnc#1173265).\n- CVE-2020-10773: A kernel stack information leak on s390/s390x was fixed (bnc#1172999).\n- CVE-2020-14416: A race condition in tty-\u003edisc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).\n- CVE-2020-10766: Fixed an issue which allowed an attacker with a local account to disable SSBD protection (bnc#1172781).\n- CVE-2020-10767: Fixed an issue where Indirect Branch Prediction Barrier was disabled in certain circumstances, leaving the system open to a spectre v2 style attack (bnc#1172782).\n- CVE-2020-10768: Fixed an issue with the prctl() function, where indirect branch speculation could be enabled even though it was diabled before (bnc#1172783).\n- CVE-2020-13974: Fixed a integer overflow in drivers/tty/vt/keyboard.c, if k_ascii is called several times in a row (bnc#1172775).\n- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it.\n This attack is known as Special Register Buffer Data Sampling (SRBDS) or \u0027CrossTalk\u0027 (bsc#1154824).\n- CVE-2020-13143: Fixed an out-of-bounds read in gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c (bsc#1171982).\n- CVE-2020-12769: Fixed an issue which could have allowed attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one (bsc#1171983).\n- CVE-2020-12659: Fixed an out-of-bounds write (by a user with the CAP_NET_ADMIN capability) due to improper headroom validation (bsc#1171214).\n- CVE-2020-12657: An a use-after-free in block/bfq-iosched.c (bsc#1171205).\n- CVE-2020-12656: Fixed an improper handling of certain domain_release calls leadingch could have led to a memory leak (bsc#1171219).\n- CVE-2020-12655: Fixed an issue which could have allowed attackers to trigger a sync of excessive duration via an XFS v5 image with crafted metadata (bsc#1171217).\n- CVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a remote AP to trigger a heap-based buffer overflow (bsc#1171202).\n- CVE-2020-12653: Fixed an issue in the wifi driver which could have allowed local users to gain privileges or cause a denial of service (bsc#1171195).\n- CVE-2020-12652: Fixed an issue which could have allowed local users to hold an incorrect lock during the ioctl operation and trigger a race condition (bsc#1171218).\n- CVE-2020-12464: Fixed a use-after-free due to a transfer without a reference (bsc#1170901).\n- CVE-2020-12114: Fixed a pivot_root race condition which could have allowed local users to cause a denial of service (panic) by corrupting a mountpoint reference counter (bsc#1171098).\n- CVE-2020-11669: Fixed an issue where arch/powerpc/kernel/idle_book3s.S did not have save/restore functionality for PNV_POWERSAVE_AMR, PNV_POWERSAVE_UAMOR, and PNV_POWERSAVE_AMOR (bnc#1169390).\n- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172317).\n- CVE-2020-10751: Fixed an improper implementation in SELinux LSM hook where it was assumed that an skb would only contain a single netlink message (bsc#1171189).\n- CVE-2020-10732: Fixed kernel data leak in userspace coredumps due to uninitialized data (bsc#1171220).\n- CVE-2020-10720: Fixed a use-after-free read in napi_gro_frags() (bsc#1170778).\n- CVE-2020-10711: Fixed a null pointer dereference in SELinux subsystem which could have allowed a remote network user to crash the kernel resulting in a denial of service (bsc#1171191).\n- CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev (bsc#1170056).\n- CVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a video driver. This could lead to local information disclosure with System execution privileges needed (bsc#1170345).\n- CVE-2019-20812: Fixed an issue in prb_calc_retire_blk_tmo() which could have resulted in a denial of service (bsc#1172453).\n- CVE-2019-20806: Fixed a null pointer dereference which may had lead to denial of service (bsc#1172199).\n- CVE-2019-19462: Fixed an issue which could have allowed local user to cause denial of service (bsc#1158265).\n- CVE-2019-20810: go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c did not call snd_card_free for a failure path, which caused a memory leak, aka CID-9453264ef586 (bnc#1172458).\n- CVE-2018-1000199: Fixed a potential local code execution via ptrace (bsc#1089895).\n\nThe following non-security bugs were fixed:\n\n- ACPI: CPPC: Fix reference count leak in acpi_cppc_processor_probe() (bsc#1051510).\n- ACPI: GED: add support for _Exx / _Lxx handler methods (bsc#1111666).\n- ACPI: GED: use correct trigger type field in _Exx / _Lxx handling (bsc#1111666).\n- ACPI: NFIT: Fix unlock on error in scrub_show() (bsc#1171753).\n- ACPI: PM: Avoid using power resources if there are none for D0 (bsc#1051510).\n- ACPI: sysfs: Fix pm_profile_attr type (bsc#1111666).\n- ACPI: sysfs: Fix reference count leak in acpi_sysfs_add_hotplug_profile() (bsc#1051510).\n- ACPI: video: Use native backlight on Acer Aspire 5783z (bsc#1111666).\n- ACPI: video: Use native backlight on Acer TravelMate 5735Z (bsc#1111666).\n- acpi/x86: ignore unspecified bit positions in the ACPI global lock field (bsc#1051510).\n- Add br_netfilter to kernel-default-base (bsc#1169020)\n- Add commit for git-fix that\u0027s not a fix This commit cleans up debug code but does not fix anything, and it relies on a new kernel function that isn\u0027t yet in this version of SLE.\n- agp/intel: Reinforce the barrier after GTT updates (bsc#1051510).\n- ALSA: ctxfi: Remove unnecessary cast in kfree (bsc#1051510).\n- ALSA: doc: Document PC Beep Hidden Register on Realtek ALC256 (bsc#1051510).\n- ALSA: dummy: Fix PCM format loop in proc output (bsc#1111666).\n- ALSA: es1688: Add the missed snd_card_free() (bsc#1051510).\n- ALSA: hda: Add driver blacklist (bsc#1051510).\n- ALSA: hda: Add ElkhartLake HDMI codec vid (bsc#1111666).\n- ALSA: hda: add sienna_cichlid audio asic id for sienna_cichlid up (bsc#1111666).\n- ALSA: hda: Always use jackpoll helper for jack update after resume (bsc#1051510).\n- ALSA: hda: call runtime_allow() for all hda controllers (bsc#1051510).\n- ALSA: hda: Do not release card at firmware loading error (bsc#1051510).\n- ALSA: hda: Explicitly permit using autosuspend if runtime PM is supported (bsc#1051510).\n- ALSA: hda: Fix potential access overflow in beep helper (bsc#1051510).\n- ALSA: hda/hdmi - enable runtime pm for newer AMD display audio (bsc#1111666).\n- ALSA: hda/hdmi: fix race in monitor detection during probe (bsc#1051510).\n- ALSA: hda/hdmi: fix without unlocked before return (bsc#1051510).\n- ALSA: hda: Honor PM disablement in PM freeze and thaw_noirq ops (bsc#1051510).\n- ALSA: hda: Keep the controller initialization even if no codecs found (bsc#1051510).\n- ALSA: hda - let hs_mic be picked ahead of hp_mic (bsc#1111666).\n- ALSA: hda: Match both PCI ID and SSID for driver blacklist (bsc#1111666).\n- ALSA: hda/realtek - Add a model for Thinkpad T570 without DAC workaround (bsc#1172017).\n- ALSA: hda/realtek - add a pintbl quirk for several Lenovo machines (bsc#1111666).\n- ALSA: hda/realtek - Add COEF workaround for ASUS ZenBook UX431DA (git-fixes).\n- ALSA: hda/realtek - Add HP new mute led supported for ALC236 (git-fixes).\n- ALSA: hda/realtek - Add LED class support for micmute LED (bsc#1111666).\n- ALSA: hda/realtek - Add more fixup entries for Clevo machines (git-fixes).\n- ALSA: hda/realtek - Add new codec supported for ALC245 (bsc#1051510).\n- ALSA: hda/realtek - Add new codec supported for ALC287 (git-fixes).\n- ALSA: hda/realtek: Add quirk for Samsung Notebook (git-fixes).\n- ALSA: hda/realtek - Add supported new mute Led for HP (git-fixes).\n- ALSA: hda/realtek - Enable headset mic of ASUS GL503VM with ALC295 (git-fixes).\n- ALSA: hda/realtek - Enable headset mic of ASUS UX550GE with ALC295 (git-fixes).\n- ALSA: hda/realtek: Enable headset mic of ASUS UX581LV with ALC295 (git-fixes).\n- ALSA: hda/realtek - Enable micmute LED on and HP system (bsc#1111666).\n- ALSA: hda/realtek - Enable Speaker for ASUS UX533 and UX534 (bsc#1111666).\n- ALSA: hda/realtek - Enable the headset mic on Asus FX505DT (bsc#1051510).\n- ALSA: hda/realtek - Fix S3 pop noise on Dell Wyse (git-fixes).\n- ALSA: hda/realtek - Fix silent output on Gigabyte X570 Aorus Xtreme (bsc#1111666).\n- ALSA: hda/realtek - Fix unexpected init_amp override (bsc#1051510).\n- ALSA: hda/realtek - Fix unused variable warning w/o CONFIG_LEDS_TRIGGER_AUDIO (bsc#1111666).\n- ALSA: hda/realtek - Introduce polarity for micmute LED GPIO (bsc#1111666).\n- ALSA: hda/realtek - Limit int mic boost for Thinkpad T530 (git-fixes bsc#1171293).\n- ALSA: hda/realtek - Two front mics on a Lenovo ThinkCenter (bsc#1051510).\n- ALSA: hda: Release resources at error in delayed probe (bsc#1051510).\n- ALSA: hda: Remove ASUS ROG Zenith from the blacklist (bsc#1051510).\n- ALSA: hda: Skip controller resume if not needed (bsc#1051510).\n- ALSA: hwdep: fix a left shifting 1 by 31 UB bug (git-fixes).\n- ALSA: ice1724: Fix invalid access for enumerated ctl items (bsc#1051510).\n- ALSA: iec1712: Initialize STDSP24 properly when using the model=staudio option (git-fixes).\n- ALSA: lx6464es - add support for LX6464ESe pci express variant (bsc#1111666).\n- ALSA: opl3: fix infoleak in opl3 (bsc#1111666).\n- ALSA: opti9xx: shut up gcc-10 range warning (bsc#1051510).\n- ALSA: pcm: disallow linking stream to itself (bsc#1111666).\n- ALSA: pcm: fix incorrect hw_base increase (git-fixes).\n- ALSA: pcm: oss: Fix regression by buffer overflow fix (bsc#1051510).\n- ALSA: pcm: oss: Place the plugin buffer overflow checks correctly (bsc#1170522).\n- ALSA: rawmidi: Fix racy buffer resize under concurrent accesses (git-fixes).\n- ALSA: usb-audio: Add connector notifier delegation (bsc#1051510).\n- ALSA: usb-audio: Add control message quirk delay for Kingston HyperX headset (git-fixes).\n- ALSA: usb-audio: Add duplex sound support for USB devices using implicit feedback (bsc#1111666).\n- ALSA: usb-audio: add mapping for ASRock TRX40 Creator (git-fixes).\n- ALSA: usb-audio: Add mixer workaround for TRX40 and co (bsc#1051510).\n- ALSA: usb-audio: Add Pioneer DJ DJM-900NXS2 support (bsc#1111666).\n- ALSA: usb-audio: Add quirk for Focusrite Scarlett 2i2 (bsc#1051510).\n- ALSA: usb-audio: add quirk for MacroSilicon MS2109 (bsc#1111666).\n- ALSA: usb-audio: Add static mapping table for ALC1220-VB-based mobos (bsc#1051510).\n- ALSA: usb-audio: Add vendor, product and profile name for HP Thunderbolt Dock (bsc#1111666).\n- ALSA: usb-audio: Apply async workaround for Scarlett 2i4 2nd gen (bsc#1051510).\n- ALSA: usb-audio: Check mapping at creating connector controls, too (bsc#1051510).\n- ALSA: usb-audio: Clean up quirk entries with macros (bsc#1111666).\n- ALSA: usb-audio: Correct a typo of NuPrime DAC-10 USB ID (bsc#1051510).\n- ALSA: usb-audio: Do not create jack controls for PCM terminals (bsc#1051510).\n- ALSA: usb-audio: Do not override ignore_ctl_error value from the map (bsc#1051510).\n- ALSA: usb-audio: Filter error from connector kctl ops, too (bsc#1051510).\n- ALSA: usb-audio: Fix inconsistent card PM state after resume (bsc#1111666).\n- ALSA: usb-audio: Fix packet size calculation (bsc#1111666).\n- ALSA: usb-audio: Fix racy list management in output queue (bsc#1111666).\n- ALSA: usb-audio: Fix usb audio refcnt leak when getting spdif (bsc#1051510).\n- ALSA: usb-audio: Improve frames size computation (bsc#1111666).\n- ALSA: usb-audio: Manage auto-pm of all bundled interfaces (bsc#1111666).\n- ALSA: usb-audio: mixer: volume quirk for ESS Technology Asus USB DAC (git-fixes).\n- ALSA: usb-audio: Quirks for Gigabyte TRX40 Aorus Master onboard audio (git-fixes).\n- ALSA: usb-audio: Use the new macro for HP Dock rename quirks (bsc#1111666).\n- ALSA: usx2y: Fix potential NULL dereference (bsc#1051510).\n- amdgpu: a NULL -\u003emm does not mean a thread is a kthread (git-fixes).\n- arm64: map FDT as RW for early_init_dt_scan() (jsc#SLE-12423).\n- ASoC: codecs: hdac_hdmi: Fix incorrect use of list_for_each_entry (bsc#1051510).\n- ASoC: dapm: connect virtual mux with default value (bsc#1051510).\n- ASoC: dapm: fixup dapm kcontrol widget (bsc#1051510).\n- ASoC: dpcm: allow start or stop during pause for backend (bsc#1051510).\n- ASoC: fix regwmask (bsc#1051510).\n- ASoC: Intel: atom: Take the drv-\u003elock mutex before calling sst_send_slot_map() (bsc#1051510).\n- ASoC: msm8916-wcd-digital: Reset RX interpolation path after use (bsc#1051510).\n- ASoC: samsung: Prevent clk_get_rate() calls in atomic context (bsc#1111666).\n- ASoC: topology: Check return value of pcm_new_ver (bsc#1051510).\n- ASoC: topology: use name_prefix for new kcontrol (bsc#1051510).\n- ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb (bsc#1111666).\n- ath9k: Fix use-after-free Read in ath9k_wmi_ctrl_rx (bsc#1111666).\n- ath9k: Fix use-after-free Write in ath9k_htc_rx_msg (bsc#1111666).\n- ath9x: Fix stack-out-of-bounds Write in ath9k_hif_usb_rx_cb (bsc#1111666).\n- ax25: fix setsockopt(SO_BINDTODEVICE) (networking-stable-20_05_27).\n- b43: Fix connection problem with WPA3 (bsc#1111666).\n- b43legacy: Fix case where channel status is corrupted (bsc#1051510).\n- b43_legacy: Fix connection problem with WPA3 (bsc#1111666).\n- batman-adv: Avoid spurious warnings from bat_v neigh_cmp implementation (bsc#1051510).\n- batman-adv: Do not schedule OGM for disabled interface (bsc#1051510).\n- batman-adv: fix batadv_nc_random_weight_tq (git-fixes).\n- batman-adv: Fix refcnt leak in batadv_show_throughput_override (git-fixes).\n- batman-adv: Fix refcnt leak in batadv_store_throughput_override (git-fixes).\n- batman-adv: Fix refcnt leak in batadv_v_ogm_process (git-fixes).\n- batman-adv: prevent TT request storms by not sending inconsistent TT TLVLs (bsc#1051510).\n- bcache: avoid unnecessary btree nodes flushing in btree_flush_write() (git fixes (block drivers)).\n- bcache: Fix an error code in bch_dump_read() (git fixes (block drivers)).\n- bcache: fix incorrect data type usage in btree_flush_write() (git fixes (block drivers)).\n- bcache: Revert \u0027bcache: shrink btree node cache after bch_btree_check()\u0027 (git fixes (block drivers)).\n- be2net: fix link failure after ethtool offline test (git-fixes).\n- blk-mq: honor IO scheduler for multiqueue devices (bsc#1165478).\n- blk-mq: simplify blk_mq_make_request() (bsc#1165478).\n- block, bfq: fix use-after-free in bfq_idle_slice_timer_body (bsc#1168760).\n- block/drbd: delete invalid function drbd_md_mark_dirty_ (bsc#1171527).\n- block: drbd: remove a stray unlock in __drbd_send_protocol() (bsc#1171599).\n- block: fix busy device checking in blk_drop_partitions again (bsc#1171948).\n- block: fix busy device checking in blk_drop_partitions (bsc#1171948).\n- block: fix memleak of bio integrity data (git fixes (block drivers)).\n- block: keep bdi-\u003eio_pages in sync with max_sectors_kb for stacked devices (bsc#1168762).\n- block: nr_sects_write(): Disable preemption on seqcount write (bsc#1173818).\n- block: remove QUEUE_FLAG_STACKABLE (git fixes (block drivers)).\n- block: remove the bd_openers checks in blk_drop_partitions (bsc#1171948).\n- block: sed-opal: fix sparse warning: convert __be64 data (git fixes (block drivers)).\n- Bluetooth: Add SCO fallback for invalid LMP parameters error (bsc#1111666).\n- Bluetooth: RFCOMM: fix ODEBUG bug in rfcomm_dev_ioctl (bsc#1051510).\n- bnxt_en: Fix AER reset logic on 57500 chips (git-fixes).\n- bnxt_en: Fix ethtool selftest crash under error conditions (git-fixes).\n- bnxt_en: Fix handling FRAG_ERR when NVM_INSTALL_UPDATE cmd fails (git-fixes).\n- bnxt_en: Fix ipv6 RFS filter matching logic (git-fixes).\n- bnxt_en: fix memory leaks in bnxt_dcbnl_ieee_getets() (networking-stable-20_03_28).\n- bnxt_en: fix NULL dereference in case SR-IOV configuration fails (git-fixes).\n- bnxt_en: Fix VF anti-spoof filter setup (networking-stable-20_05_12).\n- bnxt_en: Fix VLAN acceleration handling in bnxt_fix_features() (networking-stable-20_05_12).\n- bnxt_en: Improve AER slot reset (networking-stable-20_05_12).\n- bnxt_en: Reduce BNXT_MSIX_VEC_MAX value to supported CQs per PF (bsc#1104745).\n- bnxt_en: reinitialize IRQs when MTU is modified (networking-stable-20_03_14).\n- bnxt_en: Return error if bnxt_alloc_ctx_mem() fails (bsc#1104745 ).\n- bnxt_en: Return error when allocating zero size context memory (bsc#1104745).\n- bonding/alb: make sure arp header is pulled before accessing it (networking-stable-20_03_14).\n- bpf: Fix sk_psock refcnt leak when receiving message (bsc#1083647).\n- bpf: Forbid XADD on spilled pointers for unprivileged users (bsc#1083647).\n- brcmfmac: abort and release host after error (bsc#1051510).\n- brcmfmac: fix wrong location to get firmware feature (bsc#1111666).\n- brcmfmac: Transform compatible string for FW loading (bsc#1169771).\n- btrfs: add assertions for tree == inode-\u003eio_tree to extent IO helpers (bsc#1174438).\n- btrfs: add new helper btrfs_lock_and_flush_ordered_range (bsc#1174438).\n- btrfs: Always use a cached extent_state in btrfs_lock_and_flush_ordered_range (bsc#1174438).\n- btrfs: do not zero f_bavail if we have available space (bsc#1168081).\n- btrfs: do not zero f_bavail if we have available space (bsc#1168081).\n- btrfs: drop argument tree from btrfs_lock_and_flush_ordered_range (bsc#1174438).\n- Btrfs: fix deadlock with memory reclaim during scrub (bsc#1172127).\n- btrfs: fix extent_state leak in btrfs_lock_and_flush_ordered_range (bsc#1174438).\n- btrfs: fix failure of RWF_NOWAIT write into prealloc extent beyond eof (bsc#1174438).\n- btrfs: fix hang on snapshot creation after RWF_NOWAIT write (bsc#1174438).\n- btrfs: fix log context list corruption after rename whiteout error (bsc#1172342).\n- btrfs: fix partial loss of prealloc extent past i_size after fsync (bsc#1172343).\n- btrfs: fix RWF_NOWAIT write not failling when we need to cow (bsc#1174438).\n- btrfs: fix RWF_NOWAIT writes blocking on extent locks and waiting for IO (bsc#1174438).\n- btrfs: qgroup: Fix a bug that prevents qgroup to be re-enabled after disable (bsc#1172247).\n- btrfs: relocation: add error injection points for cancelling balance (bsc#1171417).\n- btrfs: relocation: Check cancel request after each data page read (bsc#1171417).\n- btrfs: relocation: Check cancel request after each extent found (bsc#1171417).\n- btrfs: relocation: Clear the DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417).\n- btrfs: relocation: Fix reloc root leakage and the NULL pointer reference caused by the leakage (bsc#1171417).\n- btrfs: relocation: Work around dead relocation stage loop (bsc#1171417).\n- btrfs: reloc: clear DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417 bsc#1160947 bsc#1172366).\n- btrfs: reloc: fix reloc root leak and NULL pointer dereference (bsc#1171417 bsc#1160947 bsc#1172366).\n- btrfs: Return EAGAIN if we can\u0027t start no snpashot write in check_can_nocow (bsc#1174438).\n- Btrfs: setup a nofs context for memory allocation at btrfs_create_tree() (bsc#1172127).\n- Btrfs: setup a nofs context for memory allocation at __btrfs_set_acl (bsc#1172127).\n- btrfs: use correct count in btrfs_file_write_iter() (bsc#1174438).\n- btrfs: Use newly introduced btrfs_lock_and_flush_ordered_range (bsc#1174438).\n- Btrfs: use nofs context when initializing security xattrs to avoid deadlock (bsc#1172127).\n- btrfs: volumes: Remove ENOSPC-prone btrfs_can_relocate() (bsc#1171124).\n- bus: sunxi-rsb: Return correct data when mixing 16-bit and 8-bit reads (bsc#1111666).\n- can: add missing attribute validation for termination (networking-stable-20_03_14).\n- carl9170: remove P2P_GO support (bsc#1111666).\n- cdc-acm: close race betrween suspend() and acm_softint (git-fixes).\n- CDC-ACM: heed quirk also in error handling (git-fixes).\n- cdc-acm: introduce a cool down (git-fixes).\n- ceph: check if file lock exists before sending unlock request (bsc#1168789).\n- ceph: convert mdsc-\u003ecap_dirty to a per-session list (bsc#1167104).\n- ceph: demote quotarealm lookup warning to a debug message (bsc#1171692).\n- ceph: fix double unlock in handle_cap_export() (bsc#1171694).\n- ceph: fix endianness bug when handling MDS session feature bits (bsc#1171695).\n- ceph: request expedited service on session\u0027s last cap flush (bsc#1167104).\n- cgroup, blkcg: Prepare some symbols for module and !CONFIG_CGROUP usages (bsc#1173857).\n- cgroup, netclassid: periodically release file_lock on classid updating (networking-stable-20_03_14).\n- char/random: Add a newline at the end of the file (jsc#SLE-12423).\n- CIFS: Allocate crypto structures on the fly for calculating signatures of incoming packets (bsc#1144333).\n- CIFS: Allocate encryption header through kmalloc (bsc#1144333).\n- CIFS: allow unlock flock and OFD lock across fork (bsc#1144333).\n- CIFS: check new file size when extending file by fallocate (bsc#1144333).\n- CIFS: cifspdu.h: Replace zero-length array with flexible-array member (bsc#1144333).\n- CIFS: clear PF_MEMALLOC before exiting demultiplex thread (bsc#1144333).\n- CIFS: do not share tcons with DFS (bsc#1144333).\n- CIFS: dump the session id and keys also for SMB2 sessions (bsc#1144333).\n- CIFS: ensure correct super block for DFS reconnect (bsc#1144333).\n- CIFS: Fix bug which the return value by asynchronous read is error (bsc#1144333).\n- CIFS: fix uninitialised lease_key in open_shroot() (bsc#1144333).\n- cifs: get rid of unused parameter in reconn_setup_dfs_targets() (bsc#1144333).\n- cifs: handle hostnames that resolve to same ip in failover (bsc#1144333 bsc#1161016).\n- CIFS: ignore cached share root handle closing errors (bsc#1166780).\n- CIFS: improve read performance for page size 64KB \u0026 cache=strict \u0026 vers=2.1+ (bsc#1144333).\n- CIFS: Increment num_remote_opens stats counter even in case of smb2_query_dir_first (bsc#1144333).\n- CIFS: minor update to comments around the cifs_tcp_ses_lock mutex (bsc#1144333).\n- CIFS: protect updating server-\u003edstaddr with a spinlock (bsc#1144333).\n- cifs: set up next DFS target before generic_ip_connect() (bsc#1144333 bsc#1161016).\n- CIFS: smb2pdu.h: Replace zero-length array with flexible-array member (bsc#1144333).\n- CIFS: smbd: Calculate the correct maximum packet size for segmented SMBDirect send/receive (bsc#1144333).\n- CIFS: smbd: Check and extend sender credits in interrupt context (bsc#1144333).\n- CIFS: smbd: Check send queue size before posting a send (bsc#1144333).\n- CIFS: smbd: Do not schedule work to send immediate packet on every receive (bsc#1144333).\n- CIFS: smbd: Merge code to track pending packets (bsc#1144333).\n- CIFS: smbd: Properly process errors on ib_post_send (bsc#1144333).\n- CIFS: smbd: Update receive credits before sending and deal with credits roll back on failure before sending (bsc#1144333).\n- CIFS: Warn less noisily on default mount (bsc#1144333).\n- clk: Add clk_hw_unregister_composite helper function definition (bsc#1051510).\n- clk: bcm2835: Fix return type of bcm2835_register_gate (bsc#1051510).\n- clk: clk-flexgen: fix clock-critical handling (bsc#1051510).\n- clk: imx6ull: use OSC clock during AXI rate change (bsc#1051510).\n- clk: imx: make mux parent strings const (bsc#1051510).\n- clk: mediatek: correct the clocks for MT2701 HDMI PHY module (bsc#1051510).\n- clk: qcom: rcg: Return failure for RCG update (bsc#1051510).\n- clk: sunxi: Fix incorrect usage of round_down() (bsc#1051510).\n- clk: sunxi-ng: a64: Fix gate bit of DSI DPHY (bsc#1051510).\n- clocksource/drivers/hyper-v: Set TSC clocksource as default w/ InvariantTSC (bsc#1170620, bsc#1170621).\n- clocksource: dw_apb_timer: Make CPU-affiliation being optional (bsc#1111666).\n- clocksource: dw_apb_timer_of: Fix missing clockevent timers (bsc#1051510).\n- compat_ioctl: block: handle BLKREPORTZONE/BLKRESETZONE (git fixes (block drivers)).\n- compat_ioctl: block: handle Persistent Reservations (git fixes (block drivers)).\n- component: Silence bind error on -EPROBE_DEFER (bsc#1051510).\n- config: Enable CONFIG_RCU_BOOST\n- configfs: Fix bool initialization/comparison (bsc#1051510).\n- copy_{to,from}_user(): consolidate object size checks (git fixes).\n- coresight: do not use the BIT() macro in the UAPI header (git fixes (block drivers)).\n- cpufreq: Register drivers only after CPU devices have been registered (bsc#1051510).\n- cpufreq: s3c64xx: Remove pointless NULL check in s3c64xx_cpufreq_driver_init (bsc#1051510).\n- cpuidle: Do not unset the driver if it is there already (bsc#1051510).\n- crypto: algboss - do not wait during notifier callback (bsc#1111666).\n- crypto: algif_skcipher - Cap recv SG list at ctx-\u003eused (bsc#1111666).\n- crypto: arm64/sha-ce - implement export/import (bsc#1051510).\n- crypto: caam - update xts sector size for large input length (bsc#1111666).\n- crypto: cavium/nitrox - Fix \u0027nitrox_get_first_device()\u0027 when ndevlist is fully iterated (bsc#1111666).\n- crypto: cavium/nitrox - Fix \u0027nitrox_get_first_device()\u0027 when ndevlist is fully iterated (git-fixes).\n- crypto: ccp - AES CFB mode is a stream cipher (git-fixes).\n- crypto: ccp - Clean up and exit correctly on allocation failure (git-fixes).\n- crypto: ccp - Cleanup misc_dev on sev_exit() (bsc#1114279).\n- crypto: ccp - Cleanup sp_dev_master in psp_dev_destroy() (bsc#1114279).\n- Crypto/chcr: fix for ccm(aes) failed test (bsc#1111666).\n- crypto: chelsio/chtls: properly set tp-\u003elsndtime (bsc#1111666).\n- crypto: mxs-dcp - fix scatterlist linearization for hash (bsc#1051510).\n- crypto: talitos - fix IPsec cipher in length (git-fixes).\n- crypto: talitos - reorder code in talitos_edesc_alloc() (git-fixes).\n- crypto: tcrypt - fix printed skcipher [a]sync mode (bsc#1051510).\n- cxgb4: fix MPS index overwrite when setting MAC address (bsc#1127355).\n- cxgb4: fix Txq restart check during backpressure (bsc#1127354 bsc#1127371).\n- debugfs: Add debugfs_create_xul() for hexadecimal unsigned long (git-fixes).\n- debugfs: Check module state before warning in {full/open}_proxy_open() (bsc#1173746).\n- debugfs_lookup(): switch to lookup_one_len_unlocked() (bsc#1171979).\n- Deprecate NR_UNSTABLE_NFS, use NR_WRITEBACK (bsc#1163403).\n- devinet: fix memleak in inetdev_init() (networking-stable-20_06_07).\n- devlink: fix return value after hitting end in region read (bsc#1109837).\n- devlink: validate length of param values (bsc#1109837).\n- devlink: validate length of region addr/len (bsc#1109837).\n- /dev/mem: Add missing memory barriers for devmem_inode (git-fixes).\n- /dev/mem: Revoke mappings when a driver claims the region (git-fixes).\n- dmaengine: dmatest: Fix iteration non-stop logic (bsc#1051510).\n- dmaengine: ste_dma40: fix unneeded variable warning (bsc#1051510).\n- dmaengine: tegra210-adma: Fix an error handling path in \u0027tegra_adma_probe()\u0027 (bsc#1111666).\n- dm btree: increase rebalance threshold in __rebalance2() (git fixes (block drivers)).\n- dm cache: fix a crash due to incorrect work item cancelling (git fixes (block drivers)).\n- dm crypt: fix benbi IV constructor crash if used in authenticated mode (git fixes (block drivers)).\n- dm: fix potential for q-\u003emake_request_fn NULL pointer (git fixes (block drivers)).\n- dm mpath: switch paths in dm_blk_ioctl() code path (bsc#1167574).\n- dm-raid1: fix invalid return value from dm_mirror (bsc#1172378).\n- dm space map common: fix to ensure new block isn\u0027t already in use (git fixes (block drivers)).\n- dm: various cleanups to md-\u003equeue initialization code (git fixes).\n- dm verity fec: fix hash block number in verity_fec_decode (git fixes (block drivers)).\n- dm verity fec: fix memory leak in verity_fec_dtr (git fixes (block drivers)).\n- dm writecache: fix data corruption when reloading the target (git fixes (block drivers)).\n- dm writecache: fix incorrect flush sequence when doing SSD mode commit (git fixes (block drivers)).\n- dm writecache: verify watermark during resume (git fixes (block drivers)).\n- dm zoned: fix invalid memory access (git fixes (block drivers)).\n- dm zoned: reduce overhead of backing device checks (git fixes (block drivers)).\n- dm zoned: remove duplicate nr_rnd_zones increase in dmz_init_zone() (git fixes (block drivers)).\n- dm zoned: support zone sizes smaller than 128MiB (git fixes (block drivers)).\n- dp83640: reverse arguments to list_add_tail (git-fixes).\n- dpaa_eth: fix usage as DSA master, try 3 (networking-stable-20_05_27).\n- driver-core, libnvdimm: Let device subsystems add local lockdep coverage (bsc#1171753).\n- drivers: hv: Add a module description line to the hv_vmbus driver (bsc#1172249, bsc#1172251).\n- Drivers: hv: Change flag to write log level in panic msg to false (bsc#1170617, bsc#1170618).\n- drivers/net/ibmvnic: Update VNIC protocol version reporting (bsc#1065729).\n- drivers: soc: ti: knav_qmss_queue: Make knav_gp_range_ops static (bsc#1051510).\n- drivers: w1: add hwmon support structures (jsc#SLE-11048).\n- drivers: w1: add hwmon temp support for w1_therm (jsc#SLE-11048).\n- drivers: w1: refactor w1_slave_show to make the temp reading functionality separate (jsc#SLE-11048).\n- drm: amd/acp: fix broken menu structure (bsc#1114279) \t* context changes\n- drm: amd/display: fix Kconfig help text (bsc#1113956) \t* only fix DEBUG_KERNEL_DC\n- drm/amdgpu: Correctly initialize thermal controller for GPUs with Powerplay table v0 (e.g Hawaii) (bsc#1111666).\n- drm/amdgpu: Fix oops when pp_funcs is unset in ACPI event (bsc#1111666).\n- drm/amd/powerplay: force the trim of the mclk dpm_levels if OD is (bsc#1113956)\n- drm/atomic: Take the atomic toys away from X (bsc#1112178) \t* context changes\n- drm/bochs: downgrade pci_request_region failure from error to warning (bsc#1051510).\n- drm: bridge: adv7511: Extend list of audio sample rates (bsc#1111666).\n- drm/crc: Actually allow to change the crc source (bsc#1114279) \t* offset changes\n- drm/dp_mst: Fix clearing payload state on topology disable (bsc#1051510).\n- drm/dp_mst: Increase ACT retry timeout to 3s (bsc#1113956) * context changes\n- drm/dp_mst: Reformat drm_dp_check_act_status() a bit (bsc#1051510).\n- drm_dp_mst_topology: fix broken drm_dp_sideband_parse_remote_dpcd_read() (bsc#1051510).\n- drm/drm_dp_mst:remove set but not used variable \u0027origlen\u0027 (bsc#1051510).\n- drm/edid: Fix off-by-one in DispID DTD pixel clock (bsc#1114279)\n- drm: encoder_slave: fix refcouting error for modules (bsc#1111666).\n- drm: encoder_slave: fix refcouting error for modules (bsc#1114279)\n- drm/etnaviv: fix perfmon domain interation (bsc#1113956)\n- drm/etnaviv: rework perfmon query infrastructure (bsc#1112178)\n- drm/i915: Apply Wa_1406680159:icl,ehl as an engine workaround (bsc#1112178) \t* rename gt/intel_workarounds.c to intel_workarounds.c \t* context changes\n- drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of (bsc#1114279)\n- drm/i915: HDCP: fix Ri prime check done during link check (bsc#1112178) \t* rename display/intel_hdmi.c to intel_hdmi.c \t* context changes\n- drm/i915/icl+: Fix hotplug interrupt disabling after storm detection (bsc#1112178)\n- drm/i915: properly sanity check batch_start_offset (bsc#1114279) \t* renamed display/intel_fbc.c -\u003e intel_fb.c \t* renamed gt/intel_rc6.c -\u003e intel_pm.c \t* context changes\n- drm/i915: Whitelist context-local timestamp in the gen9 cmdparser (bsc#1111666).\n- drm/mediatek: Check plane visibility in atomic_update (bsc#1113956) * context changes\n- drm/meson: Delete an error message in meson_dw_hdmi_bind() (bsc#1051510).\n- drm/msm/dpu: fix error return code in dpu_encoder_init (bsc#1111666).\n- drm/msm: stop abusing dma_map/unmap for cache (bsc#1051510).\n- drm/msm: Use the correct dma_sync calls harder (bsc#1051510).\n- drm/msm: Use the correct dma_sync calls in msm_gem (bsc#1051510).\n- drm: NULL pointer dereference [null-pointer-deref] (CWE 476) problem (bsc#1114279)\n- drm: panel-orientation-quirks: Add quirk for Asus T101HA panel (bsc#1111666).\n- drm: panel-orientation-quirks: Use generic orientation-data for Acer S1003 (bsc#1111666).\n- drm/qxl: qxl_release leak in qxl_draw_dirty_fb() (bsc#1051510).\n- drm/qxl: qxl_release leak in qxl_hw_surface_alloc() (bsc#1051510).\n- drm/qxl: qxl_release use after free (bsc#1051510).\n- drm/qxl: Use correct notify port address when creating cursor ring (bsc#1113956)\n- drm/radeon: fix double free (bsc#1113956)\n- drm/radeon: fix fb_div check in ni_init_smc_spll_table() (bsc#1113956)\n- drm: Remove PageReserved manipulation from drm_pci_alloc (bsc#1114279) \t* offset changes\n- drm/sun4i: dsi: Allow binding the host without a panel (bsc#1113956)\n- drm/sun4i: dsi: Avoid hotplug race with DRM driver bind (bsc#1113956)\n- drm/sun4i: dsi: Remove incorrect use of runtime PM (bsc#1113956) \t* context changes\n- drm/sun4i: dsi: Remove unused drv from driver context (bsc#1113956) \t* context changes \t* keep include of sun4i_drv.h\n- drm/sun4i: hdmi ddc clk: Fix size of m divider (bsc#1111666).\n- drm/tegra: hub: Do not enable orphaned window group (bsc#1111666).\n- drm/vkms: Hold gem object while still in-use (bsc#1113956) * context changes\n- dump_stack: avoid the livelock of the dump_lock (git fixes (block drivers)).\n- e1000: Distribute switch variables for initialization (bsc#1111666).\n- e1000e: Disable TSO for buffer overrun workaround (bsc#1051510).\n- e1000e: Do not wake up the system via WOL if device wakeup is disabled (bsc#1051510).\n- e1000e: Relax condition to trigger reset for ME workaround (bsc#1111666).\n- EDAC/amd64: Read back the scrub rate PCI register on F15h (bsc#1114279).\n- EDAC, sb_edac: Add support for systems with segmented PCI buses (bsc#1169525).\n- efi/random: Increase size of firmware supplied randomness (jsc#SLE-12423).\n- efi/random: Treat EFI_RNG_PROTOCOL output as bootloader randomness (jsc#SLE-12423).\n- efi: READ_ONCE rng seed size before munmap (jsc#SLE-12423).\n- efi: Reorder pr_notice() with add_device_randomness() call (jsc#SLE-12423).\n- evm: Check also if *tfm is an error pointer in init_desc() (bsc#1051510).\n- evm: Fix a small race in init_desc() (bsc#1051510).\n- ext4: add cond_resched() to __ext4_find_entry() (bsc#1166862).\n- ext4: Check for non-zero journal inum in ext4_calculate_overhead (bsc#1167288).\n- ext4: do not assume that mmp_nodename/bdevname have NUL (bsc#1166860).\n- ext4: do not zeroout extents beyond i_disksize (bsc#1167851).\n- ext4: fix a data race at inode-\u003ei_blocks (bsc#1171835).\n- ext4: fix a data race in EXT4_I(inode)-\u003ei_disksize (bsc#1166861).\n- ext4: fix extent_status fragmentation for plain files (bsc#1171949).\n- ext4: fix incorrect group count in ext4_fill_super error message (bsc#1168765).\n- ext4: fix incorrect inodes per group in error message (bsc#1168764).\n- ext4: fix partial cluster initialization when splitting extent (bsc#1173839).\n- ext4: fix potential race between online resizing and write operations (bsc#1166864).\n- ext4: fix potential race between s_flex_groups online resizing and access (bsc#1166867).\n- ext4: fix potential race between s_group_info online resizing and access (bsc#1166866).\n- ext4: fix race between ext4_sync_parent() and rename() (bsc#1173838).\n- ext4: fix race between writepages and enabling EXT4_EXTENTS_FL (bsc#1166870).\n- ext4: fix support for inode sizes \u003e 1024 bytes (bsc#1164284).\n- ext4, jbd2: ensure panic by fix a race between jbd2 abort and ext4 error handlers (bsc#1173833).\n- ext4: potential crash on allocation error in ext4_alloc_flex_bg_array() (bsc#1166940).\n- ext4: rename s_journal_flag_rwsem to s_writepages_rwsem (bsc#1166868).\n- ext4: use non-movable memory for superblock readahead (bsc#1171952).\n- ext4: validate the debug_want_extra_isize mount option at parse time (bsc#1163897).\n- extcon: adc-jack: Fix an error handling path in \u0027adc_jack_probe()\u0027 (bsc#1051510).\n- fanotify: fix ignore mask logic for events on child and on dir (bsc#1172719).\n- fanotify: fix merging marks masks with FAN_ONDIR (bsc#1171679).\n- fat: fix uninit-memory access for partial initialized inode (bsc#1051510).\n- fat: work around race with userspace\u0027s read via blockdev while mounting (bsc#1051510).\n- fbcon: fix null-ptr-deref in fbcon_switch (bsc#1114279) \t* rename drivers/video/fbdev/core to drivers/video/console \t* context changes\n- fbdev: potential information leak in do_fb_ioctl() (bsc#1114279)\n- fbmem: Adjust indentation in fb_prepare_logo and fb_blank (bsc#1114279)\n- fdt: add support for rng-seed (jsc#SLE-12423).\n- fdt: Update CRC check for rng-seed (jsc#SLE-12423).\n- fib: add missing attribute validation for tun_id (networking-stable-20_03_14).\n- firmware: imx: scu: Fix corruption of header (git-fixes).\n- firmware: imx: scu: Fix possible memory leak in imx_scu_probe() (bsc#1111666).\n- firmware: qcom: scm: fix compilation error when disabled (bsc#1051510).\n- Fix boot crash with MD (bsc#1174343)\n- fix multiplication overflow in copy_fdtable() (bsc#1173825).\n- fpga: dfl: afu: Corrected error handling levels (git-fixes).\n- fq_codel: fix TCA_FQ_CODEL_DROP_BATCH_SIZE sanity checks (networking-stable-20_05_12).\n- fs/cifs: fix gcc warning in sid_to_id (bsc#1144333).\n- fs/seq_file.c: simplify seq_file iteration code and interface (bsc#1170125).\n- gpiolib: Document that GPIO line names are not globally unique (bsc#1051510).\n- gpio: tegra: mask GPIO IRQs during IRQ shutdown (bsc#1051510).\n- gpu: host1x: Detach driver on unregister (bsc#1111666).\n- gpu: ipu-v3: pre: do not trigger update if buffer address does not change (bsc#1111666).\n- gre: fix uninit-value in __iptunnel_pull_header (networking-stable-20_03_14).\n- HID: hid-input: clear unmapped usages (git-fixes).\n- HID: hyperv: Add a module description line (bsc#1172249, bsc#1172251).\n- HID: i2c-hid: add Trekstor Primebook C11B to descriptor override (git-fixes).\n- HID: i2c-hid: override HID descriptors for certain devices (git-fixes).\n- HID: magicmouse: do not set up autorepeat (git-fixes).\n- HID: multitouch: add eGalaxTouch P80H84 support (bsc#1051510).\n- HID: sony: Fix for broken buttons on DS3 USB dongles (bsc#1051510).\n- HID: wacom: Read HID_DG_CONTACTMAX directly for non-generic devices (git-fixes).\n- hrtimer: Annotate lockless access to timer-\u003estate (git fixes (block drivers)).\n- hsr: add restart routine into hsr_get_node_list() (networking-stable-20_03_28).\n- hsr: check protocol version in hsr_newlink() (networking-stable-20_04_17).\n- hsr: fix general protection fault in hsr_addr_is_self() (networking-stable-20_03_28).\n- hsr: set .netnsok flag (networking-stable-20_03_28).\n- hsr: use rcu_read_lock() in hsr_get_node_{list/status}() (networking-stable-20_03_28).\n- hv_netvsc: Fix netvsc_start_xmit\u0027s return type (git-fixes).\n- hwmon: (acpi_power_meter) Fix potential memory leak in acpi_power_meter_add() (bsc#1111666).\n- hwmon: (emc2103) fix unable to change fan pwm1_enable attribute (bsc#1111666).\n- hwmon: (max6697) Make sure the OVERT mask is set correctly (bsc#1111666).\n- i2c: acpi: Force bus speed to 400KHz if a Silead touchscreen is present (git-fixes).\n- i2c: acpi: put device when verifying client fails (git-fixes).\n- i2c: algo-pca: Add 0x78 as SCL stuck low status for PCA9665 (bsc#1111666).\n- i2c: brcmstb: remove unused struct member (git-fixes).\n- i2c: core: Allow empty id_table in ACPI case as well (git-fixes).\n- i2c: core: decrease reference count of device node in i2c_unregister_device (git-fixes).\n- i2c: dev: Fix the race between the release of i2c_dev and cdev (bsc#1051510).\n- i2c: eg20t: Load module automatically if ID matches (bsc#1111666).\n- i2c: fix missing pm_runtime_put_sync in i2c_device_probe (git-fixes).\n- i2c-hid: properly terminate i2c_hid_dmi_desc_override_table array (git-fixes).\n- i2c: hix5hd2: add missed clk_disable_unprepare in remove (bsc#1051510).\n- i2c: i801: Do not add ICH_RES_IO_SMI for the iTCO_wdt device (git-fixes).\n- i2c: iproc: Stop advertising support of SMBUS quick cmd (git-fixes).\n- i2c: isch: Remove unnecessary acpi.h include (git-fixes).\n- i2c: jz4780: silence log flood on txabrt (bsc#1051510).\n- i2c: mlxcpld: check correct size of maximum RECV_LEN packet (bsc#1111666).\n- i2c: mux: demux-pinctrl: Fix an error handling path in \u0027i2c_demux_pinctrl_probe()\u0027 (bsc#1051510).\n- i2c: st: fix missing struct parameter description (bsc#1051510).\n- i40e: reduce stack usage in i40e_set_fc (git-fixes).\n- IB/hfi1: Do not destroy hfi1_wq when the device is shut down (bsc#1174409).\n- IB/hfi1: Do not destroy link_wq when the device is shut down (bsc#1174409).\n- IB/mlx5: Fix missing congestion control debugfs on rep rdma device (bsc#1103991).\n- ibmveth: Fix max MTU limit (bsc#1173428 ltc#186397).\n- ibmvfc: do not send implicit logouts prior to NPIV login (bsc#1169625 ltc#184611).\n- ibmvnic: continue to init in CRQ reset returns H_CLOSED (bsc#1173280 ltc#185369).\n- ibmvnic: Flush existing work items before device removal (bsc#1065729).\n- ibmvnic: Harden device login requests (bsc#1170011 ltc#183538).\n- ibmvnic: Skip fatal error reset after passive init (bsc#1171078 ltc#184239).\n- iio:ad7797: Use correct attribute_group (bsc#1051510).\n- iio: adc: stm32-adc: fix device used to request dma (bsc#1051510).\n- iio: adc: stm32-adc: fix sleep in atomic context (git-fixes).\n- iio: adc: stm32-adc: Use dma_request_chan() instead dma_request_slave_channel() (bsc#1051510).\n- iio: buffer: Do not allow buffers without any channels enabled to be activated (bsc#1051510).\n- iio: dac: vf610: Fix an error handling path in \u0027vf610_dac_probe()\u0027 (bsc#1051510).\n- iio:health:afe4404 Fix timestamp alignment and prevent data leak (bsc#1111666).\n- iio:humidity:hdc100x Fix alignment and data leak issues (bsc#1111666).\n- iio:magnetometer:ak8974: Fix alignment and data leak issues (bsc#1111666).\n- iio: mma8452: Add missed iio_device_unregister() call in mma8452_probe() (bsc#1111666).\n- iio: potentiostat: lmp9100: fix iio_triggered_buffer_{predisable,postenable} positions (bsc#1051510).\n- iio: pressure: bmp280: Tolerate IRQ before registering (bsc#1051510).\n- iio:pressure:ms5611 Fix buffer element alignment (bsc#1111666).\n- iio: pressure: zpa2326: handle pm_runtime_get_sync failure (bsc#1111666).\n- iio: sca3000: Remove an erroneous \u0027get_device()\u0027 (bsc#1051510).\n- iio: xilinx-xadc: Fix ADC-B powerdown (bsc#1051510).\n- iio: xilinx-xadc: Fix clearing interrupt when enabling trigger (bsc#1051510).\n- iio: xilinx-xadc: Fix sequencer configuration for aux channels in simultaneous mode (bsc#1051510).\n- ima: Directly assign the ima_default_policy pointer to ima_rules (bsc#1051510).\n- ima: Fix ima digest hash table key calculation (bsc#1051510).\n- ima: Fix return value of ima_write_policy() (git-fixes).\n- include/asm-generic/topology.h: guard cpumask_of_node() macro argument (bsc#1148868).\n- Input: evdev - call input_flush_device() on release(), not flush() (bsc#1051510).\n- Input: hyperv-keyboard - add module description (bsc#1172249, bsc#1172251).\n- Input: i8042 - add Acer Aspire 5738z to nomux list (bsc#1051510).\n- Input: i8042 - add Lenovo XiaoXin Air 12 to i8042 nomux list (bsc#1111666).\n- Input: i8042 - add ThinkPad S230u to i8042 reset list (bsc#1051510).\n- input: i8042 - Remove special PowerPC handling (git-fixes).\n- Input: raydium_i2c_ts - use true and false for boolean values (bsc#1051510).\n- Input: synaptics - add a second working PNP_ID for Lenovo T470s (bsc#1111666).\n- Input: synaptics - enable RMI on HP Envy 13-ad105ng (bsc#1051510).\n- Input: synaptics-rmi4 - fix error return code in rmi_driver_probe() (bsc#1051510).\n- Input: synaptics-rmi4 - really fix attn_data use-after-free (git-fixes).\n- Input: usbtouchscreen - add support for BonXeon TP (bsc#1051510).\n- Input: xpad - add custom init packet for Xbox One S controllers (bsc#1051510).\n- intel_idle: Graceful probe failure when MWAIT is disabled (bsc#1174115).\n- intel_th: Fix a NULL dereference when hub driver is not loaded (bsc#1111666).\n- intel_th: pci: Add Elkhart Lake CPU support (bsc#1051510).\n- iommu/amd: Call domain_flush_complete() in update_domain() (bsc#1172096).\n- iommu/amd: Do not flush Device Table in iommu_map_page() (bsc#1172097).\n- iommu/amd: Do not loop forever when trying to increase address space (bsc#1172098).\n- iommu/amd: Fix legacy interrupt remapping for x2APIC-enabled system (bsc#1172099).\n- iommu/amd: Fix over-read of ACPI UID from IVRS table (bsc#1172101).\n- iommu/amd: Fix race in increase_address_space()/fetch_pte() (bsc#1172102).\n- iommu/amd: Fix the configuration of GCR3 table root pointer (bsc#1169057).\n- iommu/amd: Update Device Table in increase_address_space() (bsc#1172103).\n- iommu: Fix reference count leak in iommu_group_alloc (bsc#1172397).\n- ip6_tunnel: Allow rcv/xmit even if remote address is a local address (bsc#1166978).\n- ipmi: fix hung processes in __get_guid() (git-fixes).\n- ipv4: fix a RCU-list lock in fib_triestat_seq_show (networking-stable-20_04_02).\n- ipv6/addrconf: call ipv6_mc_up() for non-Ethernet interface (networking-stable-20_03_14).\n- ipv6: do not auto-add link-local address to lag ports (networking-stable-20_04_09).\n- ipv6: fix IPV6_ADDRFORM operation logic (bsc#1171662).\n- ipv6: Fix nlmsg_flags when splitting a multipath route (networking-stable-20_03_01).\n- ipv6: fix restrict IPV6_ADDRFORM operation (bsc#1171662).\n- ipv6: Fix route replacement with dev-only route (networking-stable-20_03_01).\n- ipvlan: add cond_resched_rcu() while processing muticast backlog (networking-stable-20_03_14).\n- ipvlan: call dev_change_flags when ipvlan mode is reset (git-fixes).\n- ipvlan: do not add hardware address of master to its unicast filter list (bsc#1137325).\n- ipvlan: do not deref eth hdr before checking it\u0027s set (networking-stable-20_03_14).\n- ipvlan: do not use cond_resched_rcu() in ipvlan_process_multicast() (networking-stable-20_03_14).\n- irqchip/bcm2835: Quiesce IRQs left enabled by bootloader (bsc#1051510).\n- irqdomain: Fix a memory leak in irq_domain_push_irq() (bsc#1051510).\n- iwlwifi: pcie: actually release queue memory in TVQM (bsc#1051510).\n- ixgbe: do not check firmware errors (bsc#1170284).\n- ixgbevf: Remove limit of 10 entries for unicast filter list (git-fixes).\n- jbd2: avoid leaking transaction credits when unreserving handle (bsc#1173845).\n- jbd2: Preserve kABI when adding j_abort_mutex (bsc#1173833).\n- kabi fix for (bsc#1168202).\n- kabi fix for early XHCI debug (git-fixes).\n- kabi for for md: improve handling of bio with REQ_PREFLUSH in md_flush_request() (git-fixes).\n- kabi: hv: prevent struct device_node to become defined (bsc#1172871).\n- kabi: ppc64le: prevent struct dma_map_ops to become defined (jsc#SLE-12423).\n- kABI: protect struct mlx5_cmd_work_ent (kabi).\n- kABI: reintroduce inet_hashtables.h include to l2tp_ip (kabi).\n- kabi/severities: Do not track KVM internal symbols.\n- kabi/severities: Ingnore get_dev_data() The function is internal to the AMD IOMMU driver and must not be called by any third party.\n- kabi workaround for snd_rawmidi buffer_ref field addition (git-fixes).\n- kernfs: fix barrier usage in __kernfs_new_node() (bsc#1111666).\n- KEYS: reaching the keys quotas correctly (bsc#1051510).\n- KVM: arm64: Change hyp_panic()s dependency on tpidr_el2 (bsc#1133021).\n- KVM: arm64: Stop save/restoring host tpidr_el1 on VHE (bsc#1133021).\n- KVM: Check validity of resolved slot when searching memslots (bsc#1172104).\n- KVM: nVMX: Do not reread VMCS-agnostic state when switching VMCS (bsc#1114279).\n- KVM: nVMX: Skip IBPB when switching between vmcs01 and vmcs02 (bsc#1114279).\n- KVM: s390: vsie: Fix delivery of addressing exceptions (git-fixes).\n- KVM: s390: vsie: Fix possible race when shadowing region 3 tables (git-fixes).\n- KVM: s390: vsie: Fix region 1 ASCE sanity shadow address checks (git-fixes).\n- KVM: SVM: Fix potential memory leak in svm_cpu_init() (bsc#1171736).\n- KVM x86: Extend AMD specific guest behavior to Hygon virtual CPUs (bsc#1152489).\n- KVM: x86: Fix APIC page invalidation race (bsc#1174122).\n- kvm: x86: Fix L1TF mitigation for shadow MMU (bsc#1171904).\n- KVM: x86/mmu: Set mmio_value to \u00270\u0027 if reserved #PF can\u0027t be generated (bsc#1171904).\n- KVM: x86: only do L1TF workaround on affected processors (bsc#1171904).\n- l2tp: add sk_family checks to l2tp_validate_socket (networking-stable-20_06_07).\n- l2tp: Allow management of tunnels and session in user namespace (networking-stable-20_04_17).\n- l2tp: do not use inet_hash()/inet_unhash() (networking-stable-20_06_07).\n- libata: Remove extra scsi_host_put() in ata_scsi_add_hosts() (bsc#1051510).\n- libata: Return correct status in sata_pmp_eh_recover_pm() when ATA_DFLAG_DETACH is set (bsc#1051510).\n- libceph: do not omit recovery_deletes in target_copy() (bsc#1174113).\n- libceph: ignore pool overlay and cache logic on redirects (bsc#1173146).\n- libfs: fix infoleak in simple_attr_read() (bsc#1168881).\n- libnvdimm/bus: Fix wait_nvdimm_bus_probe_idle() ABBA deadlock (bsc#1171753).\n- libnvdimm/bus: Prepare the nd_ioctl() path to be re-entrant (bsc#1171753).\n- libnvdimm/bus: Stop holding nvdimm_bus_list_mutex over __nd_ioctl() (bsc#1171753).\n- libnvdimm: cover up changes in struct nvdimm_bus (bsc#1171753).\n- libnvdimm: cover up nd_pfn_sb changes (bsc#1171759).\n- libnvdimm/dax: Pick the right alignment default when creating dax devices (bsc#1171759).\n- libnvdimm/label: Remove the dpa align check (bsc#1171759).\n- libnvdimm/of_pmem: Provide a unique name for bus provider (bsc#1171739).\n- libnvdimm/pfn_dev: Add a build check to make sure we notice when struct page size change (bsc#1171743).\n- libnvdimm/pfn_dev: Add page size and struct page size to pfn superblock (bsc#1171759).\n- libnvdimm/pfn: Prevent raw mode fallback if pfn-infoblock valid (bsc#1171743).\n- libnvdimm/pmem: Advance namespace seed for specific probe errors (bsc#1171743).\n- libnvdimm/region: Initialize bad block for volatile namespaces (bnc#1151927 5.3.6).++ kernel-source-rt.spec (revision 4)Release: \u0026lt;RELEASE\u003e.g93af9dfProvides: %name-srchash-93af9df3581407689c1ac5b0aa06fcfb62b08f1c\n- libnvdimm/region: Rewrite _probe_success() to _advance_seeds() (bsc#1171743).\n- libnvdimm: Use PAGE_SIZE instead of SZ_4K for align check (bsc#1171759).\n- lib: raid6: fix awk build warnings (git fixes (block drivers)).\n- lib/raid6/test: fix build on distros whose /bin/sh is not bash (git fixes (block drivers)).\n- lib/stackdepot.c: fix global out-of-bounds in stack_slabs (git fixes (block drivers)).\n- livepatch: Apply vmlinux-specific KLP relocations early (bsc#1071995).\n- livepatch: Disallow vmlinux.ko (bsc#1071995).\n- livepatch: Make klp_apply_object_relocs static (bsc#1071995).\n- livepatch: Prevent module-specific KLP rela sections from referencing vmlinux symbols (bsc#1071995).\n- livepatch: Remove .klp.arch (bsc#1071995).\n- locks: print unsigned ino in /proc/locks (bsc#1171951). \n- loop: replace kill_bdev with invalidate_bdev (bsc#1173820).\n- lpfc_debugfs: get rid of pointless access_ok() (bsc#1172687 bsc#1171530).\n- lpfc: Synchronize NVME transport and lpfc driver devloss_tmo (bcs#1173060).\n- mac80211: add ieee80211_is_any_nullfunc() (bsc#1051510).\n- mac80211: add option for setting control flags (bsc#1111666).\n- mac80211: Do not send mesh HWMP PREQ if HWMP is disabled (bsc#1051510).\n- mac80211_hwsim: Use kstrndup() in place of kasprintf() (bsc#1051510).\n- mac80211: mesh: fix discovery timer re-arming issue / crash (bsc#1051510).\n- mac80211: set IEEE80211_TX_CTRL_PORT_CTRL_PROTO for nl80211 TX (bsc#1111666).\n- macsec: avoid to set wrong mtu (bsc#1051510).\n- macsec: restrict to ethernet devices (networking-stable-20_03_28).\n- macvlan: add cond_resched() during multicast processing (networking-stable-20_03_14).\n- macvlan: fix null dereference in macvlan_device_event() (bsc#1051510).\n- mailbox: imx: Disable the clock on devm_mbox_controller_register() failure (git-fixes).\n- md: Avoid namespace collision with bitmap API (git fixes (block drivers)).\n- md: improve handling of bio with REQ_PREFLUSH in md_flush_request() (git-fixes).\n- md/raid0: Fix an error message in raid0_make_request() (git fixes (block drivers)).\n- md/raid10: prevent access of uninitialized resync_pages offset (git-fixes).\n- mdraid: fix read/write bytes accounting (bsc#1172537).\n- md: use memalloc scope APIs in mddev_suspend()/mddev_resume() (bsc#1166985)).\n- media: cec: silence shift wrapping warning in __cec_s_log_addrs() (git-fixes).\n- media: dib0700: fix rc endpoint lookup (bsc#1051510).\n- media: dvb: return -EREMOTEIO on i2c transfer failure (bsc#1051510).\n- media: flexcop-usb: fix endpoint sanity check (git-fixes).\n- media: go7007: Fix URB type for interrupt handling (bsc#1051510).\n- media: platform: fcp: Set appropriate DMA parameters (bsc#1051510).\n- media: si2157: Better check for running tuner in init (bsc#1111666).\n- media: tda10071: fix unsigned sign extension overflow (bsc#1051510).\n- media: ti-vpe: cal: fix disable_irqs to only the intended target (git-fixes).\n- media: usbtv: fix control-message timeouts (bsc#1051510).\n- media: v4l2-core: fix entity initialization in device_register_subdev (bsc#1051510).\n- media: vsp1: tidyup VI6_HGT_LBn_H() macro (bsc#1051510).\n- media: xirlink_cit: add missing descriptor sanity checks (bsc#1051510).\n- mei: release me_cl object reference (bsc#1051510).\n- mfd: dln2: Fix sanity checking for endpoints (bsc#1051510).\n- misc: pci_endpoint_test: Fix to support \u003e 10 pci-endpoint-test devices (bsc#1051510).\n- mlxsw: core: Do not use WQ_MEM_RECLAIM for mlxsw ordered workqueue (git-fixes).\n- mlxsw: core: Do not use WQ_MEM_RECLAIM for mlxsw workqueue (git-fixes).\n- mlxsw: Fix some IS_ERR() vs NULL bugs (networking-stable-20_04_27).\n- mlxsw: pci: Return error on PCI reset timeout (git-fixes).\n- mlxsw: spectrum_acl_tcam: Position vchunk in a vregion list properly (networking-stable-20_05_12).\n- mlxsw: spectrum: Disallow prio-tagged packets when PVID is removed (git-fixes).\n- mlxsw: spectrum_dpipe: Add missing error path (git-fixes).\n- mlxsw: spectrum_flower: Do not stop at FLOW_ACTION_VLAN_MANGLE (networking-stable-20_04_09).\n- mlxsw: spectrum_mr: Fix list iteration in error path (bsc#1112374).\n- mlxsw: spectrum: Prevent force of 56G (git-fixes).\n- mlxsw: spectrum_router: Refresh nexthop neighbour when it becomes dead (git-fixes).\n- mlxsw: spectrum_router: Remove inappropriate usage of WARN_ON() (git-fixes).\n- mlxsw: spectrum_switchdev: Add MDB entries in prepare phase (git-fixes).\n- mlxsw: spectrum_switchdev: Do not treat static FDB entries as sticky (git-fixes).\n- mmc: atmel-mci: Fix debugfs on 64-bit platforms (git-fixes).\n- mmc: block: Fix request completion in the CQE timeout path (bsc#1111666).\n- mmc: block: Fix use-after-free issue for rpmb (bsc#1111666).\n- mmc: core: Check request type before completing the request (git-fixes).\n- mmc: core: Fix recursive locking issue in CQE recovery path (git-fixes).\n- mmc: cqhci: Avoid false \u0027cqhci: CQE stuck on\u0027 by not open-coding timeout loop (git-fixes).\n- mmc: dw_mmc: Fix debugfs on 64-bit platforms (git-fixes).\n- mmc: fix compilation of user API (bsc#1051510).\n- mmc: meson-gx: make sure the descriptor is stopped on errors (git-fixes).\n- mmc: meson-gx: simplify interrupt handler (git-fixes).\n- mmc: renesas_sdhi: limit block count to 16 bit for old revisions (git-fixes).\n- mmc: sdhci: do not enable card detect interrupt for gpio cd type (bsc#1111666).\n- mmc: sdhci-esdhc-imx: fix the mask for tuning start point (bsc#1051510).\n- mmc: sdhci-msm: Clear tuning done flag while hs400 tuning (bsc#1051510).\n- mmc: sdhci-msm: Set SDHCI_QUIRK_MULTIBLOCK_READ_ACMD12 quirk (bsc#1111666).\n- mmc: sdhci-of-at91: fix memleak on clk_get failure (git-fixes).\n- mmc: sdhci-pci: Fix eMMC driver strength for BYT-based controllers (bsc#1051510).\n- mmc: sdhci-xenon: fix annoying 1.8V regulator warning (bsc#1051510).\n- mmc: sdio: Fix potential NULL pointer error in mmc_sdio_init_card() (bsc#1051510).\n- mmc: tmio: fix access width of Block Count Register (git-fixes).\n- mm/filemap.c: do not initiate writeback if mapping has no dirty pages (bsc#1168884).\n- mm: limit boost_watermark on small zones (git fixes (mm/pgalloc)).\n- mm/memory_hotplug.c: only respect mem= parameter during boot stage (bsc#1065600).\n- mm: replace PF_LESS_THROTTLE with PF_LOCAL_THROTTLE (bsc#1163403).\n- mm: thp: handle page cache THP correctly in PageTransCompoundMap (git fixes (block drivers)).\n- mtd: cfi: fix deadloop in cfi_cmdset_0002.c do_write_buffer (bsc#1051510).\n- mtd: spi-nor: cadence-quadspi: add a delay in write sequence (git-fixes).\n- mtd: spi-nor: enable 4B opcodes for mx66l51235l (git-fixes).\n- mtd: spi-nor: fsl-quadspi: Do not let -EINVAL on the bus (git-fixes).\n- mvpp2: remove misleading comment (git-fixes).\n- mwifiex: avoid -Wstringop-overflow warning (bsc#1051510).\n- mwifiex: Fix memory corruption in dump_station (bsc#1051510).\n- net: bcmgenet: correct per TX/RX ring statistics (networking-stable-20_04_27).\n- net: be more gentle about silly gso requests coming from user (networking-stable-20_06_07).\n- net: check untrusted gso_size at kernel entry (networking-stable-20_06_07).\n- net/cxgb4: Check the return from t4_query_params properly (git-fixes).\n- net: dsa: b53: Fix ARL register definitions (networking-stable-20_04_27).\n- net: dsa: b53: Rework ARL bin logic (networking-stable-20_04_27).\n- net: dsa: bcm_sf2: Do not register slave MDIO bus with OF (networking-stable-20_04_09).\n- net: dsa: bcm_sf2: Ensure correct sub-node is parsed (networking-stable-20_04_09).\n- net: dsa: bcm_sf2: Fix node reference count (git-fixes).\n- net: dsa: bcm_sf2: Fix overflow checks (git-fixes).\n- net: dsa: Fix duplicate frames flooded by learning (networking-stable-20_03_28).\n- net: dsa: loop: Add module soft dependency (networking-stable-20_05_16).\n- net: dsa: mt7530: fix roaming from DSA user ports (networking-stable-20_05_27).\n- net: dsa: mv88e6xxx: fix lockup on warm boot (networking-stable-20_03_14).\n- net: ena: add intr_moder_rx_interval to struct ena_com_dev and use it (git-fixes).\n- net: ena: add missing ethtool TX timestamping indication (git-fixes).\n- net: ena: avoid memory access violation by validating req_id properly (git-fixes).\n- net: ena: do not wake up tx queue when down (git-fixes).\n- net: ena: ena-com.c: prevent NULL pointer dereference (git-fixes).\n- net: ena: ethtool: use correct value for crc32 hash (git-fixes).\n- net: ena: fix continuous keep-alive resets (git-fixes).\n- net: ena: fix corruption of dev_idx_to_host_tbl (git-fixes).\n- net: ena: fix default tx interrupt moderation interval (git-fixes).\n- net: ena: fix incorrect default RSS key (git-fixes).\n- net: ena: fix incorrectly saving queue numbers when setting RSS indirection table (git-fixes).\n- net: ena: fix issues in setting interrupt moderation params in ethtool (git-fixes).\n- net: ena: fix potential crash when rxfh key is NULL (git-fixes).\n- net: ena: fix retrieval of nonadaptive interrupt moderation intervals (git-fixes).\n- net: ena: fix uses of round_jiffies() (git-fixes).\n- net: ena: make ena rxfh support ETH_RSS_HASH_NO_CHANGE (git-fixes).\n- net: ena: reimplement set/get_coalesce() (git-fixes).\n- net: ena: rss: do not allocate key when not supported (git-fixes).\n- net: ena: rss: fix failure to get indirection table (git-fixes).\n- net: ena: rss: store hash function as values and not bits (git-fixes).\n- net/ethernet: add Google GVE driver (jsc#SLE-10538)\n- net: fec: add phy_reset_after_clk_enable() support (git-fixes).\n- net: fec: validate the new settings in fec_enet_set_coalesce() (networking-stable-20_03_14).\n- net: fib_rules: Correctly set table field when table number exceeds 8 bits (networking-stable-20_03_01).\n- netfilter: connlabels: prefer static lock initialiser (git-fixes).\n- netfilter: conntrack: sctp: use distinct states for new SCTP connections (bsc#1159199).\n- netfilter: ctnetlink: netns exit must wait for callbacks (bsc#1169795).\n- netfilter: not mark a spinlock as __read_mostly (git-fixes).\n- net: fix a potential recursive NETDEV_FEAT_CHANGE (networking-stable-20_05_16).\n- net: fix race condition in __inet_lookup_established() (bsc#1151794).\n- net: fq: add missing attribute validation for orphan mask (networking-stable-20_03_14).\n- net: hns3: fix \u0027tc qdisc del\u0027 failed issue (bsc#1109837).\n- net: inet_csk: Fix so_reuseport bind-address cache in tb-\u003efast* (networking-stable-20_05_27).\n- net: ipip: fix wrong address family in init error path (networking-stable-20_05_27).\n- net, ip_tunnel: fix interface lookup with no key (networking-stable-20_04_02).\n- net: ipv4: devinet: Fix crash when add/del multicast IP with autojoin (networking-stable-20_04_17).\n- net: ipv6: do not consider routes via gateways for anycast address check (networking-stable-20_04_17).\n- net: ipvlan: Fix ipvlan device tso disabled while NETIF_F_IP_CSUM is set (git-fixes).\n- netlink: Use netlink header as base to calculate bad attribute offset (networking-stable-20_03_14).\n- net: macsec: preserve ingress frame ordering (networking-stable-20_05_12).\n- net: memcg: fix lockdep splat in inet_csk_accept() (networking-stable-20_03_14).\n- net: memcg: late association of sock to memcg (networking-stable-20_03_14).\n- net/mlx4_core: drop useless LIST_HEAD (git-fixes).\n- net/mlx4_core: fix a memory leak bug (git-fixes).\n- net/mlx4_core: Fix use of ENOSPC around mlx4_counter_alloc() (networking-stable-20_05_12).\n- net/mlx4_en: avoid indirect call in TX completion (networking-stable-20_04_27).\n- net/mlx5: Add command entry handling completion (networking-stable-20_05_27).\n- net/mlx5: Add new fields to Port Type and Speed register (bsc#1171118).\n- net/mlx5: Avoid panic when setting vport rate (git-fixes).\n- net/mlx5: Continue driver initialization despite debugfs failure (git-fixes).\n- net/mlx5e: ethtool, Fix a typo in WOL function names (git-fixes).\n- net/mlx5e: Fix traffic duplication in ethtool steering (git-fixes).\n- net/mlx5e: Remove unnecessary clear_bit()s (git-fixes).\n- net/mlx5e: Update netdev txq on completions during closure (networking-stable-20_05_27).\n- net/mlx5: Expose link speed directly (bsc#1171118).\n- net/mlx5: Expose port speed when possible (bsc#1171118).\n- net/mlx5: Fix command entry leak in Internal Error State (networking-stable-20_05_12).\n- net/mlx5: Fix crash upon suspend/resume (networking-stable-20_06_07).\n- net/mlx5: Fix failing fw tracer allocation on s390 (bsc#1103990 ).\n- net/mlx5: Fix forced completion access non initialized command entry (networking-stable-20_05_12).\n- net: mvmdio: allow up to four clocks to be specified for orion-mdio (git-fixes).\n- net: mvneta: Fix the case where the last poll did not process all rx (networking-stable-20_03_28).\n- net: mvpp2: prs: Do not override the sign bit in SRAM parser shift (git-fixes).\n- net: netrom: Fix potential nr_neigh refcnt leak in nr_add_node (networking-stable-20_04_27).\n- net/packet: tpacket_rcv: do not increment ring index on drop (networking-stable-20_03_14).\n- net: phy: fix aneg restart in phy_ethtool_set_eee (networking-stable-20_05_16).\n- net: phy: micrel: kszphy_resume(): add delay after genphy_resume() before accessing PHY registers (bsc#1051510).\n- net: phy: restore mdio regs in the iproc mdio driver (networking-stable-20_03_01).\n- netprio_cgroup: Fix unlimited memory leak of v2 cgroups (networking-stable-20_05_16).\n- net: qede: stop adding events on an already destroyed workqueue (git-fixes).\n- net: qed: fix excessive QM ILT lines consumption (git-fixes).\n- net: qed: fix NVMe login fails over VFs (git-fixes).\n- net: qmi_wwan: add support for ASKEY WWHC050 (networking-stable-20_03_28).\n- net: qrtr: Fix passing invalid reference to qrtr_local_enqueue() (networking-stable-20_05_27).\n- net: revert default NAPI poll timeout to 2 jiffies (networking-stable-20_04_17).\n- net: revert \u0027net: get rid of an signed integer overflow in ip_idents_reserve()\u0027 (networking-stable-20_05_27).\n- net_sched: cls_route: remove the right filter from hashtable (networking-stable-20_03_28).\n- net sched: fix reporting the first-time use timestamp (networking-stable-20_05_27).\n- net_sched: sch_skbprio: add message validation to skbprio_change() (bsc#1109837).\n- net: stricter validation of untrusted gso packets (networking-stable-20_05_12).\n- net/tls: Fix sk_psock refcnt leak in bpf_exec_tx_verdict() (networking-stable-20_05_12).\n- net/tls: Fix sk_psock refcnt leak when in tls_data_ready() (networking-stable-20_05_12).\n- net: usb: qmi_wwan: add support for DW5816e (networking-stable-20_05_12).\n- net: usb: qmi_wwan: add Telit 0x1050 composition (networking-stable-20_06_07).\n- net: usb: qmi_wwan: add Telit LE910C1-EUX composition (networking-stable-20_06_07).\n- net: vmxnet3: fix possible buffer overflow caused by bad DMA value in vmxnet3_get_rss() (bsc#1172484).\n- net/x25: Fix x25_neigh refcnt leak when receiving frame (networking-stable-20_04_27).\n- nfc: add missing attribute validation for SE API (networking-stable-20_03_14).\n- nfc: add missing attribute validation for vendor subcommand (networking-stable-20_03_14).\n- nfc: fdp: Fix a signedness bug in fdp_nci_send_patch() (bsc#1051510).\n- nfc: pn544: Fix occasional HW initialization failure (networking-stable-20_03_01).\n- nfc: st21nfca: add missed kfree_skb() in an error path (bsc#1051510).\n- nfp: abm: fix a memory leak bug (bsc#1109837).\n- nfp: bpf: fix code-gen bug on BPF_ALU | BPF_XOR | BPF_K (git-fixes).\n- nfsd4: fix up replay_matches_cache() (git-fixes).\n- nfsd: Ensure CLONE persists data and metadata changes to the target file (git-fixes).\n- nfsd: fix delay timer on 32-bit architectures (git-fixes).\n- nfsd: fix jiffies/time_t mixup in LRU list (git-fixes).\n- nfs: Directory page cache pages need to be locked when read (git-fixes).\n- nfsd: memory corruption in nfsd4_lock() (git-fixes).\n- nfs: Do not call generic_error_remove_page() while holding locks (bsc#1170457).\n- NFS: Fix an RCU lock leak in nfs4_refresh_delegation_stateid() (bsc#1170592).\n- nfs: Fix memory leaks and corruption in readdir (git-fixes).\n- nfs: Fix O_DIRECT accounting of number of bytes read/written (git-fixes).\n- nfs: Fix potential posix_acl refcnt leak in nfs3_set_acl (git-fixes).\n- nfs: fix racey wait in nfs_set_open_stateid_locked (bsc#1170592).\n- nfs/flexfiles: Use the correct TCP timeout for flexfiles I/O (git-fixes).\n- nfs/pnfs: Fix pnfs_generic_prepare_to_resend_writes() (git-fixes).\n- nfs: Revalidate the file size on a fatal write error (git-fixes).\n- NFSv4.0: nfs4_do_fsinfo() should not do implicit lease renewals (git-fixes).\n- NFSv4: Do not allow a cached open with a revoked delegation (git-fixes).\n- NFSv4: Fix leak of clp-\u003ecl_acceptor string (git-fixes).\n- NFSv4/pnfs: Return valid stateids in nfs_layout_find_inode_by_stateid() (git-fixes).\n- NFSv4: Retry CLOSE and DELEGRETURN on NFS4ERR_OLD_STATEID (bsc#1170592).\n- NFSv4: try lease recovery on NFS4ERR_EXPIRED (git-fixes).\n- NFSv4.x: Drop the slot if nfs4_delegreturn_prepare waits for layoutreturn (git-fixes).\n- nilfs2: fix null pointer dereference at nilfs_segctor_do_construct() (bsc#1173857).\n- nl80211: fix NL80211_ATTR_CHANNEL_WIDTH attribute type (bsc#1111666).\n- nl802154: add missing attribute validation for dev_type (networking-stable-20_03_14).\n- nl802154: add missing attribute validation (networking-stable-20_03_14).\n- nvdimm: Avoid race between probe and reading device attributes (bsc#1170442).\n- nvme: check for NVME_CTRL_LIVE in nvme_report_ns_ids() (bcs#1171558 bsc#1159058).\n- nvme: do not update multipath disk information if the controller is down (bcs#1171558 bsc#1159058).\n- nvme: fail cancelled commands with NVME_SC_HOST_PATH_ERROR (bsc#1158983 bsc#1172538).\n- nvme-fc: Fail transport errors with NVME_SC_HOST_PATH (bsc#1158983 bsc#1172538).\n- nvme-fc: print proper nvme-fc devloss_tmo value (bsc#1172391).\n- nvme-tcp: fail command with NVME_SC_HOST_PATH_ERROR send failed (bsc#1158983 bsc#1172538).\n- objtool: Add is_static_jump() helper (bsc#1169514).\n- objtool: Add relocation check for alternative sections (bsc#1169514).\n- objtool: Clean instruction state before each function validation (bsc#1169514).\n- objtool: Fix stack offset tracking for indirect CFAs (bsc#1169514).\n- objtool: Fix switch table detection in .text.unlikely (bsc#1169514).\n- objtool: Ignore empty alternatives (bsc#1169514).\n- objtool: Make BP scratch register warning more robust (bsc#1169514).\n- ocfs2: no need try to truncate file beyond i_size (bsc#1171841).\n- OMAP: DSS2: remove non-zero check on variable r (bsc#1114279)\n- overflow: Fix -Wtype-limits compilation warnings (git fixes).\n- overflow.h: Add arithmetic shift helper (git fixes).\n- p54usb: add AirVasT USB stick device-id (bsc#1051510).\n- padata: ensure the reorder timer callback runs on the correct CPU (git-fixes).\n- padata: Remove broken queue flushing (git-fixes).\n- padata: reorder work kABI fixup (git-fixes).\n- Partially revert \u0027kfifo: fix kfifo_alloc() and kfifo_init()\u0027 (git fixes (block drivers)).\n- partitions/efi: Fix partition name parsing in GUID partition entry (bsc#1168763).\n- PCI/AER: Remove HEST/FIRMWARE_FIRST parsing for AER ownership (bsc#1174356).\n- PCI/AER: Use only _OSC to determine AER ownership (bsc#1174356).\n- PCI: Allow pci_resize_resource() for devices on root bus (bsc#1051510).\n- PCI/ASPM: Clear the correct bits when enabling L1 substates (bsc#1051510).\n- PCI: endpoint: Fix clearing start entry in configfs (bsc#1051510).\n- PCI: Fix pci_register_host_bridge() device_register() error handling (bsc#1051510).\n- PCI: Generalize multi-function power dependency device links (bsc#1111666).\n- PCI: hv: Add support for protocol 1.3 and support PCI_BUS_RELATIONS2 (bsc#1172201, bsc#1172202).\n- PCI: hv: Change pci_protocol_version to per-hbus (bsc#1172871, bsc#1172872).\n- PCI: hv: Decouple the func definition in hv_dr_state from VSP message (bsc#1172201, bsc#1172202).\n- PCI: hv: Fix the PCI HyperV probe failure path to release resource properly (bsc#1172871, bsc#1172872).\n- PCI: hv: Introduce hv_msi_entry (bsc#1172871, bsc#1172872).\n- PCI: hv: Move hypercall related definitions into tlfs header (bsc#1172871, bsc#1172872).\n- PCI: hv: Move retarget related structures into tlfs header (bsc#1172871, bsc#1172872).\n- PCI: hv: Reorganize the code in preparation of hibernation (bsc#1172871, bsc#1172872).\n- PCI: hv: Retry PCI bus D0 entry on invalid device state (bsc#1172871, bsc#1172872).\n- PCI: pciehp: Fix indefinite wait on sysfs requests (git-fixes).\n- PCI: pciehp: Fix MSI interrupt race (bsc#1159037).\n- PCI: pciehp: Support interrupts sent from D3hot (git-fixes).\n- PCI/PM: Call .bridge_d3() hook only if non-NULL (git-fixes).\n- PCI: Program MPS for RCiEP devices (bsc#1051510).\n- PCI/PTM: Inherit Switch Downstream Port PTM settings from Upstream Port (bsc#1051510).\n- pci: Revive pci_dev __aer_firmware_first* fields for kABI (bsc#1174356).\n- PCI/switchtec: Fix init_completion race condition with poll_wait() (bsc#1051510).\n- pcm_native: result of put_user() needs to be checked (bsc#1111666).\n- perf: Allocate context task_ctx_data for child event (git-fixes).\n- perf/cgroup: Fix perf cgroup hierarchy support (git-fixes).\n- perf: Copy parent\u0027s address filter offsets on clone (git-fixes).\n- perf/core: Add sanity check to deal with pinned event failure (git-fixes).\n- perf/core: Avoid freeing static PMU contexts when PMU is unregistered (git-fixes).\n- perf/core: Correct event creation with PERF_FORMAT_GROUP (git-fixes).\n- perf/core: Do not WARN() for impossible ring-buffer sizes (git-fixes).\n- perf/core: Fix ctx_event_type in ctx_resched() (git-fixes).\n- perf/core: Fix error handling in perf_event_alloc() (git-fixes).\n- perf/core: Fix exclusive events\u0027 grouping (git-fixes).\n- perf/core: Fix group scheduling with mixed hw and sw events (git-fixes).\n- perf/core: Fix impossible ring-buffer sizes warning (git-fixes).\n- perf/core: Fix locking for children siblings group read (git-fixes).\n- perf/core: Fix perf_event_read_value() locking (git-fixes).\n- perf/core: Fix perf_pmu_unregister() locking (git-fixes).\n- perf/core: Fix perf_sample_regs_user() mm check (git-fixes).\n- perf/core: Fix possible Spectre-v1 indexing for -\u003eaux_pages (git-fixes).\n- perf/core: Fix race between close() and fork() (git-fixes).\n- perf/core: Fix the address filtering fix (git-fixes).\n- perf/core: Fix use-after-free in uprobe_perf_close() (git-fixes).\n- perf/core: Force USER_DS when recording user stack data (git-fixes).\n- perf/core: Restore mmap record type correctly (git-fixes).\n- perf: Fix header.size for namespace events (git-fixes).\n- perf/ioctl: Add check for the sample_period value (git-fixes).\n- perf, pt, coresight: Fix address filters for vmas with non-zero offset (git-fixes).\n- perf: Return proper values for user stack errors (git-fixes).\n- perf/x86/amd: Constrain Large Increment per Cycle events (git-fixes).\n- perf/x86/amd/ibs: Fix reading of the IBS OpData register and thus precise RIP validity (git-fixes).\n- perf/x86/amd/ibs: Fix sample bias for dispatched micro-ops (git-fixes).\n- perf/x86/amd/ibs: Handle erratum #420 only on the affected CPU family (10h) (git-fixes).\n- perf/x86/amd/iommu: Make the \u0027amd_iommu_attr_groups\u0027 symbol static (git-fixes).\n- perf/x86/amd/uncore: Do not set \u0027ThreadMask\u0027 and \u0027SliceMask\u0027 for non-L3 PMCs (git-fixes stable).\n- perf/x86/amd/uncore: Set the thread mask for F17h L3 PMCs (git-fixes).\n- perf/x86/amd/uncore: Set ThreadMask and SliceMask for L3 Cache perf events (git-fixes stable).\n- perf/x86: Enable free running PEBS for REGS_USER/INTR (git-fixes).\n- perf/x86: Fix incorrect PEBS_REGS (git-fixes).\n- perf/x86/intel: Add generic branch tracing check to intel_pmu_has_bts() (git-fixes).\n- perf/x86/intel: Add proper condition to run sched_task callbacks (git-fixes).\n- perf/x86/intel/bts: Fix the use of page_private() (git-fixes).\n- perf/x86/intel: Fix PT PMI handling (git-fixes).\n- perf/x86/intel: Move branch tracing setup to the Intel-specific source file (git-fixes).\n- perf/x86/intel/uncore: Add Node ID mask (git-fixes).\n- perf/x86/intel/uncore: Fix PCI BDF address of M3UPI on SKX (git-fixes).\n- perf/x86/intel/uncore: Handle invalid event coding for free-running counter (git-fixes).\n- perf/x86/uncore: Fix event group support (git-fixes).\n- pid: Improve the comment about waiting in zap_pid_ns_processes (git fixes)).\n- pinctrl: baytrail: Enable pin configuration setting for GPIO chip (git-fixes).\n- pinctrl: cherryview: Add missing spinlock usage in chv_gpio_irq_handler (git-fixes).\n- pinctrl: core: Remove extra kref_get which blocks hogs being freed (bsc#1051510).\n- pinctrl: freescale: imx: Fix an error handling path in \u0027imx_pinctrl_probe()\u0027 (bsc#1051510).\n- pinctrl: imxl: Fix an error handling path in \u0027imx1_pinctrl_core_probe()\u0027 (bsc#1051510).\n- pinctrl: samsung: Save/restore eint_mask over suspend for EINT_TYPE GPIOs (bsc#1051510).\n- pinctrl: sunrisepoint: Fix PAD lock register offset for SPT-H (git-fixes).\n- platform/x86: asus-nb-wmi: Do not load on Asus T100TA and T200TA (bsc#1051510).\n- platform/x86: dell-laptop: do not register micmute LED if there is no token (bsc#1111666).\n- platform/x86: hp-wmi: Convert simple_strtoul() to kstrtou32() (bsc#1111666).\n- PM / Domains: Allow genpd users to specify default active wakeup behavior (git-fixes).\n- pNFS: Ensure we do clear the return-on-close layout stateid on fatal errors (git-fixes).\n- pnp: Use list_for_each_entry() instead of open coding (git fixes).\n- powerpc/64s: Do not let DT CPU features set FSCR_DSCR (bsc#1065729).\n- powerpc/64s: Save FSCR to init_task.thread.fscr after feature init (bsc#1065729).\n- powerpc: Add attributes for setjmp/longjmp (bsc#1065729).\n- powerpc/book3s64: Export has_transparent_hugepage() related functions (bsc#1171759).\n- powerpc/book3s64/pkeys: Fix pkey_access_permitted() for execute disable pkey (bsc#1065729).\n- powerpc/fadump: fix race between pstore write and fadump crash trigger (bsc#1168959 ltc#185010).\n- powerpc/hash64/devmap: Use H_PAGE_THP_HUGE when setting up huge devmap PTE entries (bsc#1065729).\n- powerpc/pci/of: Parse unassigned resources (bsc#1065729).\n- powerpc/setup_64: Set cache-line-size based on cache-block-size (bsc#1065729).\n- powerpc/sstep: Fix DS operand in ld encoding to appropriate value (bsc#1065729).\n- powerpc/xive: Clear the page tables for the ESB IO mapping (bsc#1085030).\n- powerpc/xmon: Reset RCU and soft lockup watchdogs (bsc#1065729).\n- power: supply: bq24257_charger: Replace depends on REGMAP_I2C with select (bsc#1051510).\n- power: supply: lp8788: Fix an error handling path in \u0027lp8788_charger_probe()\u0027 (bsc#1051510).\n- power: supply: smb347-charger: IRQSTAT_D is volatile (bsc#1051510).\n- power: vexpress: add suppress_bind_attrs to true (bsc#1111666).\n- pppoe: only process PADT targeted at local interfaces (networking-stable-20_05_16).\n- pwm: bcm2835: Dynamically allocate base (bsc#1051510).\n- pwm: meson: Fix confusing indentation (bsc#1051510).\n- pwm: pca9685: Fix PWM/GPIO inter-operation (bsc#1051510).\n- pwm: rcar: Fix late Runtime PM enablement (bsc#1051510).\n- pwm: renesas-tpu: Fix late Runtime PM enablement (bsc#1051510).\n- pxa168fb: fix release function mismatch in probe failure (bsc#1051510).\n- qede: Fix race between rdma destroy workqueue and link change event (networking-stable-20_03_01).\n- qed: reduce maximum stack frame size (git-fixes).\n- qlcnic: fix missing release in qlcnic_83xx_interrupt_test (git-fixes).\n- qmi_wwan: unconditionally reject 2 ep interfaces (bsc#1051510).\n- r8152: check disconnect status after long sleep (networking-stable-20_03_14).\n- r8152: support additional Microsoft Surface Ethernet Adapter variant (networking-stable-20_05_27).\n- raid5: remove gfp flags from scribble_alloc() (bsc#1166985).\n- raid6/ppc: Fix build for clang (git fixes (block drivers)).\n- random: always use batched entropy for get_random_u{32,64} (bsc#1164871).\n- rcu: locking and unlocking need to always be at least barriers (git fixes (block drivers)).\n- RDMA/efa: Fix setting of wrong bit in get/set_feature commands (bsc#1111666)\n- RDMA/efa: Set maximum pkeys device attribute (bsc#1111666)\n- RDMA/efa: Support remote read access in MR registration (bsc#1111666)\n- RDMA/efa: Unified getters/setters for device structs bitmask access (bsc#1111666)\n- README.BRANCH: Add Takashi Iwai as primary maintainer.\n- README.BRANCH: Replace Matt Fleming with Davidlohr Bueso as maintainer.\n- regmap: debugfs: Do not sleep while atomic for fast_io regmaps (bsc#1111666).\n- resolve KABI warning for perf-pt-coresight (git-fixes).\n- Revert \u0027ALSA: hda/realtek: Fix pop noise on ALC225\u0027 (git-fixes).\n- Revert \u0027bcache: ignore pending signals when creating gc and allocator thread\u0027 (git fixes (block drivers)).\n- Revert commit e918e570415c (\u0027tpm_tis: Remove the HID IFX0102\u0027) (bsc#1111666).\n- Revert \u0027dm crypt: use WQ_HIGHPRI for the IO and crypt workqueues\u0027 (git fixes (block drivers)).\n- Revert \u0027drm/panel: simple: Add support for Sharp LQ150X1LG11 panels\u0027 (bsc#1114279) \t* offset changes\n- Revert \u0027HID: i2c-hid: add Trekstor Primebook C11B to descriptor override\u0027 Depends on 9b5c747685982d22efffeafc5ec601bd28f6d78b, which was also reverted.\n- Revert \u0027HID: i2c-hid: override HID descriptors for certain devices\u0027 This broke i2c-hid.ko\u0027s build, there is no way around it without a big file rename or renaming the kernel module.\n- Revert \u0027i2c-hid: properly terminate i2c_hid_dmi_desc_override_table\u0027 Fixed 9b5c747685982d22efffeafc5ec601bd28f6d78b, which was also reverted.\n- Revert \u0027ipc,sem: remove uneeded sem_undo_list lock usage in exit_sem()\u0027 (bsc#1172221).\n- Revert \u0027RDMA/cma: Simplify rdma_resolve_addr() error flow\u0027 (bsc#1103992).\n- Revert \u0027thermal: mediatek: fix register index error\u0027 (bsc#1111666).\n- Revert \u0027tools lib traceevent: Remove unneeded qsort and uses memmove\u0027\n- rtlwifi: Fix a double free in _rtl_usb_tx_urb_setup() (bsc#1051510).\n- rtnetlink: Fix memory(net_device) leak when -\u003enewlink fails (git-fixes).\n- s390/bpf: Maintain 8-byte stack alignment (bsc#1169194).\n- s390/cio: avoid duplicated \u0027ADD\u0027 uevents (git-fixes).\n- s390/cio: generate delayed uevent for vfio-ccw subchannels (git-fixes).\n- s390/cpuinfo: fix wrong output when CPU0 is offline (git-fixes).\n- s390/cpum_cf: Add new extended counters for IBM z15 (bsc#1169762 LTC#185291).\n- s390/diag: fix display of diagnose call statistics (git-fixes).\n- s390: fix syscall_get_error for compat processes (git-fixes).\n- s390/ftrace: fix potential crashes when switching tracers (git-fixes).\n- s390/gmap: return proper error code on ksm unsharing (git-fixes).\n- s390/ism: fix error return code in ism_probe() (git-fixes).\n- s390/pci: do not set affinity for floating irqs (git-fixes).\n- s390/pci: Fix possible deadlock in recover_store() (bsc#1165183 LTC#184103).\n- s390/pci: Recover handle in clp_set_pci_fn() (bsc#1165183 LTC#184103).\n- s390/qdio: consistently restore the IRQ handler (git-fixes).\n- s390/qdio: lock device while installing IRQ handler (git-fixes).\n- s390/qdio: put thinint indicator after early error (git-fixes).\n- s390/qdio: tear down thinint indicator after early error (git-fixes).\n- s390/qeth: cancel RX reclaim work earlier (git-fixes).\n- s390/qeth: do not return -ENOTSUPP to userspace (git-fixes).\n- s390/qeth: do not warn for napi with 0 budget (git-fixes).\n- s390/qeth: fix error handling for isolation mode cmds (git-fixes).\n- s390/qeth: fix off-by-one in RX copybreak check (git-fixes).\n- s390/qeth: fix promiscuous mode after reset (git-fixes).\n- s390/qeth: fix qdio teardown after early init error (git-fixes).\n- s390/qeth: handle error due to unsupported transport mode (git-fixes).\n- s390/qeth: handle error when backing RX buffer (git-fixes).\n- s390/qeth: lock the card while changing its hsuid (git-fixes).\n- s390/qeth: support net namespaces for L3 devices (git-fixes).\n- s390/time: Fix clk type in get_tod_clock (git-fixes).\n- sch_choke: avoid potential panic in choke_reset() (networking-stable-20_05_12).\n- sch_sfq: validate silly quantum values (networking-stable-20_05_12).\n- scripts/decodecode: fix trapping instruction formatting (bsc#1065729).\n- scripts/dtc: Remove redundant YYLOC global declaration (bsc#1160388).\n- scripts/git_sort/git_sort.py: add bluetooth/bluetooth-next.git repository\n- scsi: aacraid: fix a signedness bug (bsc#1174296).\n- scsi: bnx2i: fix potential use after free (bsc#1171600).\n- scsi: core: avoid repetitive logging of device offline messages (bsc#1145929).\n- scsi: core: Handle drivers which set sg_tablesize to zero (bsc#1171601) This commit also required: \u003e scsi: core: avoid preallocating big SGL for data\n- scsi: core: kABI fix offline_already (bsc#1145929).\n- scsi: core: save/restore command resid for error handling (bsc#1171602).\n- scsi: core: scsi_trace: Use get_unaligned_be*() (bsc#1171604).\n- scsi: core: try to get module before removing device (bsc#1171605).\n- scsi: csiostor: Adjust indentation in csio_device_reset (bsc#1171606).\n- scsi: csiostor: Do not enable IRQs too early (bsc#1171607).\n- scsi: esas2r: unlock on error in esas2r_nvram_read_direct() (bsc#1171608).\n- scsi: fnic: fix invalid stack access (bsc#1171609).\n- scsi: fnic: fix msix interrupt allocation (bsc#1171610).\n- scsi: hisi_sas: fix calls to dma_set_mask_and_coherent() (bsc#1174296).\n- scsi: ibmvscsi: Do not send host info in adapter info MAD after LPM (bsc#1172759 ltc#184814).\n- scsi: ibmvscsi: Fix WARN_ON during event pool release (bsc#1170791 ltc#185128).\n- scsi: iscsi: Avoid potential deadlock in iscsi_if_rx func (bsc#1171611).\n- scsi: iscsi: Fix a potential deadlock in the timeout handler (bsc#1171612).\n- scsi: iscsi: qla4xxx: fix double free in probe (bsc#1171613).\n- scsi: lpfc: Add an internal trace log buffer (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Add blk_io_poll support for latency improvment (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Add support to display if adapter dumps are available (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Allow applications to issue Common Set Features mailbox command (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Avoid another null dereference in lpfc_sli4_hba_unset() (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Change default queue allocation for reduced memory consumption (bsc#1164780).\n- scsi: lpfc: fix: Coverity: lpfc_cmpl_els_rsp(): Null pointer dereferences (bsc#1171614).\n- scsi: lpfc: Fix crash in target side cable pulls hitting WAIT_FOR_UNREG (bsc#1171615).\n- scsi: lpfc: Fix inconsistent indenting (bsc#1158983).\n- scsi: lpfc: Fix interrupt assignments when multiple vectors are supported on same CPU (bsc#1158983).\n- scsi: lpfc: Fix kdump hang on PPC (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix language in 0373 message to reflect non-error message (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix less-than-zero comparison of unsigned value (bsc#1158983).\n- scsi: lpfc: Fix lpfc_nodelist leak when processing unsolicited event (bsc#1164780).\n- scsi: lpfc: Fix MDS Diagnostic Enablement definition (bsc#1164780).\n- scsi: lpfc: Fix missing MDS functionality (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix negation of else clause in lpfc_prep_node_fc4type (bsc#1164780).\n- scsi: lpfc: Fix noderef and address space warnings (bsc#1164780).\n- scsi: lpfc: Fix NVMe rport deregister and registration during ADISC (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix oops due to overrun when reading SLI3 data (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix shost refcount mismatch when deleting vport (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix stack trace seen while setting rrq active (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix unused assignment in lpfc_sli4_bsg_link_diag_test (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Maintain atomic consistency of queue_claimed flag (bsc#1164780).\n- scsi: lpfc: remove duplicate unloading checks (bsc#1164780).\n- scsi: lpfc: Remove re-binding of nvme rport during registration (bsc#1164780).\n- scsi: lpfc: Remove redundant initialization to variable rc (bsc#1164780).\n- scsi: lpfc: Remove unnecessary lockdep_assert_held calls (bsc#1164780).\n- scsi: lpfc: Update lpfc version to 12.8.0.1 (bsc#1164780).\n- scsi: lpfc: Update lpfc version to 12.8.0.2 (bsc#1158983).\n- scsi: megaraid_sas: Do not initiate OCR if controller is not in ready state (bsc#1171616).\n- scsi: megaraid_sas: Fix a compilation warning (bsc#1174296).\n- scsi: mpt3sas: Fix double free in attach error handling (bsc#1174296).\n- scsi: qedf: Add port_id getter (bsc#1150660).\n- scsi: qla2xxx: add ring buffer for tracing debug logs (bsc#1157169).\n- scsi: qla2xxx: check UNLOADING before posting async work (bsc#1157169).\n- scsi: qla2xxx: Delete all sessions before unregister local nvme port (bsc#1157169).\n- scsi: qla2xxx: Do not log message when reading port speed via sysfs (bsc#1157169).\n- scsi: qla2xxx: Fix a condition in qla2x00_find_all_fabric_devs() (bsc#1174296).\n- scsi: qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV (bsc#1157169).\n- scsi: qla2xxx: Fix regression warnings (bsc#1157169).\n- scsi: qla2xxx: Remove non functional code (bsc#1157169).\n- scsi: qla2xxx: Set NVMe status code for failed NVMe FCP request (bsc#1158983).\n- scsi: qla2xxx: set UNLOADING before waiting for session deletion (bsc#1157169).\n- scsi: qla4xxx: Adjust indentation in qla4xxx_mem_free (bsc#1171617).\n- scsi: qla4xxx: fix double free bug (bsc#1171618).\n- scsi: sd: Clear sdkp-\u003eprotection_type if disk is reformatted without PI (bsc#1171619).\n- scsi: sg: add sg_remove_request in sg_common_write (bsc#1171620).\n- scsi: tracing: Fix handling of TRANSFER LENGTH == 0 for READ(6) and WRITE(6) (bsc#1171621).\n- scsi: ufs: change msleep to usleep_range (bsc#1171622).\n- scsi: ufs: Clean up ufshcd_scale_clks() and clock scaling error out path (bsc#1171623).\n- scsi: ufs: Fix ufshcd_hold() caused scheduling while atomic (bsc#1171624).\n- scsi: ufs: Fix ufshcd_probe_hba() reture value in case ufshcd_scsi_add_wlus() fails (bsc#1171625).\n- scsi: ufs: Recheck bkops level if bkops is disabled (bsc#1171626).\n- scsi: zfcp: fix missing erp_lock in port recovery trigger for point-to-point (git-fixes).\n- sctp: Do not add the shutdown timer if its already been added (networking-stable-20_05_27).\n- sctp: fix possibly using a bad saddr with a given dst (networking-stable-20_04_02).\n- sctp: fix refcount bug in sctp_wfree (networking-stable-20_04_02).\n- sctp: move the format error check out of __sctp_sf_do_9_1_abort (networking-stable-20_03_01).\n- sctp: Start shutdown on association restart if in SHUTDOWN-SENT state and socket is closed (networking-stable-20_05_27).\n- selftests/powerpc: Fix build errors in powerpc ptrace selftests (boo#1124278).\n- Separate one more kABI fixup from the functional change:\n- seq_file: fix problem when seeking mid-record (bsc#1170125).\n- serdev: ttyport: restore client ops on deregistration (bsc#1051510).\n- serial: uartps: Move the spinlock after the read of the tx empty (git-fixes).\n- sfc: detach from cb_page in efx_copy_channel() (networking-stable-20_03_14).\n- signal/pid_namespace: Fix reboot_pid_ns to use send_sig not force_sig (bsc#1172185).\n- slcan: not call free_netdev before rtnl_unlock in slcan_open (networking-stable-20_03_28).\n- slip: make slhc_compress() more robust against malicious packets (networking-stable-20_03_14).\n- smb3: Additional compression structures (bsc#1144333).\n- smb3: Add new compression flags (bsc#1144333).\n- smb3: change noisy error message to FYI (bsc#1144333).\n- smb3: enable swap on SMB3 mounts (bsc#1144333).\n- smb3: Minor cleanup of protocol definitions (bsc#1144333).\n- smb3: remove overly noisy debug line in signing errors (bsc#1144333).\n- smb3: smbdirect support can be configured by default (bsc#1144333).\n- smb3: use SMB2_SIGNATURE_SIZE define (bsc#1144333).\n- spi: bcm2835: Fix 3-wire mode if DMA is enabled (git-fixes).\n- spi: bcm63xx-hsspi: Really keep pll clk enabled (bsc#1051510).\n- spi: bcm-qspi: when tx/rx buffer is NULL set to 0 (bsc#1051510).\n- spi: dw: Add SPI Rx-done wait method to DMA-based transfer (bsc#1051510).\n- spi: dw: Add SPI Tx-done wait method to DMA-based transfer (bsc#1051510).\n- spi: dw: use \u0027smp_mb()\u0027 to avoid sending spi data error (bsc#1051510).\n- spi: dw: Zero DMA Tx and Rx configurations on stack (bsc#1051510).\n- spi: fix initial SPI_SR value in spi-fsl-dspi (bsc#1111666).\n- spi: fsl: do not map irq during probe (git-fixes).\n- spi: fsl: use platform_get_irq() instead of of_irq_to_resource() (git-fixes).\n- spi: pxa2xx: Add CS control clock quirk (bsc#1051510).\n- spi: pxa2xx: Apply CS clk quirk to BXT (bsc#1111666).\n- spi: qup: call spi_qup_pm_resume_runtime before suspending (bsc#1051510).\n- spi: spidev: fix a race between spidev_release and spidev_remove (bsc#1111666).\n- spi: spi-fsl-dspi: Replace interruptible wait queue with a simple completion (git-fixes).\n- spi: spi-mem: Fix Dual/Quad modes on Octal-capable devices (bsc#1111666).\n- spi: spi-s3c64xx: Fix system resume support (git-fixes).\n- spi: spi-sun6i: sun6i_spi_transfer_one(): fix setting of clock rate (bsc#1111666).\n- spi/zynqmp: remove entry that causes a cs glitch (bsc#1051510).\n- staging: comedi: dt2815: fix writing hi byte of analog output (bsc#1051510).\n- staging: comedi: Fix comedi_device refcnt leak in comedi_open (bsc#1051510).\n- staging: comedi: verify array index is correct before using it (bsc#1111666).\n- staging: iio: ad2s1210: Fix SPI reading (bsc#1051510).\n- staging: rtl8188eu: Add ASUS USB-N10 Nano B1 to device table (bsc#1051510).\n- staging: rtl8712: Fix IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK (bsc#1051510).\n- staging: sm750fb: add missing case while setting FB_VISUAL (bsc#1051510).\n- staging: vt6656: Do not set RCR_MULTICAST or RCR_BROADCAST by default (git-fixes).\n- staging: vt6656: Fix drivers TBTT timing counter (git-fixes).\n- staging: vt6656: Fix pairwise key entry save (git-fixes).\n- staging: vt6656: fix sign of rx_dbm to bb_pre_ed_rssi (bsc#1051510).\n- staging: wlan-ng: fix ODEBUG bug in prism2sta_disconnect_usb (bsc#1051510).\n- staging: wlan-ng: fix use-after-free Read in hfa384x_usbin_callback (bsc#1051510).\n- SUNRPC: defer slow parts of rpc_free_client() to a workqueue (bsc#1168202).\n- SUNRPC: expiry_time should be seconds not timeval (git-fixes).\n- SUNRPC: Fix a potential buffer overflow in \u0027svc_print_xprts()\u0027 (git-fixes).\n- SUNRPC: The TCP back channel mustn\u0027t disappear while requests are outstanding (bsc#1152624).\n- supported.conf: Add br_netfilter to base (bsc#1169020).\n- svcrdma: Fix double svc_rdma_send_ctxt_put() in an error path (bsc#1103992).\n- svcrdma: Fix leak of transport addresses (git-fixes).\n- svcrdma: Fix trace point use-after-free race (bsc#1103992 ).\n- taskstats: fix data-race (bsc#1172188).\n- tcp: cache line align MAX_TCP_HEADER (networking-stable-20_04_27).\n- tcp: repair: fix TCP_QUEUE_SEQ implementation (networking-stable-20_03_28).\n- team: add missing attribute validation for array index (networking-stable-20_03_14).\n- team: add missing attribute validation for port ifindex (networking-stable-20_03_14).\n- team: fix hang in team_mode_get() (networking-stable-20_04_27).\n- tg3: driver sleeps indefinitely when EEH errors exceed eeh_max_freezes (bsc#1173284).\n- thermal: devfreq_cooling: inline all stubs for CONFIG_DEVFREQ_THERMAL=n (bsc#1051510).\n- timers: Add a function to start/reduce a timer (networking-stable-20_05_27).\n- tools lib traceevent: Remove unneeded qsort and uses memmove instead (git-fixes).\n- tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send() (bsc#1065729).\n- tpm_tis: extra chip-\u003eops check on error path in tpm_tis_core_init (bsc#1111666).\n- tpm_tis: Remove the HID IFX0102 (bsc#1111666).\n- tpm/tpm_tis: Free IRQ if probing fails (bsc#1082555).\n- tpm/tpm_tis: Free IRQ if probing fails (git-fixes).\n- tracing: Add a vmalloc_sync_mappings() for safe measure (git-fixes).\n- tracing: Disable trace_printk() on post poned tests (git-fixes).\n- tracing: Fix event trigger to accept redundant spaces (git-fixes).\n- tracing: Fix the race between registering \u0027snapshot\u0027 event trigger and triggering \u0027snapshot\u0027 operation (git-fixes).\n- tty: evh_bytechan: Fix out of bounds accesses (bsc#1051510).\n- tty: hvc_console, fix crashes on parallel open/close (git-fixes).\n- tty: n_gsm: Fix bogus i++ in gsm_data_kick (bsc#1051510).\n- tty: n_gsm: Fix SOF skipping (bsc#1051510).\n- tty: n_gsm: Fix waking up upper tty layer when room available (bsc#1051510).\n- tty: rocket, avoid OOB access (git-fixes).\n- tty/serial: atmel: manage shutdown in case of RS485 or ISO7816 mode (bsc#1051510).\n- tty: serial: imx: setup the correct sg entry for tx dma (bsc#1051510).\n- tun: Do not put_page() for all negative return values from XDP program (bsc#1109837).\n- tunnel: Propagate ECT(1) when decapsulating as recommended by RFC6040 (networking-stable-20_05_12).\n- UAS: fix deadlock in error handling and PM flushing work (git-fixes).\n- UAS: no use logging any details in case of ENODEV (git-fixes).\n- ubifs: remove broken lazytime support (bsc#1173826).\n- Update config files: Build w1 bus on arm64 (jsc#SLE-11048)\n- USB: Add USB_QUIRK_DELAY_CTRL_MSG and USB_QUIRK_DELAY_INIT for Corsair K70 RGB RAPIDFIRE (git-fixes).\n- usb: add USB_QUIRK_DELAY_INIT for Logitech C922 (git-fixes).\n- USB: c67x00: fix use after free in c67x00_giveback_urb (bsc#1111666).\n- USB: cdc-acm: restore capability check order (git-fixes).\n- usb: chipidea: core: add wakeup support for extcon (bsc#1111666).\n- USB: core: Fix misleading driver bug report (bsc#1051510).\n- usb: dwc2: Fix shutdown callback in platform (bsc#1111666).\n- usb: dwc2: gadget: move gadget resume after the core is in L0 state (bsc#1051510).\n- USB: dwc3: do not set gadget-\u003eis_otg flag (git-fixes).\n- USB: dwc3: gadget: Do link recovery for SS and SSP (git-fixes).\n- usb: dwc3: gadget: introduce cancelled_list (git-fixes).\n- usb: dwc3: gadget: never call -\u003ecomplete() from -\u003eep_queue() (git-fixes).\n- usb: dwc3: gadget: Properly handle ClearFeature(halt) (git-fixes).\n- usb: dwc3: gadget: Properly handle failed kick_transfer (git-fixes).\n- USB: early: Handle AMD\u0027s spec-compliant identifiers, too (git-fixes).\n- USB: ehci: reopen solution for Synopsys HC bug (git-fixes).\n- USB: f_fs: Clear OS Extended descriptor counts to zero in ffs_data_reset() (git-fixes).\n- USB: gadget: audio: Fix a missing error return value in audio_bind() (git-fixes).\n- USB: gadget: composite: Inform controller driver of self-powered (git-fixes).\n- USB: gadget: f_fs: Fix use after free issue as part of queue failure (bsc#1051510).\n- usb: gadget: fix potential double-free in m66592_probe (bsc#1111666).\n- USB: gadget: legacy: fix error return code in cdc_bind() (git-fixes).\n- USB: gadget: legacy: fix error return code in gncm_bind() (git-fixes).\n- USB: gadget: legacy: fix redundant initialization warnings (bsc#1051510).\n- usb: gadget: lpc32xx_udc: do not dereference ep pointer before null check (bsc#1051510).\n- USB: gadget: net2272: Fix a memory leak in an error handling path in \u0027net2272_plat_probe()\u0027 (git-fixes).\n- usb: gadget: udc: atmel: fix uninitialized read in debug printk (bsc#1111666).\n- USB: gadget: udc: atmel: Fix vbus disconnect handling (git-fixes).\n- USB: gadget: udc: atmel: Make some symbols static (git-fixes).\n- usb: gadget: udc: atmel: remove outdated comment in usba_ep_disable() (bsc#1111666).\n- USB: gadget: udc: bdc: Remove unnecessary NULL checks in bdc_req_complete (git-fixes).\n- usb: gadget: udc: Potential Oops in error handling code (bsc#1111666).\n- USB: gadget: udc: s3c2410_udc: Remove pointless NULL check in s3c2410_udc_nuke (bsc#1051510).\n- usb: host: ehci-exynos: Fix error check in exynos_ehci_probe() (bsc#1111666).\n- USB: host: ehci-mxc: Add error handling in ehci_mxc_drv_probe() (bsc#1051510).\n- USB: host: xhci-plat: keep runtime active when removing host (git-fixes).\n- USB: hub: Fix handling of connect changes during sleep (git-fixes).\n- USB: musb: fix crash with highmen PIO and usbmon (bsc#1051510).\n- usb: musb: Fix runtime PM imbalance on error (bsc#1051510).\n- usb: musb: start session in resume for host port (bsc#1051510).\n- USBnet: silence an unnecessary warning (bsc#1170770).\n- usbnet: smsc95xx: Fix use-after-free after removal (bsc#1111666).\n- USB: ohci-sm501: Add missed iounmap() in remove (bsc#1111666).\n- USB: serial: ch341: add new Product ID for CH340 (bsc#1111666).\n- USB: serial: cypress_m8: enable Simply Automated UPB PIM (bsc#1111666).\n- USB: serial: garmin_gps: add sanity checking for data length (git-fixes).\n- USB: serial: io_edgeport: fix slab-out-of-bounds read in edge_interrupt_callback (bsc#1051510).\n- USB: serial: iuu_phoenix: fix memory corruption (bsc#1111666).\n- USB: serial: option: add BroadMobi BM806U (git-fixes).\n- USB: serial: option: add GosunCn GM500 series (bsc#1111666).\n- USB: serial: option: add Quectel EG95 LTE modem (bsc#1111666).\n- USB: serial: option: add support for ASKEY WWHC050 (git-fixes).\n- USB: serial: option: add Telit LE910C1-EUX compositions (bsc#1051510).\n- USB: serial: option: add Wistron Neweb D19Q1 (git-fixes).\n- USB: serial: qcserial: add DW5816e QDL support (bsc#1051510).\n- USB: serial: qcserial: Add DW5816e support (git-fixes).\n- USB: serial: usb_wwan: do not resubmit rx urb on fatal errors (bsc#1051510).\n- USB: serial: usb_wwan: do not resubmit rx urb on fatal errors (git-fixes).\n- USB: sisusbvga: Change port variable from signed to unsigned (git-fixes).\n- usb-storage: Add unusual_devs entry for JMicron JMS566 (git-fixes).\n- USB: uas: add quirk for LaCie 2Big Quadra (git-fixes).\n- USB: xhci: Fix NULL pointer dereference when enqueuing trbs from urb sg list (git-fixes).\n- vfio/pci: Fix SR-IOV VF handling with MMIO blocking (bsc#1174123).\n- vfs: Fix EOVERFLOW testing in put_compat_statfs64 (bnc#1151927 5.3.6).\n- video: fbdev: sis: Remove unnecessary parentheses and commented code (bsc#1114279)\n- video: fbdev: w100fb: Fix a potential double free (bsc#1051510).\n- virtio-blk: handle block_device_operations callbacks after hot unplug (git fixes (block drivers)).\n- virtio: virtio_console: add missing MODULE_DEVICE_TABLE() for rproc serial (git-fixes).\n- vmxnet3: add geneve and vxlan tunnel offload support (bsc#1172484).\n- vmxnet3: add support to get/set rx flow hash (bsc#1172484).\n- vmxnet3: allow rx flow hash ops only when rss is enabled (bsc#1172484).\n- vmxnet3: avoid format strint overflow warning (bsc#1172484).\n- vmxnet3: prepare for version 4 changes (bsc#1172484).\n- vmxnet3: Remove always false conditional statement (bsc#1172484).\n- vmxnet3: remove redundant initialization of pointer \u0027rq\u0027 (bsc#1172484).\n- vmxnet3: remove unused flag \u0027rxcsum\u0027 from struct vmxnet3_adapter (bsc#1172484).\n- vmxnet3: Replace msleep(1) with usleep_range() (bsc#1172484).\n- vmxnet3: update to version 4 (bsc#1172484).\n- vmxnet3: use correct hdr reference when packet is encapsulated (bsc#1172484).\n- vrf: Check skb for XFRM_TRANSFORMED flag (networking-stable-20_04_27).\n- vsock: fix timeout in vsock_accept() (networking-stable-20_06_07).\n- vt: ioctl, switch VT_IS_IN_USE and VT_BUSY to inlines (git-fixes).\n- vt: selection, introduce vc_is_sel (git-fixes).\n- vt: vt_ioctl: fix race in VT_RESIZEX (git-fixes).\n- vt: vt_ioctl: fix use-after-free in vt_in_use() (git-fixes).\n- vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console (git-fixes).\n- vxlan: Avoid infinite loop when suppressing NS messages with invalid options (git-fixes).\n- vxlan: check return value of gro_cells_init() (networking-stable-20_03_28).\n- w1: Add subsystem kernel public interface (jsc#SLE-11048).\n- w1: Fix slave count on 1-Wire bus (resend) (jsc#SLE-11048).\n- w1: keep balance of mutex locks and refcnts (jsc#SLE-11048).\n- w1: omap-hdq: cleanup to add missing newline for some dev_dbg (bsc#1051510).\n- w1: use put_device() if device_register() fail (jsc#SLE-11048).\n- watchdog: reset last_hw_keepalive time at start (git-fixes).\n- watchdog: sp805: fix restart handler (bsc#1111666).\n- wcn36xx: Fix error handling path in \u0027wcn36xx_probe()\u0027 (bsc#1051510).\n- wil6210: add general initialization/size checks (bsc#1111666).\n- wil6210: check rx_buff_mgmt before accessing it (bsc#1111666).\n- wil6210: ignore HALP ICR if already handled (bsc#1111666).\n- wil6210: make sure Rx ring sizes are correlated (git-fixes).\n- wil6210: remove reset file from debugfs (git-fixes).\n- wimax/i2400m: Fix potential urb refcnt leak (bsc#1051510).\n- work around mvfs bug (bsc#1162063).\n- workqueue: do not use wq_select_unbound_cpu() for bound works (bsc#1172130).\n- x86/apic: Install an empty physflat_init_apic_ldr (bsc#1163309).\n- x86/cpu/amd: Make erratum #1054 a legacy erratum (bsc#1114279).\n- x86/entry/64: Fix unwind hints in kernel exit path (bsc#1058115).\n- x86/entry/64: Fix unwind hints in register clearing code (bsc#1058115).\n- x86/entry/64: Fix unwind hints in rewind_stack_do_exit() (bsc#1058115).\n- x86/entry/64: Fix unwind hints in __switch_to_asm() (bsc#1058115).\n- x86/events/intel/ds: Add PERF_SAMPLE_PERIOD into PEBS_FREERUNNING_FLAGS (git-fixes).\n- x86: Fix early boot crash on gcc-10, third try (bsc#1114279).\n- x86/hyperv: Allow guests to enable InvariantTSC (bsc#1170621, bsc#1170620).\n- x86/Hyper-V: Free hv_panic_page when fail to register kmsg dump (bsc#1170617, bsc#1170618).\n- x86/Hyper-V: Report crash data in die() when panic_on_oops is set (bsc#1170617, bsc#1170618).\n- x86/Hyper-V: Report crash register data or kmsg before running crash kernel (bsc#1170617, bsc#1170618).\n- x86/Hyper-V: Report crash register data when sysctl_record_panic_msg is not set (bsc#1170617, bsc#1170618).\n- x86: hyperv: report value of misc_features (git fixes).\n- x86/Hyper-V: Trigger crash enlightenment only once during system crash (bsc#1170617, bsc#1170618).\n- x86/Hyper-V: Unload vmbus channel in hv panic callback (bsc#1170617, bsc#1170618).\n- x86/kprobes: Avoid kretprobe recursion bug (bsc#1114279).\n- x86/{mce,mm}: Unmap the entire page if the whole page is affected and poisoned (bsc#1172257).\n- x86/reboot/quirks: Add MacBook6,1 reboot quirk (bsc#1114279).\n- x86/resctrl: Fix invalid attempt at removing the default resource group (git-fixes).\n- x86/resctrl: Preserve CDP enable over CPU hotplug (bsc#1114279).\n- x86/unwind/orc: Do not skip the first frame for inactive tasks (bsc#1058115).\n- x86/unwind/orc: Fix error handling in __unwind_start() (bsc#1058115).\n- x86/unwind/orc: Fix error path for bad ORC entry type (bsc#1058115).\n- x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks (bsc#1058115).\n- x86/unwind/orc: Prevent unwinding before ORC initialization (bsc#1058115).\n- x86/unwind: Prevent false warnings for non-current tasks (bsc#1058115).\n- x86/xen: fix booting 32-bit pv guest (bsc#1071995).\n- x86/xen: Make the boot CPU idle task reliable (bsc#1071995).\n- x86/xen: Make the secondary CPU idle tasks reliable (bsc#1071995).\n- xen/blkfront: fix memory allocation flags in blkfront_setup_indirect() (bsc#1168486).\n- xen/pci: reserve MCFG areas earlier (bsc#1170145).\n- xfrm: Always set XFRM_TRANSFORMED in xfrm{4,6}_output_finish (networking-stable-20_04_27).\n- xfrm: fix error in comment (git fixes).\n- xfs: clear PF_MEMALLOC before exiting xfsaild thread (git-fixes).\n- xfs: Correctly invert xfs_buftarg LRU isolation logic (git-fixes).\n- xfs: do not ever return a stale pointer from __xfs_dir3_free_read (git-fixes).\n- xhci: Fix incorrect EP_STATE_MASK (git-fixes).\n- xprtrdma: Fix completion wait during device removal (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-2487,SUSE-SLE-Module-RT-15-SP1-2020-2487", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2487-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:2487-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20202487-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:2487-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1058115", "url": "https://bugzilla.suse.com/1058115" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1082555", "url": "https://bugzilla.suse.com/1082555" }, { "category": "self", "summary": "SUSE Bug 1083647", "url": "https://bugzilla.suse.com/1083647" }, { "category": "self", "summary": "SUSE Bug 1085030", "url": "https://bugzilla.suse.com/1085030" }, { "category": "self", "summary": "SUSE Bug 1089895", "url": "https://bugzilla.suse.com/1089895" }, { "category": "self", "summary": "SUSE Bug 1090036", "url": "https://bugzilla.suse.com/1090036" }, { "category": "self", "summary": "SUSE Bug 1103990", "url": "https://bugzilla.suse.com/1103990" }, { "category": "self", "summary": "SUSE Bug 1103991", "url": "https://bugzilla.suse.com/1103991" }, { "category": "self", "summary": "SUSE Bug 1103992", "url": "https://bugzilla.suse.com/1103992" }, { "category": "self", "summary": "SUSE Bug 1104745", "url": "https://bugzilla.suse.com/1104745" }, { "category": "self", "summary": "SUSE Bug 1109837", "url": "https://bugzilla.suse.com/1109837" }, { "category": "self", "summary": "SUSE Bug 1111666", "url": "https://bugzilla.suse.com/1111666" }, { "category": "self", "summary": "SUSE Bug 1112178", "url": "https://bugzilla.suse.com/1112178" }, { "category": "self", "summary": "SUSE Bug 1112374", "url": "https://bugzilla.suse.com/1112374" }, { "category": "self", "summary": "SUSE Bug 1113956", "url": "https://bugzilla.suse.com/1113956" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1124278", "url": "https://bugzilla.suse.com/1124278" }, { "category": "self", "summary": "SUSE Bug 1127354", "url": "https://bugzilla.suse.com/1127354" }, { "category": "self", "summary": "SUSE Bug 1127355", "url": "https://bugzilla.suse.com/1127355" }, { "category": "self", "summary": "SUSE Bug 1127371", "url": "https://bugzilla.suse.com/1127371" }, { "category": "self", "summary": "SUSE Bug 1133021", "url": "https://bugzilla.suse.com/1133021" }, { "category": "self", "summary": "SUSE Bug 1137325", "url": "https://bugzilla.suse.com/1137325" }, { "category": "self", "summary": "SUSE Bug 1142685", "url": "https://bugzilla.suse.com/1142685" }, { "category": "self", "summary": "SUSE Bug 1144333", "url": "https://bugzilla.suse.com/1144333" }, { "category": "self", "summary": "SUSE Bug 1145929", "url": "https://bugzilla.suse.com/1145929" }, { "category": "self", "summary": "SUSE Bug 1148868", "url": "https://bugzilla.suse.com/1148868" }, { "category": "self", "summary": "SUSE Bug 1150660", "url": "https://bugzilla.suse.com/1150660" }, { "category": "self", "summary": "SUSE Bug 1151794", "url": "https://bugzilla.suse.com/1151794" }, { "category": "self", "summary": "SUSE Bug 1151927", "url": "https://bugzilla.suse.com/1151927" }, { "category": "self", "summary": "SUSE Bug 1152489", "url": "https://bugzilla.suse.com/1152489" }, { "category": "self", "summary": "SUSE Bug 1152624", "url": "https://bugzilla.suse.com/1152624" }, { "category": "self", "summary": "SUSE Bug 1154824", "url": "https://bugzilla.suse.com/1154824" }, { "category": "self", "summary": "SUSE Bug 1157169", "url": "https://bugzilla.suse.com/1157169" }, { "category": "self", "summary": "SUSE Bug 1158265", "url": "https://bugzilla.suse.com/1158265" }, { "category": "self", "summary": "SUSE Bug 1158983", "url": "https://bugzilla.suse.com/1158983" }, { "category": "self", "summary": "SUSE Bug 1159037", "url": "https://bugzilla.suse.com/1159037" }, { "category": "self", "summary": "SUSE Bug 1159058", "url": "https://bugzilla.suse.com/1159058" }, { "category": "self", "summary": "SUSE Bug 1159199", "url": "https://bugzilla.suse.com/1159199" }, { "category": "self", "summary": "SUSE Bug 1160388", "url": "https://bugzilla.suse.com/1160388" }, { "category": "self", "summary": "SUSE Bug 1160947", "url": "https://bugzilla.suse.com/1160947" }, { "category": "self", "summary": "SUSE Bug 1161016", "url": "https://bugzilla.suse.com/1161016" }, { "category": "self", "summary": "SUSE Bug 1162002", "url": "https://bugzilla.suse.com/1162002" }, { "category": "self", "summary": "SUSE Bug 1162063", "url": "https://bugzilla.suse.com/1162063" }, { "category": "self", "summary": "SUSE Bug 1163309", "url": "https://bugzilla.suse.com/1163309" }, { "category": "self", "summary": "SUSE Bug 1163403", "url": "https://bugzilla.suse.com/1163403" }, { "category": "self", "summary": "SUSE Bug 1163897", "url": "https://bugzilla.suse.com/1163897" }, { "category": "self", "summary": "SUSE Bug 1164284", "url": "https://bugzilla.suse.com/1164284" }, { "category": "self", "summary": "SUSE Bug 1164780", "url": "https://bugzilla.suse.com/1164780" }, { "category": "self", "summary": "SUSE Bug 1164871", "url": "https://bugzilla.suse.com/1164871" }, { "category": "self", "summary": "SUSE Bug 1165183", "url": "https://bugzilla.suse.com/1165183" }, { "category": "self", "summary": "SUSE Bug 1165478", "url": "https://bugzilla.suse.com/1165478" }, { "category": "self", "summary": "SUSE Bug 1165741", "url": "https://bugzilla.suse.com/1165741" }, { "category": "self", "summary": "SUSE Bug 1166780", "url": "https://bugzilla.suse.com/1166780" }, { "category": "self", "summary": "SUSE Bug 1166860", "url": "https://bugzilla.suse.com/1166860" }, { "category": "self", "summary": "SUSE Bug 1166861", "url": "https://bugzilla.suse.com/1166861" }, { "category": "self", "summary": "SUSE Bug 1166862", "url": "https://bugzilla.suse.com/1166862" }, { "category": "self", "summary": "SUSE Bug 1166864", "url": "https://bugzilla.suse.com/1166864" }, { "category": "self", "summary": "SUSE Bug 1166866", "url": "https://bugzilla.suse.com/1166866" }, { "category": "self", "summary": "SUSE Bug 1166867", "url": "https://bugzilla.suse.com/1166867" }, { "category": "self", "summary": "SUSE Bug 1166868", "url": "https://bugzilla.suse.com/1166868" }, { "category": "self", "summary": "SUSE Bug 1166870", "url": "https://bugzilla.suse.com/1166870" }, { "category": "self", "summary": "SUSE Bug 1166940", "url": "https://bugzilla.suse.com/1166940" }, { "category": "self", "summary": "SUSE Bug 1166969", "url": "https://bugzilla.suse.com/1166969" }, { "category": "self", "summary": "SUSE Bug 1166978", "url": "https://bugzilla.suse.com/1166978" }, { "category": "self", "summary": "SUSE Bug 1166985", "url": "https://bugzilla.suse.com/1166985" }, { "category": "self", "summary": "SUSE Bug 1167104", "url": "https://bugzilla.suse.com/1167104" }, { "category": "self", "summary": "SUSE Bug 1167288", "url": "https://bugzilla.suse.com/1167288" }, { "category": "self", "summary": "SUSE Bug 1167574", "url": "https://bugzilla.suse.com/1167574" }, { "category": "self", "summary": "SUSE Bug 1167851", "url": "https://bugzilla.suse.com/1167851" }, { "category": "self", "summary": "SUSE Bug 1167867", "url": "https://bugzilla.suse.com/1167867" }, { "category": "self", "summary": "SUSE Bug 1168081", "url": "https://bugzilla.suse.com/1168081" }, { "category": "self", "summary": "SUSE Bug 1168202", "url": "https://bugzilla.suse.com/1168202" }, { "category": "self", "summary": "SUSE Bug 1168332", "url": "https://bugzilla.suse.com/1168332" }, { "category": "self", "summary": "SUSE Bug 1168486", "url": "https://bugzilla.suse.com/1168486" }, { "category": "self", "summary": "SUSE Bug 1168670", "url": "https://bugzilla.suse.com/1168670" }, { "category": "self", "summary": "SUSE Bug 1168760", "url": "https://bugzilla.suse.com/1168760" }, { "category": "self", "summary": "SUSE Bug 1168762", "url": "https://bugzilla.suse.com/1168762" }, { "category": "self", "summary": "SUSE Bug 1168763", "url": "https://bugzilla.suse.com/1168763" }, { "category": "self", "summary": "SUSE Bug 1168764", "url": "https://bugzilla.suse.com/1168764" }, { "category": "self", "summary": "SUSE Bug 1168765", "url": "https://bugzilla.suse.com/1168765" }, { "category": "self", "summary": "SUSE Bug 1168789", "url": "https://bugzilla.suse.com/1168789" }, { "category": "self", "summary": "SUSE Bug 1168881", "url": "https://bugzilla.suse.com/1168881" }, { "category": "self", "summary": "SUSE Bug 1168884", "url": "https://bugzilla.suse.com/1168884" }, { "category": "self", "summary": "SUSE Bug 1168952", "url": "https://bugzilla.suse.com/1168952" }, { "category": "self", "summary": "SUSE Bug 1168959", "url": "https://bugzilla.suse.com/1168959" }, { "category": "self", "summary": "SUSE Bug 1169020", "url": "https://bugzilla.suse.com/1169020" }, { "category": "self", "summary": "SUSE Bug 1169057", "url": "https://bugzilla.suse.com/1169057" }, { "category": "self", "summary": "SUSE Bug 1169194", "url": "https://bugzilla.suse.com/1169194" }, { "category": "self", "summary": "SUSE Bug 1169390", "url": "https://bugzilla.suse.com/1169390" }, { "category": "self", "summary": "SUSE Bug 1169514", "url": "https://bugzilla.suse.com/1169514" }, { "category": "self", "summary": "SUSE Bug 1169525", "url": "https://bugzilla.suse.com/1169525" }, { "category": "self", "summary": "SUSE Bug 1169625", "url": "https://bugzilla.suse.com/1169625" }, { "category": "self", "summary": "SUSE Bug 1169762", "url": "https://bugzilla.suse.com/1169762" }, { "category": "self", "summary": "SUSE Bug 1169771", "url": "https://bugzilla.suse.com/1169771" }, { "category": "self", "summary": "SUSE Bug 1169795", "url": "https://bugzilla.suse.com/1169795" }, { "category": "self", "summary": "SUSE Bug 1170011", "url": "https://bugzilla.suse.com/1170011" }, { "category": "self", "summary": "SUSE Bug 1170056", "url": "https://bugzilla.suse.com/1170056" }, { "category": "self", "summary": "SUSE Bug 1170125", "url": "https://bugzilla.suse.com/1170125" }, { "category": "self", "summary": "SUSE Bug 1170145", "url": "https://bugzilla.suse.com/1170145" }, { "category": "self", "summary": "SUSE Bug 1170284", "url": "https://bugzilla.suse.com/1170284" }, { "category": "self", "summary": "SUSE Bug 1170345", "url": "https://bugzilla.suse.com/1170345" }, { "category": "self", "summary": "SUSE Bug 1170442", "url": "https://bugzilla.suse.com/1170442" }, { "category": "self", "summary": "SUSE Bug 1170457", "url": "https://bugzilla.suse.com/1170457" }, { "category": "self", "summary": "SUSE Bug 1170522", "url": "https://bugzilla.suse.com/1170522" }, { "category": "self", "summary": "SUSE Bug 1170592", "url": "https://bugzilla.suse.com/1170592" }, { "category": "self", "summary": "SUSE Bug 1170617", "url": "https://bugzilla.suse.com/1170617" }, { "category": "self", "summary": "SUSE Bug 1170618", "url": "https://bugzilla.suse.com/1170618" }, { "category": "self", "summary": "SUSE Bug 1170620", "url": "https://bugzilla.suse.com/1170620" }, { "category": "self", "summary": "SUSE Bug 1170621", "url": "https://bugzilla.suse.com/1170621" }, { "category": "self", "summary": "SUSE Bug 1170770", "url": "https://bugzilla.suse.com/1170770" }, { "category": "self", "summary": "SUSE Bug 1170778", "url": "https://bugzilla.suse.com/1170778" }, { "category": "self", "summary": "SUSE Bug 1170791", "url": "https://bugzilla.suse.com/1170791" }, { "category": "self", "summary": "SUSE Bug 1170901", "url": "https://bugzilla.suse.com/1170901" }, { "category": "self", "summary": "SUSE Bug 1171078", "url": "https://bugzilla.suse.com/1171078" }, { "category": "self", "summary": "SUSE Bug 1171098", "url": "https://bugzilla.suse.com/1171098" }, { "category": "self", "summary": "SUSE Bug 1171118", "url": "https://bugzilla.suse.com/1171118" }, { "category": "self", "summary": "SUSE Bug 1171124", "url": "https://bugzilla.suse.com/1171124" }, { "category": "self", "summary": "SUSE Bug 1171189", "url": "https://bugzilla.suse.com/1171189" }, { "category": "self", "summary": "SUSE Bug 1171191", "url": "https://bugzilla.suse.com/1171191" }, { "category": "self", "summary": "SUSE Bug 1171195", "url": "https://bugzilla.suse.com/1171195" }, { "category": "self", "summary": "SUSE Bug 1171202", "url": "https://bugzilla.suse.com/1171202" }, { "category": "self", "summary": "SUSE Bug 1171205", "url": "https://bugzilla.suse.com/1171205" }, { "category": "self", "summary": "SUSE Bug 1171214", "url": "https://bugzilla.suse.com/1171214" }, { "category": "self", "summary": "SUSE Bug 1171217", "url": "https://bugzilla.suse.com/1171217" }, { "category": "self", "summary": "SUSE Bug 1171218", "url": "https://bugzilla.suse.com/1171218" }, { "category": "self", "summary": "SUSE Bug 1171219", "url": "https://bugzilla.suse.com/1171219" }, { "category": "self", "summary": "SUSE Bug 1171220", "url": "https://bugzilla.suse.com/1171220" }, { "category": "self", "summary": "SUSE Bug 1171244", "url": "https://bugzilla.suse.com/1171244" }, { "category": "self", "summary": "SUSE Bug 1171293", "url": "https://bugzilla.suse.com/1171293" }, { "category": "self", "summary": "SUSE Bug 1171417", "url": "https://bugzilla.suse.com/1171417" }, { "category": "self", "summary": "SUSE Bug 1171424", "url": "https://bugzilla.suse.com/1171424" }, { "category": "self", "summary": "SUSE Bug 1171527", "url": "https://bugzilla.suse.com/1171527" }, { "category": "self", "summary": "SUSE Bug 1171529", "url": "https://bugzilla.suse.com/1171529" }, { "category": "self", "summary": "SUSE Bug 1171530", "url": "https://bugzilla.suse.com/1171530" }, { "category": "self", "summary": "SUSE Bug 1171558", "url": "https://bugzilla.suse.com/1171558" }, { "category": "self", "summary": "SUSE Bug 1171599", "url": "https://bugzilla.suse.com/1171599" }, { "category": "self", "summary": "SUSE Bug 1171600", "url": "https://bugzilla.suse.com/1171600" }, { "category": "self", "summary": "SUSE Bug 1171601", "url": "https://bugzilla.suse.com/1171601" }, { "category": "self", "summary": "SUSE Bug 1171602", "url": "https://bugzilla.suse.com/1171602" }, { "category": "self", "summary": "SUSE Bug 1171604", "url": "https://bugzilla.suse.com/1171604" }, { "category": "self", "summary": "SUSE Bug 1171605", "url": "https://bugzilla.suse.com/1171605" }, { "category": "self", "summary": "SUSE Bug 1171606", "url": "https://bugzilla.suse.com/1171606" }, { "category": "self", "summary": "SUSE Bug 1171607", "url": "https://bugzilla.suse.com/1171607" }, { "category": "self", "summary": "SUSE Bug 1171608", "url": "https://bugzilla.suse.com/1171608" }, { "category": "self", "summary": "SUSE Bug 1171609", "url": "https://bugzilla.suse.com/1171609" }, { "category": "self", "summary": "SUSE Bug 1171610", "url": "https://bugzilla.suse.com/1171610" }, { "category": "self", "summary": "SUSE Bug 1171611", "url": "https://bugzilla.suse.com/1171611" }, { "category": "self", "summary": "SUSE Bug 1171612", "url": "https://bugzilla.suse.com/1171612" }, { "category": "self", "summary": "SUSE Bug 1171613", "url": "https://bugzilla.suse.com/1171613" }, { "category": "self", "summary": "SUSE Bug 1171614", "url": "https://bugzilla.suse.com/1171614" }, { "category": "self", "summary": "SUSE Bug 1171615", "url": "https://bugzilla.suse.com/1171615" }, { "category": "self", "summary": "SUSE Bug 1171616", "url": "https://bugzilla.suse.com/1171616" }, { "category": "self", "summary": "SUSE Bug 1171617", "url": "https://bugzilla.suse.com/1171617" }, { "category": "self", "summary": "SUSE Bug 1171618", "url": "https://bugzilla.suse.com/1171618" }, { "category": "self", "summary": "SUSE Bug 1171619", "url": "https://bugzilla.suse.com/1171619" }, { "category": "self", "summary": "SUSE Bug 1171620", "url": "https://bugzilla.suse.com/1171620" }, { "category": "self", "summary": "SUSE Bug 1171621", "url": "https://bugzilla.suse.com/1171621" }, { "category": "self", "summary": "SUSE Bug 1171622", "url": "https://bugzilla.suse.com/1171622" }, { "category": "self", "summary": "SUSE Bug 1171623", "url": "https://bugzilla.suse.com/1171623" }, { "category": "self", "summary": "SUSE Bug 1171624", "url": "https://bugzilla.suse.com/1171624" }, { "category": "self", "summary": "SUSE Bug 1171625", "url": "https://bugzilla.suse.com/1171625" }, { "category": "self", "summary": "SUSE Bug 1171626", "url": "https://bugzilla.suse.com/1171626" }, { "category": "self", "summary": "SUSE Bug 1171662", "url": "https://bugzilla.suse.com/1171662" }, { "category": "self", "summary": "SUSE Bug 1171679", "url": "https://bugzilla.suse.com/1171679" }, { "category": "self", "summary": "SUSE Bug 1171691", "url": "https://bugzilla.suse.com/1171691" }, { "category": "self", "summary": "SUSE Bug 1171692", "url": "https://bugzilla.suse.com/1171692" }, { "category": "self", "summary": "SUSE Bug 1171694", "url": "https://bugzilla.suse.com/1171694" }, { "category": "self", "summary": "SUSE Bug 1171695", "url": "https://bugzilla.suse.com/1171695" }, { "category": "self", "summary": "SUSE Bug 1171732", "url": "https://bugzilla.suse.com/1171732" }, { "category": "self", "summary": "SUSE Bug 1171736", "url": "https://bugzilla.suse.com/1171736" }, { "category": "self", "summary": "SUSE Bug 1171739", "url": "https://bugzilla.suse.com/1171739" }, { "category": "self", "summary": "SUSE Bug 1171743", "url": "https://bugzilla.suse.com/1171743" }, { "category": "self", "summary": "SUSE Bug 1171753", "url": "https://bugzilla.suse.com/1171753" }, { "category": "self", "summary": "SUSE Bug 1171759", "url": "https://bugzilla.suse.com/1171759" }, { "category": "self", "summary": "SUSE Bug 1171817", "url": "https://bugzilla.suse.com/1171817" }, { "category": "self", "summary": "SUSE Bug 1171835", "url": "https://bugzilla.suse.com/1171835" }, { "category": "self", "summary": "SUSE Bug 1171841", "url": "https://bugzilla.suse.com/1171841" }, { "category": "self", "summary": "SUSE Bug 1171868", "url": "https://bugzilla.suse.com/1171868" }, { "category": "self", "summary": "SUSE Bug 1171904", "url": "https://bugzilla.suse.com/1171904" }, { "category": "self", "summary": "SUSE Bug 1171948", "url": "https://bugzilla.suse.com/1171948" }, { "category": "self", "summary": "SUSE Bug 1171949", "url": "https://bugzilla.suse.com/1171949" }, { "category": "self", "summary": "SUSE Bug 1171951", "url": "https://bugzilla.suse.com/1171951" }, { "category": "self", "summary": "SUSE Bug 1171952", "url": "https://bugzilla.suse.com/1171952" }, { "category": "self", "summary": "SUSE Bug 1171979", "url": "https://bugzilla.suse.com/1171979" }, { "category": "self", "summary": "SUSE Bug 1171982", "url": "https://bugzilla.suse.com/1171982" }, { "category": "self", "summary": "SUSE Bug 1171983", "url": "https://bugzilla.suse.com/1171983" }, { "category": "self", "summary": "SUSE Bug 1171988", "url": "https://bugzilla.suse.com/1171988" }, { "category": "self", "summary": "SUSE Bug 1172017", "url": "https://bugzilla.suse.com/1172017" }, { "category": "self", "summary": "SUSE Bug 1172096", "url": "https://bugzilla.suse.com/1172096" }, { "category": "self", "summary": "SUSE Bug 1172097", "url": "https://bugzilla.suse.com/1172097" }, { "category": "self", "summary": "SUSE Bug 1172098", "url": "https://bugzilla.suse.com/1172098" }, { "category": "self", "summary": "SUSE Bug 1172099", "url": "https://bugzilla.suse.com/1172099" }, { "category": "self", "summary": "SUSE Bug 1172101", "url": "https://bugzilla.suse.com/1172101" }, { "category": "self", "summary": "SUSE Bug 1172102", "url": "https://bugzilla.suse.com/1172102" }, { "category": "self", "summary": "SUSE Bug 1172103", "url": "https://bugzilla.suse.com/1172103" }, { "category": "self", "summary": "SUSE Bug 1172104", "url": "https://bugzilla.suse.com/1172104" }, { "category": "self", "summary": "SUSE Bug 1172127", "url": "https://bugzilla.suse.com/1172127" }, { "category": "self", "summary": "SUSE Bug 1172130", "url": "https://bugzilla.suse.com/1172130" }, { "category": "self", "summary": "SUSE Bug 1172185", "url": "https://bugzilla.suse.com/1172185" }, { "category": "self", "summary": "SUSE Bug 1172188", "url": "https://bugzilla.suse.com/1172188" }, { "category": "self", "summary": "SUSE Bug 1172199", "url": "https://bugzilla.suse.com/1172199" }, { "category": "self", "summary": "SUSE Bug 1172201", "url": "https://bugzilla.suse.com/1172201" }, { "category": "self", "summary": "SUSE Bug 1172202", "url": "https://bugzilla.suse.com/1172202" }, { "category": "self", "summary": "SUSE Bug 1172221", "url": "https://bugzilla.suse.com/1172221" }, { "category": "self", "summary": "SUSE Bug 1172247", "url": "https://bugzilla.suse.com/1172247" }, { "category": "self", "summary": "SUSE Bug 1172249", "url": "https://bugzilla.suse.com/1172249" }, { "category": "self", "summary": "SUSE Bug 1172251", "url": "https://bugzilla.suse.com/1172251" }, { "category": "self", "summary": "SUSE Bug 1172257", "url": "https://bugzilla.suse.com/1172257" }, { "category": "self", "summary": "SUSE Bug 1172317", "url": "https://bugzilla.suse.com/1172317" }, { "category": "self", "summary": "SUSE Bug 1172342", "url": "https://bugzilla.suse.com/1172342" }, { "category": "self", "summary": "SUSE Bug 1172343", "url": "https://bugzilla.suse.com/1172343" }, { "category": "self", "summary": "SUSE Bug 1172344", "url": "https://bugzilla.suse.com/1172344" }, { "category": "self", "summary": "SUSE Bug 1172366", "url": "https://bugzilla.suse.com/1172366" }, { "category": "self", "summary": "SUSE Bug 1172378", "url": "https://bugzilla.suse.com/1172378" }, { "category": "self", "summary": "SUSE Bug 1172391", "url": "https://bugzilla.suse.com/1172391" }, { "category": "self", "summary": "SUSE Bug 1172397", "url": "https://bugzilla.suse.com/1172397" }, { "category": "self", "summary": "SUSE Bug 1172453", "url": "https://bugzilla.suse.com/1172453" }, { "category": "self", "summary": "SUSE Bug 1172458", "url": "https://bugzilla.suse.com/1172458" }, { "category": "self", "summary": "SUSE Bug 1172484", "url": "https://bugzilla.suse.com/1172484" }, { "category": "self", "summary": "SUSE Bug 1172537", "url": "https://bugzilla.suse.com/1172537" }, { "category": "self", "summary": "SUSE Bug 1172538", "url": "https://bugzilla.suse.com/1172538" }, { "category": "self", "summary": "SUSE Bug 1172687", "url": "https://bugzilla.suse.com/1172687" }, { "category": "self", "summary": "SUSE Bug 1172719", "url": "https://bugzilla.suse.com/1172719" }, { "category": "self", "summary": "SUSE Bug 1172759", "url": "https://bugzilla.suse.com/1172759" }, { "category": "self", "summary": "SUSE Bug 1172775", "url": "https://bugzilla.suse.com/1172775" }, { "category": "self", "summary": "SUSE Bug 1172781", "url": "https://bugzilla.suse.com/1172781" }, { "category": "self", "summary": "SUSE Bug 1172782", "url": "https://bugzilla.suse.com/1172782" }, { "category": "self", "summary": "SUSE Bug 1172783", "url": "https://bugzilla.suse.com/1172783" }, { "category": "self", "summary": "SUSE Bug 1172871", "url": "https://bugzilla.suse.com/1172871" }, { "category": "self", "summary": "SUSE Bug 1172872", "url": "https://bugzilla.suse.com/1172872" }, { "category": "self", "summary": "SUSE Bug 1172999", "url": "https://bugzilla.suse.com/1172999" }, { "category": "self", "summary": "SUSE Bug 1173060", "url": "https://bugzilla.suse.com/1173060" }, { "category": "self", "summary": "SUSE Bug 1173074", "url": "https://bugzilla.suse.com/1173074" }, { "category": "self", "summary": "SUSE Bug 1173146", "url": "https://bugzilla.suse.com/1173146" }, { "category": "self", "summary": "SUSE Bug 1173265", "url": "https://bugzilla.suse.com/1173265" }, { "category": "self", "summary": "SUSE Bug 1173280", "url": "https://bugzilla.suse.com/1173280" }, { "category": "self", "summary": "SUSE Bug 1173284", "url": "https://bugzilla.suse.com/1173284" }, { "category": "self", "summary": "SUSE Bug 1173428", "url": "https://bugzilla.suse.com/1173428" }, { "category": "self", "summary": "SUSE Bug 1173514", "url": "https://bugzilla.suse.com/1173514" }, { "category": "self", "summary": "SUSE Bug 1173567", "url": "https://bugzilla.suse.com/1173567" }, { "category": "self", "summary": "SUSE Bug 1173573", "url": "https://bugzilla.suse.com/1173573" }, { "category": "self", "summary": "SUSE Bug 1173746", "url": "https://bugzilla.suse.com/1173746" }, { "category": "self", "summary": "SUSE Bug 1173818", "url": "https://bugzilla.suse.com/1173818" }, { "category": "self", "summary": "SUSE Bug 1173820", "url": "https://bugzilla.suse.com/1173820" }, { "category": "self", "summary": "SUSE Bug 1173825", "url": "https://bugzilla.suse.com/1173825" }, { "category": "self", "summary": "SUSE Bug 1173826", "url": "https://bugzilla.suse.com/1173826" }, { "category": "self", "summary": "SUSE Bug 1173833", "url": "https://bugzilla.suse.com/1173833" }, { "category": "self", "summary": "SUSE Bug 1173838", "url": "https://bugzilla.suse.com/1173838" }, { "category": "self", "summary": "SUSE Bug 1173839", "url": "https://bugzilla.suse.com/1173839" }, { "category": "self", "summary": "SUSE Bug 1173845", "url": "https://bugzilla.suse.com/1173845" }, { "category": "self", "summary": "SUSE Bug 1173857", "url": "https://bugzilla.suse.com/1173857" }, { "category": "self", "summary": "SUSE Bug 1174113", "url": "https://bugzilla.suse.com/1174113" }, { "category": "self", "summary": "SUSE Bug 1174115", "url": "https://bugzilla.suse.com/1174115" }, { "category": "self", "summary": "SUSE Bug 1174122", "url": "https://bugzilla.suse.com/1174122" }, { "category": "self", "summary": "SUSE Bug 1174123", "url": "https://bugzilla.suse.com/1174123" }, { "category": "self", "summary": "SUSE Bug 1174186", "url": "https://bugzilla.suse.com/1174186" }, { "category": "self", "summary": "SUSE Bug 1174187", "url": "https://bugzilla.suse.com/1174187" }, { "category": "self", "summary": "SUSE Bug 1174296", "url": "https://bugzilla.suse.com/1174296" }, { "category": "self", "summary": "SUSE Bug 1174343", "url": "https://bugzilla.suse.com/1174343" }, { "category": "self", "summary": "SUSE Bug 1174356", "url": "https://bugzilla.suse.com/1174356" }, { "category": "self", "summary": "SUSE Bug 1174409", "url": "https://bugzilla.suse.com/1174409" }, { "category": "self", "summary": "SUSE Bug 1174438", "url": "https://bugzilla.suse.com/1174438" }, { "category": "self", "summary": "SUSE Bug 1174462", "url": "https://bugzilla.suse.com/1174462" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000199 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000199/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19462 page", "url": "https://www.suse.com/security/cve/CVE-2019-19462/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20806 page", "url": "https://www.suse.com/security/cve/CVE-2019-20806/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20810 page", "url": "https://www.suse.com/security/cve/CVE-2019-20810/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20812 page", "url": "https://www.suse.com/security/cve/CVE-2019-20812/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20908 page", "url": "https://www.suse.com/security/cve/CVE-2019-20908/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9455 page", "url": "https://www.suse.com/security/cve/CVE-2019-9455/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0305 page", "url": "https://www.suse.com/security/cve/CVE-2020-0305/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0543 page", "url": "https://www.suse.com/security/cve/CVE-2020-0543/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10135 page", "url": "https://www.suse.com/security/cve/CVE-2020-10135/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10690 page", "url": "https://www.suse.com/security/cve/CVE-2020-10690/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10711 page", "url": "https://www.suse.com/security/cve/CVE-2020-10711/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10720 page", "url": "https://www.suse.com/security/cve/CVE-2020-10720/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10732 page", "url": "https://www.suse.com/security/cve/CVE-2020-10732/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10751 page", "url": "https://www.suse.com/security/cve/CVE-2020-10751/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10757 page", "url": "https://www.suse.com/security/cve/CVE-2020-10757/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10766 page", "url": "https://www.suse.com/security/cve/CVE-2020-10766/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10767 page", "url": "https://www.suse.com/security/cve/CVE-2020-10767/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10768 page", "url": "https://www.suse.com/security/cve/CVE-2020-10768/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10769 page", "url": "https://www.suse.com/security/cve/CVE-2020-10769/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10773 page", "url": "https://www.suse.com/security/cve/CVE-2020-10773/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10781 page", "url": "https://www.suse.com/security/cve/CVE-2020-10781/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-11669 page", "url": "https://www.suse.com/security/cve/CVE-2020-11669/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12114 page", "url": "https://www.suse.com/security/cve/CVE-2020-12114/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12464 page", "url": "https://www.suse.com/security/cve/CVE-2020-12464/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12652 page", "url": "https://www.suse.com/security/cve/CVE-2020-12652/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12653 page", "url": "https://www.suse.com/security/cve/CVE-2020-12653/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12654 page", "url": "https://www.suse.com/security/cve/CVE-2020-12654/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12655 page", "url": "https://www.suse.com/security/cve/CVE-2020-12655/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12656 page", "url": "https://www.suse.com/security/cve/CVE-2020-12656/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12657 page", "url": "https://www.suse.com/security/cve/CVE-2020-12657/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12659 page", "url": "https://www.suse.com/security/cve/CVE-2020-12659/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12769 page", "url": "https://www.suse.com/security/cve/CVE-2020-12769/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12771 page", "url": "https://www.suse.com/security/cve/CVE-2020-12771/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12888 page", "url": "https://www.suse.com/security/cve/CVE-2020-12888/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-13143 page", "url": "https://www.suse.com/security/cve/CVE-2020-13143/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-13974 page", "url": "https://www.suse.com/security/cve/CVE-2020-13974/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14416 page", "url": "https://www.suse.com/security/cve/CVE-2020-14416/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15393 page", "url": "https://www.suse.com/security/cve/CVE-2020-15393/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15780 page", "url": "https://www.suse.com/security/cve/CVE-2020-15780/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-09-04T06:06:02Z", "generator": { "date": "2020-09-04T06:06:02Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:2487-1", "initial_release_date": "2020-09-04T06:06:02Z", "revision_history": [ { "date": "2020-09-04T06:06:02Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-rt-4.12.14-14.28.1.noarch", "product": { "name": "kernel-devel-rt-4.12.14-14.28.1.noarch", "product_id": "kernel-devel-rt-4.12.14-14.28.1.noarch" } }, { "category": "product_version", "name": "kernel-source-rt-4.12.14-14.28.1.noarch", "product": { "name": "kernel-source-rt-4.12.14-14.28.1.noarch", "product_id": "kernel-source-rt-4.12.14-14.28.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "product": { "name": "cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "product_id": "cluster-md-kmp-rt-4.12.14-14.28.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-rt_debug-4.12.14-14.28.1.x86_64", "product": { "name": "cluster-md-kmp-rt_debug-4.12.14-14.28.1.x86_64", "product_id": "cluster-md-kmp-rt_debug-4.12.14-14.28.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt-4.12.14-14.28.1.x86_64", "product": { "name": "dlm-kmp-rt-4.12.14-14.28.1.x86_64", "product_id": "dlm-kmp-rt-4.12.14-14.28.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt_debug-4.12.14-14.28.1.x86_64", "product": { "name": "dlm-kmp-rt_debug-4.12.14-14.28.1.x86_64", "product_id": "dlm-kmp-rt_debug-4.12.14-14.28.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "product": { "name": "gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "product_id": "gfs2-kmp-rt-4.12.14-14.28.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt_debug-4.12.14-14.28.1.x86_64", "product": { "name": "gfs2-kmp-rt_debug-4.12.14-14.28.1.x86_64", "product_id": "gfs2-kmp-rt_debug-4.12.14-14.28.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-4.12.14-14.28.1.x86_64", "product": { "name": "kernel-rt-4.12.14-14.28.1.x86_64", "product_id": "kernel-rt-4.12.14-14.28.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-base-4.12.14-14.28.1.x86_64", "product": { "name": "kernel-rt-base-4.12.14-14.28.1.x86_64", "product_id": "kernel-rt-base-4.12.14-14.28.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-4.12.14-14.28.1.x86_64", "product": { "name": "kernel-rt-devel-4.12.14-14.28.1.x86_64", "product_id": "kernel-rt-devel-4.12.14-14.28.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-extra-4.12.14-14.28.1.x86_64", "product": { "name": "kernel-rt-extra-4.12.14-14.28.1.x86_64", "product_id": "kernel-rt-extra-4.12.14-14.28.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-livepatch-devel-4.12.14-14.28.1.x86_64", "product": { "name": "kernel-rt-livepatch-devel-4.12.14-14.28.1.x86_64", "product_id": "kernel-rt-livepatch-devel-4.12.14-14.28.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-4.12.14-14.28.1.x86_64", "product": { "name": "kernel-rt_debug-4.12.14-14.28.1.x86_64", "product_id": "kernel-rt_debug-4.12.14-14.28.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-base-4.12.14-14.28.1.x86_64", "product": { "name": "kernel-rt_debug-base-4.12.14-14.28.1.x86_64", "product_id": "kernel-rt_debug-base-4.12.14-14.28.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "product": { "name": "kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "product_id": "kernel-rt_debug-devel-4.12.14-14.28.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-extra-4.12.14-14.28.1.x86_64", "product": { "name": "kernel-rt_debug-extra-4.12.14-14.28.1.x86_64", "product_id": "kernel-rt_debug-extra-4.12.14-14.28.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-livepatch-devel-4.12.14-14.28.1.x86_64", "product": { "name": "kernel-rt_debug-livepatch-devel-4.12.14-14.28.1.x86_64", "product_id": "kernel-rt_debug-livepatch-devel-4.12.14-14.28.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-4.12.14-14.28.1.x86_64", "product": { "name": "kernel-syms-rt-4.12.14-14.28.1.x86_64", "product_id": "kernel-syms-rt-4.12.14-14.28.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt-4.12.14-14.28.1.x86_64", "product": { "name": "kselftests-kmp-rt-4.12.14-14.28.1.x86_64", "product_id": "kselftests-kmp-rt-4.12.14-14.28.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt_debug-4.12.14-14.28.1.x86_64", "product": { "name": "kselftests-kmp-rt_debug-4.12.14-14.28.1.x86_64", "product_id": "kselftests-kmp-rt_debug-4.12.14-14.28.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt-4.12.14-14.28.1.x86_64", "product": { "name": "ocfs2-kmp-rt-4.12.14-14.28.1.x86_64", "product_id": "ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt_debug-4.12.14-14.28.1.x86_64", "product": { "name": "ocfs2-kmp-rt_debug-4.12.14-14.28.1.x86_64", "product_id": "ocfs2-kmp-rt_debug-4.12.14-14.28.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-rt-4.12.14-14.28.1.x86_64", "product": { "name": "reiserfs-kmp-rt-4.12.14-14.28.1.x86_64", "product_id": "reiserfs-kmp-rt-4.12.14-14.28.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-rt_debug-4.12.14-14.28.1.x86_64", "product": { "name": "reiserfs-kmp-rt_debug-4.12.14-14.28.1.x86_64", "product_id": "reiserfs-kmp-rt_debug-4.12.14-14.28.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Real Time Module 15 SP1", "product": { "name": "SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-rt:15:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-rt-4.12.14-14.28.1.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64" }, "product_reference": "cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-rt-4.12.14-14.28.1.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64" }, "product_reference": "dlm-kmp-rt-4.12.14-14.28.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-rt-4.12.14-14.28.1.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64" }, "product_reference": "gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-rt-4.12.14-14.28.1.noarch as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch" }, "product_reference": "kernel-devel-rt-4.12.14-14.28.1.noarch", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-4.12.14-14.28.1.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64" }, "product_reference": "kernel-rt-4.12.14-14.28.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-base-4.12.14-14.28.1.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64" }, "product_reference": "kernel-rt-base-4.12.14-14.28.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-4.12.14-14.28.1.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64" }, "product_reference": "kernel-rt-devel-4.12.14-14.28.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-devel-4.12.14-14.28.1.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64" }, "product_reference": "kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-4.12.14-14.28.1.noarch as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch" }, "product_reference": "kernel-source-rt-4.12.14-14.28.1.noarch", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-4.12.14-14.28.1.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64" }, "product_reference": "kernel-syms-rt-4.12.14-14.28.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-rt-4.12.14-14.28.1.x86_64 as component of SUSE Real Time Module 15 SP1", "product_id": "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" }, "product_reference": "ocfs2-kmp-rt-4.12.14-14.28.1.x86_64", "relates_to_product_reference": "SUSE Real Time Module 15 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-1000199", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000199" } ], "notes": [ { "category": "general", "text": "The Linux Kernel version 3.18 contains a dangerous feature vulnerability in modify_user_hw_breakpoint() that can result in crash and possibly memory corruption. This attack appear to be exploitable via local code execution and the ability to use ptrace. This vulnerability appears to have been fixed in git commit f67b15037a7a50c57f72e69a6d59941ad90a0f0f.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000199", "url": "https://www.suse.com/security/cve/CVE-2018-1000199" }, { "category": "external", "summary": "SUSE Bug 1089895 for CVE-2018-1000199", "url": "https://bugzilla.suse.com/1089895" }, { "category": "external", "summary": "SUSE Bug 1090036 for CVE-2018-1000199", "url": "https://bugzilla.suse.com/1090036" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "important" } ], "title": "CVE-2018-1000199" }, { "cve": "CVE-2019-19462", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19462" } ], "notes": [ { "category": "general", "text": "relay_open in kernel/relay.c in the Linux kernel through 5.4.1 allows local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19462", "url": "https://www.suse.com/security/cve/CVE-2019-19462" }, { "category": "external", "summary": "SUSE Bug 1158265 for CVE-2019-19462", "url": "https://bugzilla.suse.com/1158265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "low" } ], "title": "CVE-2019-19462" }, { "cve": "CVE-2019-20806", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20806" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.2. There is a NULL pointer dereference in tw5864_handle_frame() in drivers/media/pci/tw5864/tw5864-video.c, which may cause denial of service, aka CID-2e7682ebfc75.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20806", "url": "https://www.suse.com/security/cve/CVE-2019-20806" }, { "category": "external", "summary": "SUSE Bug 1172199 for CVE-2019-20806", "url": "https://bugzilla.suse.com/1172199" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "low" } ], "title": "CVE-2019-20806" }, { "cve": "CVE-2019-20810", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20810" } ], "notes": [ { "category": "general", "text": "go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel before 5.6 does not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20810", "url": "https://www.suse.com/security/cve/CVE-2019-20810" }, { "category": "external", "summary": "SUSE Bug 1172458 for CVE-2019-20810", "url": "https://bugzilla.suse.com/1172458" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "low" } ], "title": "CVE-2019-20810" }, { "cve": "CVE-2019-20812", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20812" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.4.7. The prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20812", "url": "https://www.suse.com/security/cve/CVE-2019-20812" }, { "category": "external", "summary": "SUSE Bug 1172453 for CVE-2019-20812", "url": "https://bugzilla.suse.com/1172453" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "moderate" } ], "title": "CVE-2019-20812" }, { "cve": "CVE-2019-20908", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20908" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/firmware/efi/efi.c in the Linux kernel before 5.4. Incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20908", "url": "https://www.suse.com/security/cve/CVE-2019-20908" }, { "category": "external", "summary": "SUSE Bug 1173567 for CVE-2019-20908", "url": "https://bugzilla.suse.com/1173567" }, { "category": "external", "summary": "SUSE Bug 1174187 for CVE-2019-20908", "url": "https://bugzilla.suse.com/1174187" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "important" } ], "title": "CVE-2019-20908" }, { "cve": "CVE-2019-9455", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9455" } ], "notes": [ { "category": "general", "text": "In the Android kernel in the video driver there is a kernel pointer leak due to a WARN_ON statement. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9455", "url": "https://www.suse.com/security/cve/CVE-2019-9455" }, { "category": "external", "summary": "SUSE Bug 1170345 for CVE-2019-9455", "url": "https://bugzilla.suse.com/1170345" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "moderate" } ], "title": "CVE-2019-9455" }, { "cve": "CVE-2020-0305", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0305" } ], "notes": [ { "category": "general", "text": "In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-153467744", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0305", "url": "https://www.suse.com/security/cve/CVE-2020-0305" }, { "category": "external", "summary": "SUSE Bug 1174462 for CVE-2020-0305", "url": "https://bugzilla.suse.com/1174462" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "moderate" } ], "title": "CVE-2020-0305" }, { "cve": "CVE-2020-0543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0543" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0543", "url": "https://www.suse.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "SUSE Bug 1154824 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1154824" }, { "category": "external", "summary": "SUSE Bug 1172205 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172205" }, { "category": "external", "summary": "SUSE Bug 1172206 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172206" }, { "category": "external", "summary": "SUSE Bug 1172207 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172207" }, { "category": "external", "summary": "SUSE Bug 1172770 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172770" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "moderate" } ], "title": "CVE-2020-0543" }, { "cve": "CVE-2020-10135", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10135" } ], "notes": [ { "category": "general", "text": "Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10135", "url": "https://www.suse.com/security/cve/CVE-2020-10135" }, { "category": "external", "summary": "SUSE Bug 1171988 for CVE-2020-10135", "url": "https://bugzilla.suse.com/1171988" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "moderate" } ], "title": "CVE-2020-10135" }, { "cve": "CVE-2020-10690", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10690" } ], "notes": [ { "category": "general", "text": "There is a use-after-free in kernel versions before 5.5 due to a race condition between the release of ptp_clock and cdev while resource deallocation. When a (high privileged) process allocates a ptp device file (like /dev/ptpX) and voluntarily goes to sleep. During this time if the underlying device is removed, it can cause an exploitable condition as the process wakes up to terminate and clean all attached files. The system crashes due to the cdev structure being invalid (as already freed) which is pointed to by the inode.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10690", "url": "https://www.suse.com/security/cve/CVE-2020-10690" }, { "category": "external", "summary": "SUSE Bug 1170056 for CVE-2020-10690", "url": "https://bugzilla.suse.com/1170056" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "moderate" } ], "title": "CVE-2020-10690" }, { "cve": "CVE-2020-10711", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10711" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s SELinux subsystem in versions before 5.7. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol\u0027s category bitmap into the SELinux extensible bitmap via the\u0027 ebitmap_netlbl_import\u0027 routine. While processing the CIPSO restricted bitmap tag in the \u0027cipso_v4_parsetag_rbm\u0027 routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allows a remote network user to crash the system kernel, resulting in a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10711", "url": "https://www.suse.com/security/cve/CVE-2020-10711" }, { "category": "external", "summary": "SUSE Bug 1171191 for CVE-2020-10711", "url": "https://bugzilla.suse.com/1171191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "moderate" } ], "title": "CVE-2020-10711" }, { "cve": "CVE-2020-10720", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10720" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of GRO in versions before 5.2. This flaw allows an attacker with local access to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10720", "url": "https://www.suse.com/security/cve/CVE-2020-10720" }, { "category": "external", "summary": "SUSE Bug 1170778 for CVE-2020-10720", "url": "https://bugzilla.suse.com/1170778" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "moderate" } ], "title": "CVE-2020-10720" }, { "cve": "CVE-2020-10732", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10732" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10732", "url": "https://www.suse.com/security/cve/CVE-2020-10732" }, { "category": "external", "summary": "SUSE Bug 1171220 for CVE-2020-10732", "url": "https://bugzilla.suse.com/1171220" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "low" } ], "title": "CVE-2020-10732" }, { "cve": "CVE-2020-10751", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10751" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10751", "url": "https://www.suse.com/security/cve/CVE-2020-10751" }, { "category": "external", "summary": "SUSE Bug 1171189 for CVE-2020-10751", "url": "https://bugzilla.suse.com/1171189" }, { "category": "external", "summary": "SUSE Bug 1174963 for CVE-2020-10751", "url": "https://bugzilla.suse.com/1174963" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "moderate" } ], "title": "CVE-2020-10751" }, { "cve": "CVE-2020-10757", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10757" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10757", "url": "https://www.suse.com/security/cve/CVE-2020-10757" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172317 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1172317" }, { "category": "external", "summary": "SUSE Bug 1172437 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1172437" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "important" } ], "title": "CVE-2020-10757" }, { "cve": "CVE-2020-10766", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10766" } ], "notes": [ { "category": "general", "text": "A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10766", "url": "https://www.suse.com/security/cve/CVE-2020-10766" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172781 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1172781" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "moderate" } ], "title": "CVE-2020-10766" }, { "cve": "CVE-2020-10767", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10767" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10767", "url": "https://www.suse.com/security/cve/CVE-2020-10767" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172782 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1172782" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "moderate" } ], "title": "CVE-2020-10767" }, { "cve": "CVE-2020-10768", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10768" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10768", "url": "https://www.suse.com/security/cve/CVE-2020-10768" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172783 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1172783" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "moderate" } ], "title": "CVE-2020-10768" }, { "cve": "CVE-2020-10769", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10769" } ], "notes": [ { "category": "general", "text": "A buffer over-read flaw was found in RH kernel versions before 5.0 in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm\u0027s module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash. This flaw allows a local attacker with user privileges to cause a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10769", "url": "https://www.suse.com/security/cve/CVE-2020-10769" }, { "category": "external", "summary": "SUSE Bug 1173265 for CVE-2020-10769", "url": "https://bugzilla.suse.com/1173265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "moderate" } ], "title": "CVE-2020-10769" }, { "cve": "CVE-2020-10773", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10773" } ], "notes": [ { "category": "general", "text": "A stack information leak flaw was found in s390/s390x in the Linux kernel\u0027s memory manager functionality, where it incorrectly writes to the /proc/sys/vm/cmm_timeout file. This flaw allows a local user to see the kernel data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10773", "url": "https://www.suse.com/security/cve/CVE-2020-10773" }, { "category": "external", "summary": "SUSE Bug 1172999 for CVE-2020-10773", "url": "https://bugzilla.suse.com/1172999" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "low" } ], "title": "CVE-2020-10773" }, { "cve": "CVE-2020-10781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10781" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel before 5.8-rc6 in the ZRAM kernel module, where a user with a local account and the ability to read the /sys/class/zram-control/hot_add file can create ZRAM device nodes in the /dev/ directory. This read allocates kernel memory and is not accounted for a user that triggers the creation of that ZRAM device. With this vulnerability, continually reading the device may consume a large amount of system memory and cause the Out-of-Memory (OOM) killer to activate and terminate random userspace processes, possibly making the system inoperable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10781", "url": "https://www.suse.com/security/cve/CVE-2020-10781" }, { "category": "external", "summary": "SUSE Bug 1173074 for CVE-2020-10781", "url": "https://bugzilla.suse.com/1173074" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "moderate" } ], "title": "CVE-2020-10781" }, { "cve": "CVE-2020-11669", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-11669" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.2 on the powerpc platform. arch/powerpc/kernel/idle_book3s.S does not have save/restore functionality for PNV_POWERSAVE_AMR, PNV_POWERSAVE_UAMOR, and PNV_POWERSAVE_AMOR, aka CID-53a712bae5dd.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-11669", "url": "https://www.suse.com/security/cve/CVE-2020-11669" }, { "category": "external", "summary": "SUSE Bug 1169390 for CVE-2020-11669", "url": "https://bugzilla.suse.com/1169390" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "moderate" } ], "title": "CVE-2020-11669" }, { "cve": "CVE-2020-12114", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12114" } ], "notes": [ { "category": "general", "text": "A pivot_root race condition in fs/namespace.c in the Linux kernel 4.4.x before 4.4.221, 4.9.x before 4.9.221, 4.14.x before 4.14.178, 4.19.x before 4.19.119, and 5.x before 5.3 allows local users to cause a denial of service (panic) by corrupting a mountpoint reference counter.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12114", "url": "https://www.suse.com/security/cve/CVE-2020-12114" }, { "category": "external", "summary": "SUSE Bug 1171098 for CVE-2020-12114", "url": "https://bugzilla.suse.com/1171098" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "moderate" } ], "title": "CVE-2020-12114" }, { "cve": "CVE-2020-12464", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12464" } ], "notes": [ { "category": "general", "text": "usb_sg_cancel in drivers/usb/core/message.c in the Linux kernel before 5.6.8 has a use-after-free because a transfer occurs without a reference, aka CID-056ad39ee925.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12464", "url": "https://www.suse.com/security/cve/CVE-2020-12464" }, { "category": "external", "summary": "SUSE Bug 1170901 for CVE-2020-12464", "url": "https://bugzilla.suse.com/1170901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 1.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "low" } ], "title": "CVE-2020-12464" }, { "cve": "CVE-2020-12652", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12652" } ], "notes": [ { "category": "general", "text": "The __mptctl_ioctl function in drivers/message/fusion/mptctl.c in the Linux kernel before 5.4.14 allows local users to hold an incorrect lock during the ioctl operation and trigger a race condition, i.e., a \"double fetch\" vulnerability, aka CID-28d76df18f0a. NOTE: the vendor states \"The security impact of this bug is not as bad as it could have been because these operations are all privileged and root already has enormous destructive power.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12652", "url": "https://www.suse.com/security/cve/CVE-2020-12652" }, { "category": "external", "summary": "SUSE Bug 1171218 for CVE-2020-12652", "url": "https://bugzilla.suse.com/1171218" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "moderate" } ], "title": "CVE-2020-12652" }, { "cve": "CVE-2020-12653", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12653" } ], "notes": [ { "category": "general", "text": "An issue was found in Linux kernel before 5.5.4. The mwifiex_cmd_append_vsie_tlv() function in drivers/net/wireless/marvell/mwifiex/scan.c allows local users to gain privileges or cause a denial of service because of an incorrect memcpy and buffer overflow, aka CID-b70261a288ea.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12653", "url": "https://www.suse.com/security/cve/CVE-2020-12653" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-12653", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1171195 for CVE-2020-12653", "url": "https://bugzilla.suse.com/1171195" }, { "category": "external", "summary": "SUSE Bug 1171254 for CVE-2020-12653", "url": "https://bugzilla.suse.com/1171254" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "important" } ], "title": "CVE-2020-12653" }, { "cve": "CVE-2020-12654", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12654" } ], "notes": [ { "category": "general", "text": "An issue was found in Linux kernel before 5.5.4. mwifiex_ret_wmm_get_status() in drivers/net/wireless/marvell/mwifiex/wmm.c allows a remote AP to trigger a heap-based buffer overflow because of an incorrect memcpy, aka CID-3a9b153c5591.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12654", "url": "https://www.suse.com/security/cve/CVE-2020-12654" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-12654", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1171202 for CVE-2020-12654", "url": "https://bugzilla.suse.com/1171202" }, { "category": "external", "summary": "SUSE Bug 1171252 for CVE-2020-12654", "url": "https://bugzilla.suse.com/1171252" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "important" } ], "title": "CVE-2020-12654" }, { "cve": "CVE-2020-12655", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12655" } ], "notes": [ { "category": "general", "text": "An issue was discovered in xfs_agf_verify in fs/xfs/libxfs/xfs_alloc.c in the Linux kernel through 5.6.10. Attackers may trigger a sync of excessive duration via an XFS v5 image with crafted metadata, aka CID-d0c7feaf8767.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12655", "url": "https://www.suse.com/security/cve/CVE-2020-12655" }, { "category": "external", "summary": "SUSE Bug 1171217 for CVE-2020-12655", "url": "https://bugzilla.suse.com/1171217" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "moderate" } ], "title": "CVE-2020-12655" }, { "cve": "CVE-2020-12656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12656" } ], "notes": [ { "category": "general", "text": "gss_mech_free in net/sunrpc/auth_gss/gss_mech_switch.c in the rpcsec_gss_krb5 implementation in the Linux kernel through 5.6.10 lacks certain domain_release calls, leading to a memory leak. Note: This was disputed with the assertion that the issue does not grant any access not already available. It is a problem that on unloading a specific kernel module some memory is leaked, but loading kernel modules is a privileged operation. A user could also write a kernel module to consume any amount of memory they like and load that replicating the effect of this bug", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12656", "url": "https://www.suse.com/security/cve/CVE-2020-12656" }, { "category": "external", "summary": "SUSE Bug 1171219 for CVE-2020-12656", "url": "https://bugzilla.suse.com/1171219" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "low" } ], "title": "CVE-2020-12656" }, { "cve": "CVE-2020-12657", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12657" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.6.5. There is a use-after-free in block/bfq-iosched.c related to bfq_idle_slice_timer_body.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12657", "url": "https://www.suse.com/security/cve/CVE-2020-12657" }, { "category": "external", "summary": "SUSE Bug 1171205 for CVE-2020-12657", "url": "https://bugzilla.suse.com/1171205" }, { "category": "external", "summary": "SUSE Bug 1201585 for CVE-2020-12657", "url": "https://bugzilla.suse.com/1201585" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "important" } ], "title": "CVE-2020-12657" }, { "cve": "CVE-2020-12659", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12659" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.6.7. xdp_umem_reg in net/xdp/xdp_umem.c has an out-of-bounds write (by a user with the CAP_NET_ADMIN capability) because of a lack of headroom validation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12659", "url": "https://www.suse.com/security/cve/CVE-2020-12659" }, { "category": "external", "summary": "SUSE Bug 1171214 for CVE-2020-12659", "url": "https://bugzilla.suse.com/1171214" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "moderate" } ], "title": "CVE-2020-12659" }, { "cve": "CVE-2020-12769", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12769" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.4.17. drivers/spi/spi-dw.c allows attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one, aka CID-19b61392c5a8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12769", "url": "https://www.suse.com/security/cve/CVE-2020-12769" }, { "category": "external", "summary": "SUSE Bug 1171983 for CVE-2020-12769", "url": "https://bugzilla.suse.com/1171983" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "moderate" } ], "title": "CVE-2020-12769" }, { "cve": "CVE-2020-12771", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12771" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.6.11. btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12771", "url": "https://www.suse.com/security/cve/CVE-2020-12771" }, { "category": "external", "summary": "SUSE Bug 1171732 for CVE-2020-12771", "url": "https://bugzilla.suse.com/1171732" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "moderate" } ], "title": "CVE-2020-12771" }, { "cve": "CVE-2020-12888", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12888" } ], "notes": [ { "category": "general", "text": "The VFIO PCI driver in the Linux kernel through 5.6.13 mishandles attempts to access disabled memory space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12888", "url": "https://www.suse.com/security/cve/CVE-2020-12888" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1171868 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1171868" }, { "category": "external", "summary": "SUSE Bug 1176979 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1176979" }, { "category": "external", "summary": "SUSE Bug 1179612 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1179612" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "moderate" } ], "title": "CVE-2020-12888" }, { "cve": "CVE-2020-13143", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-13143" } ], "notes": [ { "category": "general", "text": "gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c in the Linux kernel 3.16 through 5.6.13 relies on kstrdup without considering the possibility of an internal \u0027\\0\u0027 value, which allows attackers to trigger an out-of-bounds read, aka CID-15753588bcd4.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-13143", "url": "https://www.suse.com/security/cve/CVE-2020-13143" }, { "category": "external", "summary": "SUSE Bug 1171982 for CVE-2020-13143", "url": "https://bugzilla.suse.com/1171982" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "moderate" } ], "title": "CVE-2020-13143" }, { "cve": "CVE-2020-13974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-13974" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel 4.4 through 5.7.1. drivers/tty/vt/keyboard.c has an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. NOTE: Members in the community argue that the integer overflow does not lead to a security issue in this case.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-13974", "url": "https://www.suse.com/security/cve/CVE-2020-13974" }, { "category": "external", "summary": "SUSE Bug 1172775 for CVE-2020-13974", "url": "https://bugzilla.suse.com/1172775" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "moderate" } ], "title": "CVE-2020-13974" }, { "cve": "CVE-2020-14416", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14416" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.4.16, a race condition in tty-\u003edisc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14416", "url": "https://www.suse.com/security/cve/CVE-2020-14416" }, { "category": "external", "summary": "SUSE Bug 1162002 for CVE-2020-14416", "url": "https://bugzilla.suse.com/1162002" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "moderate" } ], "title": "CVE-2020-14416" }, { "cve": "CVE-2020-15393", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15393" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.4 through 5.7.6, usbtest_disconnect in drivers/usb/misc/usbtest.c has a memory leak, aka CID-28ebeb8db770.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15393", "url": "https://www.suse.com/security/cve/CVE-2020-15393" }, { "category": "external", "summary": "SUSE Bug 1173514 for CVE-2020-15393", "url": "https://bugzilla.suse.com/1173514" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "moderate" } ], "title": "CVE-2020-15393" }, { "cve": "CVE-2020-15780", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15780" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15780", "url": "https://www.suse.com/security/cve/CVE-2020-15780" }, { "category": "external", "summary": "SUSE Bug 1173573 for CVE-2020-15780", "url": "https://bugzilla.suse.com/1173573" }, { "category": "external", "summary": "SUSE Bug 1174186 for CVE-2020-15780", "url": "https://bugzilla.suse.com/1174186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.28.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.28.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-09-04T06:06:02Z", "details": "important" } ], "title": "CVE-2020-15780" } ] }
suse-su-2020:2134-1
Vulnerability from csaf_suse
Published
2020-08-05 14:26
Modified
2020-08-05 14:26
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-10135: Legacy pairing and secure-connections pairing authentication in Bluetooth may have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key (bnc#1171988).
- CVE-2020-10711: A NULL pointer dereference flaw was found in the SELinux subsystem. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. This flaw allowed a remote network user to crash the system kernel, resulting in a denial of service (bnc#1171191).
- CVE-2020-10751: A flaw was found in the SELinux LSM hook implementation, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing (bnc#1171189).
- CVE-2019-20812: An issue was discovered in the prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067 (bnc#1172453).
- CVE-2020-10732: A flaw was found in the implementation of userspace core dumps. This flaw allowed an attacker with a local account to crash a trivial program and exfiltrate private kernel data (bnc#1171220).
- CVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).
- CVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c had a deadlock if a coalescing operation fails (bnc#1171732).
- CVE-2020-10773: A kernel stack information leak on s390/s390x was fixed (bnc#1172999).
- CVE-2020-14416: A race condition in tty->disc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).
- CVE-2020-10768: Indirect branch speculation could have been enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command. (bnc#1172783).
- CVE-2020-10766: Fixed Rogue cross-process SSBD shutdown, where a Linux scheduler logical bug allows an attacker to turn off the SSBD protection. (bnc#1172781).
- CVE-2020-10767: Indirect Branch Prediction Barrier was force-disabled when STIBP is unavailable or enhanced IBRS is available. (bnc#1172782).
- CVE-2020-13974: drivers/tty/vt/keyboard.c had an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. (bnc#1172775).
- CVE-2019-20810: go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel did not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586 (bnc#1172458).
The following non-security bugs were fixed:
- intel_idle: Graceful probe failure when MWAIT is disabled (bsc#1174115).
- x86/dumpstack/64: Handle faults when printing the 'Stack: ' part of an OOPS (bsc#1170383).
- xfs: Fix tail rounding in xfs_alloc_file_space() (bsc#1172049).
Patchnames
SUSE-2020-2134,SUSE-OpenStack-Cloud-7-2020-2134,SUSE-SLE-HA-12-SP2-2020-2134,SUSE-SLE-SAP-12-SP2-2020-2134,SUSE-SLE-SERVER-12-SP2-2020-2134,SUSE-SLE-SERVER-12-SP2-BCL-2020-2134
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n\n- CVE-2020-10135: Legacy pairing and secure-connections pairing authentication in Bluetooth may have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key (bnc#1171988).\n- CVE-2020-10711: A NULL pointer dereference flaw was found in the SELinux subsystem. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol\u0027s category bitmap into the SELinux extensible bitmap via the\u0027 ebitmap_netlbl_import\u0027 routine. This flaw allowed a remote network user to crash the system kernel, resulting in a denial of service (bnc#1171191).\n- CVE-2020-10751: A flaw was found in the SELinux LSM hook implementation, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing (bnc#1171189).\n- CVE-2019-20812: An issue was discovered in the prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067 (bnc#1172453).\n- CVE-2020-10732: A flaw was found in the implementation of userspace core dumps. This flaw allowed an attacker with a local account to crash a trivial program and exfiltrate private kernel data (bnc#1171220).\n- CVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).\n- CVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c had a deadlock if a coalescing operation fails (bnc#1171732).\n- CVE-2020-10773: A kernel stack information leak on s390/s390x was fixed (bnc#1172999).\n- CVE-2020-14416: A race condition in tty-\u003edisc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).\n- CVE-2020-10768: Indirect branch speculation could have been enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command. (bnc#1172783).\n- CVE-2020-10766: Fixed Rogue cross-process SSBD shutdown, where a Linux scheduler logical bug allows an attacker to turn off the SSBD protection. (bnc#1172781).\n- CVE-2020-10767: Indirect Branch Prediction Barrier was force-disabled when STIBP is unavailable or enhanced IBRS is available. (bnc#1172782).\n- CVE-2020-13974: drivers/tty/vt/keyboard.c had an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. (bnc#1172775).\n- CVE-2019-20810: go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel did not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586 (bnc#1172458).\n\nThe following non-security bugs were fixed:\n\n- intel_idle: Graceful probe failure when MWAIT is disabled (bsc#1174115).\n- x86/dumpstack/64: Handle faults when printing the \u0027Stack: \u0027 part of an OOPS (bsc#1170383).\n- xfs: Fix tail rounding in xfs_alloc_file_space() (bsc#1172049).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-2134,SUSE-OpenStack-Cloud-7-2020-2134,SUSE-SLE-HA-12-SP2-2020-2134,SUSE-SLE-SAP-12-SP2-2020-2134,SUSE-SLE-SERVER-12-SP2-2020-2134,SUSE-SLE-SERVER-12-SP2-BCL-2020-2134", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2134-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:2134-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20202134-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:2134-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-August/007227.html" }, { "category": "self", "summary": "SUSE Bug 1162002", "url": "https://bugzilla.suse.com/1162002" }, { "category": "self", "summary": "SUSE Bug 1170383", "url": "https://bugzilla.suse.com/1170383" }, { "category": "self", "summary": "SUSE Bug 1171189", "url": "https://bugzilla.suse.com/1171189" }, { "category": "self", "summary": "SUSE Bug 1171191", "url": "https://bugzilla.suse.com/1171191" }, { "category": "self", "summary": "SUSE Bug 1171220", "url": "https://bugzilla.suse.com/1171220" }, { "category": "self", "summary": "SUSE Bug 1171732", "url": "https://bugzilla.suse.com/1171732" }, { "category": "self", "summary": "SUSE Bug 1171988", "url": "https://bugzilla.suse.com/1171988" }, { "category": "self", "summary": "SUSE Bug 1172049", "url": "https://bugzilla.suse.com/1172049" }, { "category": "self", "summary": "SUSE Bug 1172453", "url": "https://bugzilla.suse.com/1172453" }, { "category": "self", "summary": "SUSE Bug 1172458", "url": "https://bugzilla.suse.com/1172458" }, { "category": "self", "summary": "SUSE Bug 1172775", "url": "https://bugzilla.suse.com/1172775" }, { "category": "self", "summary": "SUSE Bug 1172781", "url": "https://bugzilla.suse.com/1172781" }, { "category": "self", "summary": "SUSE Bug 1172782", "url": "https://bugzilla.suse.com/1172782" }, { "category": "self", "summary": "SUSE Bug 1172783", "url": "https://bugzilla.suse.com/1172783" }, { "category": "self", "summary": "SUSE Bug 1172999", "url": "https://bugzilla.suse.com/1172999" }, { "category": "self", "summary": "SUSE Bug 1174115", "url": "https://bugzilla.suse.com/1174115" }, { "category": "self", "summary": "SUSE Bug 1174462", "url": "https://bugzilla.suse.com/1174462" }, { "category": "self", "summary": "SUSE Bug 1174543", "url": "https://bugzilla.suse.com/1174543" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20810 page", "url": "https://www.suse.com/security/cve/CVE-2019-20810/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20812 page", "url": "https://www.suse.com/security/cve/CVE-2019-20812/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0305 page", "url": "https://www.suse.com/security/cve/CVE-2020-0305/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10135 page", "url": "https://www.suse.com/security/cve/CVE-2020-10135/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10711 page", "url": "https://www.suse.com/security/cve/CVE-2020-10711/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10732 page", "url": "https://www.suse.com/security/cve/CVE-2020-10732/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10751 page", "url": "https://www.suse.com/security/cve/CVE-2020-10751/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10766 page", "url": "https://www.suse.com/security/cve/CVE-2020-10766/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10767 page", "url": "https://www.suse.com/security/cve/CVE-2020-10767/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10768 page", "url": "https://www.suse.com/security/cve/CVE-2020-10768/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10773 page", "url": "https://www.suse.com/security/cve/CVE-2020-10773/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12771 page", "url": "https://www.suse.com/security/cve/CVE-2020-12771/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-13974 page", "url": "https://www.suse.com/security/cve/CVE-2020-13974/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14416 page", "url": "https://www.suse.com/security/cve/CVE-2020-14416/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-08-05T14:26:45Z", "generator": { "date": "2020-08-05T14:26:45Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:2134-1", "initial_release_date": "2020-08-05T14:26:45Z", "revision_history": [ { "date": "2020-08-05T14:26:45Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.138.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.4.121-92.138.1.aarch64", "product_id": "cluster-md-kmp-default-4.4.121-92.138.1.aarch64" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.138.1.aarch64", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.138.1.aarch64", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.138.1.aarch64" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.138.1.aarch64", "product": { "name": "cluster-network-kmp-default-4.4.121-92.138.1.aarch64", "product_id": "cluster-network-kmp-default-4.4.121-92.138.1.aarch64" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.138.1.aarch64", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.138.1.aarch64", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.138.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.138.1.aarch64", "product": { "name": "dlm-kmp-default-4.4.121-92.138.1.aarch64", "product_id": "dlm-kmp-default-4.4.121-92.138.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.138.1.aarch64", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.138.1.aarch64", "product_id": "dlm-kmp-vanilla-4.4.121-92.138.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.138.1.aarch64", "product": { "name": "gfs2-kmp-default-4.4.121-92.138.1.aarch64", "product_id": "gfs2-kmp-default-4.4.121-92.138.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.138.1.aarch64", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.138.1.aarch64", "product_id": "gfs2-kmp-vanilla-4.4.121-92.138.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.138.1.aarch64", "product": { "name": "kernel-default-4.4.121-92.138.1.aarch64", "product_id": "kernel-default-4.4.121-92.138.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.138.1.aarch64", "product": { "name": "kernel-default-base-4.4.121-92.138.1.aarch64", "product_id": "kernel-default-base-4.4.121-92.138.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.138.1.aarch64", "product": { "name": "kernel-default-devel-4.4.121-92.138.1.aarch64", "product_id": "kernel-default-devel-4.4.121-92.138.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.138.1.aarch64", "product": { "name": "kernel-default-extra-4.4.121-92.138.1.aarch64", "product_id": "kernel-default-extra-4.4.121-92.138.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.138.1.aarch64", "product": { "name": "kernel-default-kgraft-4.4.121-92.138.1.aarch64", "product_id": "kernel-default-kgraft-4.4.121-92.138.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.138.1.aarch64", "product": { "name": "kernel-obs-build-4.4.121-92.138.1.aarch64", "product_id": "kernel-obs-build-4.4.121-92.138.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.138.1.aarch64", "product": { "name": "kernel-obs-qa-4.4.121-92.138.1.aarch64", "product_id": "kernel-obs-qa-4.4.121-92.138.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.138.1.aarch64", "product": { "name": "kernel-syms-4.4.121-92.138.1.aarch64", "product_id": "kernel-syms-4.4.121-92.138.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.138.1.aarch64", "product": { "name": "kernel-vanilla-4.4.121-92.138.1.aarch64", "product_id": "kernel-vanilla-4.4.121-92.138.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.138.1.aarch64", "product": { "name": "kernel-vanilla-base-4.4.121-92.138.1.aarch64", "product_id": "kernel-vanilla-base-4.4.121-92.138.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.138.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.4.121-92.138.1.aarch64", "product_id": "kernel-vanilla-devel-4.4.121-92.138.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.138.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.4.121-92.138.1.aarch64", "product_id": "ocfs2-kmp-default-4.4.121-92.138.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.138.1.aarch64", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.138.1.aarch64", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.138.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.4.121-92.138.1.noarch", "product": { "name": "kernel-devel-4.4.121-92.138.1.noarch", "product_id": "kernel-devel-4.4.121-92.138.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.4.121-92.138.1.noarch", "product": { "name": "kernel-docs-4.4.121-92.138.1.noarch", "product_id": "kernel-docs-4.4.121-92.138.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.4.121-92.138.1.noarch", "product": { "name": "kernel-docs-html-4.4.121-92.138.1.noarch", "product_id": "kernel-docs-html-4.4.121-92.138.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-pdf-4.4.121-92.138.1.noarch", "product": { "name": "kernel-docs-pdf-4.4.121-92.138.1.noarch", "product_id": "kernel-docs-pdf-4.4.121-92.138.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.4.121-92.138.1.noarch", "product": { "name": "kernel-macros-4.4.121-92.138.1.noarch", "product_id": "kernel-macros-4.4.121-92.138.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.4.121-92.138.1.noarch", "product": { "name": "kernel-source-4.4.121-92.138.1.noarch", "product_id": "kernel-source-4.4.121-92.138.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.4.121-92.138.1.noarch", "product": { "name": "kernel-source-vanilla-4.4.121-92.138.1.noarch", "product_id": "kernel-source-vanilla-4.4.121-92.138.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-debug-4.4.121-92.138.1.ppc64le", "product": { "name": "cluster-md-kmp-debug-4.4.121-92.138.1.ppc64le", "product_id": "cluster-md-kmp-debug-4.4.121-92.138.1.ppc64le" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.138.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.4.121-92.138.1.ppc64le", "product_id": "cluster-md-kmp-default-4.4.121-92.138.1.ppc64le" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.138.1.ppc64le", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.138.1.ppc64le", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.138.1.ppc64le" } }, { "category": "product_version", "name": "cluster-network-kmp-debug-4.4.121-92.138.1.ppc64le", "product": { "name": "cluster-network-kmp-debug-4.4.121-92.138.1.ppc64le", "product_id": "cluster-network-kmp-debug-4.4.121-92.138.1.ppc64le" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.138.1.ppc64le", "product": { "name": "cluster-network-kmp-default-4.4.121-92.138.1.ppc64le", "product_id": "cluster-network-kmp-default-4.4.121-92.138.1.ppc64le" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.138.1.ppc64le", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.138.1.ppc64le", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.138.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.4.121-92.138.1.ppc64le", "product": { "name": "dlm-kmp-debug-4.4.121-92.138.1.ppc64le", "product_id": "dlm-kmp-debug-4.4.121-92.138.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.138.1.ppc64le", "product": { "name": "dlm-kmp-default-4.4.121-92.138.1.ppc64le", "product_id": "dlm-kmp-default-4.4.121-92.138.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.138.1.ppc64le", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.138.1.ppc64le", "product_id": "dlm-kmp-vanilla-4.4.121-92.138.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.4.121-92.138.1.ppc64le", "product": { "name": "gfs2-kmp-debug-4.4.121-92.138.1.ppc64le", "product_id": "gfs2-kmp-debug-4.4.121-92.138.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.138.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.4.121-92.138.1.ppc64le", "product_id": "gfs2-kmp-default-4.4.121-92.138.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.138.1.ppc64le", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.138.1.ppc64le", "product_id": "gfs2-kmp-vanilla-4.4.121-92.138.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.4.121-92.138.1.ppc64le", "product": { "name": "kernel-debug-4.4.121-92.138.1.ppc64le", "product_id": "kernel-debug-4.4.121-92.138.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.4.121-92.138.1.ppc64le", "product": { "name": "kernel-debug-base-4.4.121-92.138.1.ppc64le", "product_id": "kernel-debug-base-4.4.121-92.138.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.4.121-92.138.1.ppc64le", "product": { "name": "kernel-debug-devel-4.4.121-92.138.1.ppc64le", "product_id": "kernel-debug-devel-4.4.121-92.138.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-extra-4.4.121-92.138.1.ppc64le", "product": { "name": "kernel-debug-extra-4.4.121-92.138.1.ppc64le", "product_id": "kernel-debug-extra-4.4.121-92.138.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-kgraft-4.4.121-92.138.1.ppc64le", "product": { "name": "kernel-debug-kgraft-4.4.121-92.138.1.ppc64le", "product_id": "kernel-debug-kgraft-4.4.121-92.138.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.138.1.ppc64le", "product": { "name": "kernel-default-4.4.121-92.138.1.ppc64le", "product_id": "kernel-default-4.4.121-92.138.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.138.1.ppc64le", "product": { "name": "kernel-default-base-4.4.121-92.138.1.ppc64le", "product_id": "kernel-default-base-4.4.121-92.138.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.138.1.ppc64le", "product": { "name": "kernel-default-devel-4.4.121-92.138.1.ppc64le", "product_id": "kernel-default-devel-4.4.121-92.138.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.138.1.ppc64le", "product": { "name": "kernel-default-extra-4.4.121-92.138.1.ppc64le", "product_id": "kernel-default-extra-4.4.121-92.138.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.138.1.ppc64le", "product": { "name": "kernel-default-kgraft-4.4.121-92.138.1.ppc64le", "product_id": "kernel-default-kgraft-4.4.121-92.138.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.138.1.ppc64le", "product": { "name": "kernel-obs-build-4.4.121-92.138.1.ppc64le", "product_id": "kernel-obs-build-4.4.121-92.138.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.138.1.ppc64le", "product": { "name": "kernel-obs-qa-4.4.121-92.138.1.ppc64le", "product_id": "kernel-obs-qa-4.4.121-92.138.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.138.1.ppc64le", "product": { "name": "kernel-syms-4.4.121-92.138.1.ppc64le", "product_id": "kernel-syms-4.4.121-92.138.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.138.1.ppc64le", "product": { "name": "kernel-vanilla-4.4.121-92.138.1.ppc64le", "product_id": "kernel-vanilla-4.4.121-92.138.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.138.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.4.121-92.138.1.ppc64le", "product_id": "kernel-vanilla-base-4.4.121-92.138.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.138.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.4.121-92.138.1.ppc64le", "product_id": "kernel-vanilla-devel-4.4.121-92.138.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "product": { "name": "kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "product_id": "kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.4.121-92.138.1.ppc64le", "product": { "name": "ocfs2-kmp-debug-4.4.121-92.138.1.ppc64le", "product_id": "ocfs2-kmp-debug-4.4.121-92.138.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.138.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.4.121-92.138.1.ppc64le", "product_id": "ocfs2-kmp-default-4.4.121-92.138.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.138.1.ppc64le", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.138.1.ppc64le", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.138.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.138.1.s390x", "product": { "name": "cluster-md-kmp-default-4.4.121-92.138.1.s390x", "product_id": "cluster-md-kmp-default-4.4.121-92.138.1.s390x" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.138.1.s390x", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.138.1.s390x", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.138.1.s390x" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.138.1.s390x", "product": { "name": "cluster-network-kmp-default-4.4.121-92.138.1.s390x", "product_id": "cluster-network-kmp-default-4.4.121-92.138.1.s390x" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.138.1.s390x", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.138.1.s390x", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.138.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.138.1.s390x", "product": { "name": "dlm-kmp-default-4.4.121-92.138.1.s390x", "product_id": "dlm-kmp-default-4.4.121-92.138.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.138.1.s390x", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.138.1.s390x", "product_id": "dlm-kmp-vanilla-4.4.121-92.138.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.138.1.s390x", "product": { "name": "gfs2-kmp-default-4.4.121-92.138.1.s390x", "product_id": "gfs2-kmp-default-4.4.121-92.138.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.138.1.s390x", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.138.1.s390x", "product_id": "gfs2-kmp-vanilla-4.4.121-92.138.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.138.1.s390x", "product": { "name": "kernel-default-4.4.121-92.138.1.s390x", "product_id": "kernel-default-4.4.121-92.138.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.138.1.s390x", "product": { "name": "kernel-default-base-4.4.121-92.138.1.s390x", "product_id": "kernel-default-base-4.4.121-92.138.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.138.1.s390x", "product": { "name": "kernel-default-devel-4.4.121-92.138.1.s390x", "product_id": "kernel-default-devel-4.4.121-92.138.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.138.1.s390x", "product": { "name": "kernel-default-extra-4.4.121-92.138.1.s390x", "product_id": "kernel-default-extra-4.4.121-92.138.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.138.1.s390x", "product": { "name": "kernel-default-kgraft-4.4.121-92.138.1.s390x", "product_id": "kernel-default-kgraft-4.4.121-92.138.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.4.121-92.138.1.s390x", "product": { "name": "kernel-default-man-4.4.121-92.138.1.s390x", "product_id": "kernel-default-man-4.4.121-92.138.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.138.1.s390x", "product": { "name": "kernel-obs-build-4.4.121-92.138.1.s390x", "product_id": "kernel-obs-build-4.4.121-92.138.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.138.1.s390x", "product": { "name": "kernel-obs-qa-4.4.121-92.138.1.s390x", "product_id": "kernel-obs-qa-4.4.121-92.138.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.138.1.s390x", "product": { "name": "kernel-syms-4.4.121-92.138.1.s390x", "product_id": "kernel-syms-4.4.121-92.138.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.138.1.s390x", "product": { "name": "kernel-vanilla-4.4.121-92.138.1.s390x", "product_id": "kernel-vanilla-4.4.121-92.138.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.138.1.s390x", "product": { "name": "kernel-vanilla-base-4.4.121-92.138.1.s390x", "product_id": "kernel-vanilla-base-4.4.121-92.138.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.138.1.s390x", "product": { "name": "kernel-vanilla-devel-4.4.121-92.138.1.s390x", "product_id": "kernel-vanilla-devel-4.4.121-92.138.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.4.121-92.138.1.s390x", "product": { "name": "kernel-zfcpdump-4.4.121-92.138.1.s390x", "product_id": "kernel-zfcpdump-4.4.121-92.138.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.138.1.s390x", "product": { "name": "ocfs2-kmp-default-4.4.121-92.138.1.s390x", "product_id": "ocfs2-kmp-default-4.4.121-92.138.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.138.1.s390x", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.138.1.s390x", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.138.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-debug-4.4.121-92.138.1.x86_64", "product": { "name": "cluster-md-kmp-debug-4.4.121-92.138.1.x86_64", "product_id": "cluster-md-kmp-debug-4.4.121-92.138.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.138.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.4.121-92.138.1.x86_64", "product_id": "cluster-md-kmp-default-4.4.121-92.138.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.138.1.x86_64", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.138.1.x86_64", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.138.1.x86_64" } }, { "category": "product_version", "name": "cluster-network-kmp-debug-4.4.121-92.138.1.x86_64", "product": { "name": "cluster-network-kmp-debug-4.4.121-92.138.1.x86_64", "product_id": "cluster-network-kmp-debug-4.4.121-92.138.1.x86_64" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.138.1.x86_64", "product": { "name": "cluster-network-kmp-default-4.4.121-92.138.1.x86_64", "product_id": "cluster-network-kmp-default-4.4.121-92.138.1.x86_64" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.138.1.x86_64", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.138.1.x86_64", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.138.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.4.121-92.138.1.x86_64", "product": { "name": "dlm-kmp-debug-4.4.121-92.138.1.x86_64", "product_id": "dlm-kmp-debug-4.4.121-92.138.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.138.1.x86_64", "product": { "name": "dlm-kmp-default-4.4.121-92.138.1.x86_64", "product_id": "dlm-kmp-default-4.4.121-92.138.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.138.1.x86_64", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.138.1.x86_64", "product_id": "dlm-kmp-vanilla-4.4.121-92.138.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.4.121-92.138.1.x86_64", "product": { "name": "gfs2-kmp-debug-4.4.121-92.138.1.x86_64", "product_id": "gfs2-kmp-debug-4.4.121-92.138.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.138.1.x86_64", "product": { "name": "gfs2-kmp-default-4.4.121-92.138.1.x86_64", "product_id": "gfs2-kmp-default-4.4.121-92.138.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.138.1.x86_64", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.138.1.x86_64", "product_id": "gfs2-kmp-vanilla-4.4.121-92.138.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.4.121-92.138.1.x86_64", "product": { "name": "kernel-debug-4.4.121-92.138.1.x86_64", "product_id": "kernel-debug-4.4.121-92.138.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.4.121-92.138.1.x86_64", "product": { "name": "kernel-debug-base-4.4.121-92.138.1.x86_64", "product_id": "kernel-debug-base-4.4.121-92.138.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.4.121-92.138.1.x86_64", "product": { "name": "kernel-debug-devel-4.4.121-92.138.1.x86_64", "product_id": "kernel-debug-devel-4.4.121-92.138.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-extra-4.4.121-92.138.1.x86_64", "product": { "name": "kernel-debug-extra-4.4.121-92.138.1.x86_64", "product_id": "kernel-debug-extra-4.4.121-92.138.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-kgraft-4.4.121-92.138.1.x86_64", "product": { "name": "kernel-debug-kgraft-4.4.121-92.138.1.x86_64", "product_id": "kernel-debug-kgraft-4.4.121-92.138.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.138.1.x86_64", "product": { "name": "kernel-default-4.4.121-92.138.1.x86_64", "product_id": "kernel-default-4.4.121-92.138.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.138.1.x86_64", "product": { "name": "kernel-default-base-4.4.121-92.138.1.x86_64", "product_id": "kernel-default-base-4.4.121-92.138.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.138.1.x86_64", "product": { "name": "kernel-default-devel-4.4.121-92.138.1.x86_64", "product_id": "kernel-default-devel-4.4.121-92.138.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.138.1.x86_64", "product": { "name": "kernel-default-extra-4.4.121-92.138.1.x86_64", "product_id": "kernel-default-extra-4.4.121-92.138.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.138.1.x86_64", "product": { "name": "kernel-default-kgraft-4.4.121-92.138.1.x86_64", "product_id": "kernel-default-kgraft-4.4.121-92.138.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.138.1.x86_64", "product": { "name": "kernel-obs-build-4.4.121-92.138.1.x86_64", "product_id": "kernel-obs-build-4.4.121-92.138.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.138.1.x86_64", "product": { "name": "kernel-obs-qa-4.4.121-92.138.1.x86_64", "product_id": "kernel-obs-qa-4.4.121-92.138.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.138.1.x86_64", "product": { "name": "kernel-syms-4.4.121-92.138.1.x86_64", "product_id": "kernel-syms-4.4.121-92.138.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.138.1.x86_64", "product": { "name": "kernel-vanilla-4.4.121-92.138.1.x86_64", "product_id": "kernel-vanilla-4.4.121-92.138.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.138.1.x86_64", "product": { "name": "kernel-vanilla-base-4.4.121-92.138.1.x86_64", "product_id": "kernel-vanilla-base-4.4.121-92.138.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.138.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.4.121-92.138.1.x86_64", "product_id": "kernel-vanilla-devel-4.4.121-92.138.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "product": { "name": "kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "product_id": "kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.4.121-92.138.1.x86_64", "product": { "name": "ocfs2-kmp-debug-4.4.121-92.138.1.x86_64", "product_id": "ocfs2-kmp-debug-4.4.121-92.138.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.138.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.4.121-92.138.1.x86_64", "product_id": "ocfs2-kmp-default-4.4.121-92.138.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.138.1.x86_64", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.138.1.x86_64", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.138.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE OpenStack Cloud 7", "product": { "name": "SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:7" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 12 SP2", "product": { "name": "SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.138.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.s390x" }, "product_reference": "kernel-default-4.4.121-92.138.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.138.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.138.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.138.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.s390x" }, "product_reference": "kernel-default-base-4.4.121-92.138.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.138.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.138.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.138.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.s390x" }, "product_reference": "kernel-default-devel-4.4.121-92.138.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.138.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.138.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.4.121-92.138.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.138.1.s390x" }, "product_reference": "kernel-default-man-4.4.121-92.138.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.138.1.noarch as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.138.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.138.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.138.1.noarch as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.138.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.138.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.138.1.noarch as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.138.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.138.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.138.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.s390x" }, "product_reference": "kernel-syms-4.4.121-92.138.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.138.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.138.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.121-92.138.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.4.121-92.138.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.121-92.138.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.4.121-92.138.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.121-92.138.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.4.121-92.138.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-network-kmp-default-4.4.121-92.138.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.ppc64le" }, "product_reference": "cluster-network-kmp-default-4.4.121-92.138.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-network-kmp-default-4.4.121-92.138.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.s390x" }, "product_reference": "cluster-network-kmp-default-4.4.121-92.138.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-network-kmp-default-4.4.121-92.138.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.x86_64" }, "product_reference": "cluster-network-kmp-default-4.4.121-92.138.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.121-92.138.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.4.121-92.138.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.121-92.138.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.s390x" }, "product_reference": "dlm-kmp-default-4.4.121-92.138.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.121-92.138.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.x86_64" }, "product_reference": "dlm-kmp-default-4.4.121-92.138.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.121-92.138.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.4.121-92.138.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.121-92.138.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.s390x" }, "product_reference": "gfs2-kmp-default-4.4.121-92.138.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.121-92.138.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.4.121-92.138.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.121-92.138.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.4.121-92.138.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.121-92.138.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.4.121-92.138.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.121-92.138.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.4.121-92.138.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.138.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.ppc64le" }, "product_reference": "kernel-default-4.4.121-92.138.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.138.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.138.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.138.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.ppc64le" }, "product_reference": "kernel-default-base-4.4.121-92.138.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.138.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.138.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.138.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.ppc64le" }, "product_reference": "kernel-default-devel-4.4.121-92.138.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.138.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.138.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.138.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.138.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.138.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.138.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.138.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.138.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.138.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.138.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.138.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.138.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.ppc64le" }, "product_reference": "kernel-syms-4.4.121-92.138.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.138.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.138.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.138.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.ppc64le" }, "product_reference": "kernel-default-4.4.121-92.138.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.138.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.s390x" }, "product_reference": "kernel-default-4.4.121-92.138.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.138.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.138.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.138.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.ppc64le" }, "product_reference": "kernel-default-base-4.4.121-92.138.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.138.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.s390x" }, "product_reference": "kernel-default-base-4.4.121-92.138.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.138.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.138.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.138.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.ppc64le" }, "product_reference": "kernel-default-devel-4.4.121-92.138.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.138.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.s390x" }, "product_reference": "kernel-default-devel-4.4.121-92.138.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.138.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.138.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.4.121-92.138.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.138.1.s390x" }, "product_reference": "kernel-default-man-4.4.121-92.138.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.138.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.138.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.138.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.138.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.138.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.138.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.138.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.138.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.138.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.138.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.ppc64le" }, "product_reference": "kernel-syms-4.4.121-92.138.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.138.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.s390x" }, "product_reference": "kernel-syms-4.4.121-92.138.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.138.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.138.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.138.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.138.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.138.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.138.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.138.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.138.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.138.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.138.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.138.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.138.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.138.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.138.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.138.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.138.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.138.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.138.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.138.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.138.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.138.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.138.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.138.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-20810", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20810" } ], "notes": [ { "category": "general", "text": "go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel before 5.6 does not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20810", "url": "https://www.suse.com/security/cve/CVE-2019-20810" }, { "category": "external", "summary": "SUSE Bug 1172458 for CVE-2019-20810", "url": "https://bugzilla.suse.com/1172458" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-05T14:26:45Z", "details": "low" } ], "title": "CVE-2019-20810" }, { "cve": "CVE-2019-20812", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20812" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.4.7. The prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20812", "url": "https://www.suse.com/security/cve/CVE-2019-20812" }, { "category": "external", "summary": "SUSE Bug 1172453 for CVE-2019-20812", "url": "https://bugzilla.suse.com/1172453" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-05T14:26:45Z", "details": "moderate" } ], "title": "CVE-2019-20812" }, { "cve": "CVE-2020-0305", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0305" } ], "notes": [ { "category": "general", "text": "In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-153467744", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0305", "url": "https://www.suse.com/security/cve/CVE-2020-0305" }, { "category": "external", "summary": "SUSE Bug 1174462 for CVE-2020-0305", "url": "https://bugzilla.suse.com/1174462" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-05T14:26:45Z", "details": "moderate" } ], "title": "CVE-2020-0305" }, { "cve": "CVE-2020-10135", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10135" } ], "notes": [ { "category": "general", "text": "Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10135", "url": "https://www.suse.com/security/cve/CVE-2020-10135" }, { "category": "external", "summary": "SUSE Bug 1171988 for CVE-2020-10135", "url": "https://bugzilla.suse.com/1171988" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-05T14:26:45Z", "details": "moderate" } ], "title": "CVE-2020-10135" }, { "cve": "CVE-2020-10711", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10711" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s SELinux subsystem in versions before 5.7. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol\u0027s category bitmap into the SELinux extensible bitmap via the\u0027 ebitmap_netlbl_import\u0027 routine. While processing the CIPSO restricted bitmap tag in the \u0027cipso_v4_parsetag_rbm\u0027 routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allows a remote network user to crash the system kernel, resulting in a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10711", "url": "https://www.suse.com/security/cve/CVE-2020-10711" }, { "category": "external", "summary": "SUSE Bug 1171191 for CVE-2020-10711", "url": "https://bugzilla.suse.com/1171191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-05T14:26:45Z", "details": "moderate" } ], "title": "CVE-2020-10711" }, { "cve": "CVE-2020-10732", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10732" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10732", "url": "https://www.suse.com/security/cve/CVE-2020-10732" }, { "category": "external", "summary": "SUSE Bug 1171220 for CVE-2020-10732", "url": "https://bugzilla.suse.com/1171220" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-05T14:26:45Z", "details": "low" } ], "title": "CVE-2020-10732" }, { "cve": "CVE-2020-10751", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10751" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10751", "url": "https://www.suse.com/security/cve/CVE-2020-10751" }, { "category": "external", "summary": "SUSE Bug 1171189 for CVE-2020-10751", "url": "https://bugzilla.suse.com/1171189" }, { "category": "external", "summary": "SUSE Bug 1174963 for CVE-2020-10751", "url": "https://bugzilla.suse.com/1174963" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-05T14:26:45Z", "details": "moderate" } ], "title": "CVE-2020-10751" }, { "cve": "CVE-2020-10766", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10766" } ], "notes": [ { "category": "general", "text": "A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10766", "url": "https://www.suse.com/security/cve/CVE-2020-10766" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172781 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1172781" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-05T14:26:45Z", "details": "moderate" } ], "title": "CVE-2020-10766" }, { "cve": "CVE-2020-10767", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10767" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10767", "url": "https://www.suse.com/security/cve/CVE-2020-10767" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172782 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1172782" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-05T14:26:45Z", "details": "moderate" } ], "title": "CVE-2020-10767" }, { "cve": "CVE-2020-10768", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10768" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10768", "url": "https://www.suse.com/security/cve/CVE-2020-10768" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172783 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1172783" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-05T14:26:45Z", "details": "moderate" } ], "title": "CVE-2020-10768" }, { "cve": "CVE-2020-10773", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10773" } ], "notes": [ { "category": "general", "text": "A stack information leak flaw was found in s390/s390x in the Linux kernel\u0027s memory manager functionality, where it incorrectly writes to the /proc/sys/vm/cmm_timeout file. This flaw allows a local user to see the kernel data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10773", "url": "https://www.suse.com/security/cve/CVE-2020-10773" }, { "category": "external", "summary": "SUSE Bug 1172999 for CVE-2020-10773", "url": "https://bugzilla.suse.com/1172999" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-05T14:26:45Z", "details": "low" } ], "title": "CVE-2020-10773" }, { "cve": "CVE-2020-12771", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12771" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.6.11. btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12771", "url": "https://www.suse.com/security/cve/CVE-2020-12771" }, { "category": "external", "summary": "SUSE Bug 1171732 for CVE-2020-12771", "url": "https://bugzilla.suse.com/1171732" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-05T14:26:45Z", "details": "moderate" } ], "title": "CVE-2020-12771" }, { "cve": "CVE-2020-13974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-13974" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel 4.4 through 5.7.1. drivers/tty/vt/keyboard.c has an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. NOTE: Members in the community argue that the integer overflow does not lead to a security issue in this case.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-13974", "url": "https://www.suse.com/security/cve/CVE-2020-13974" }, { "category": "external", "summary": "SUSE Bug 1172775 for CVE-2020-13974", "url": "https://bugzilla.suse.com/1172775" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-05T14:26:45Z", "details": "moderate" } ], "title": "CVE-2020-13974" }, { "cve": "CVE-2020-14416", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14416" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.4.16, a race condition in tty-\u003edisc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14416", "url": "https://www.suse.com/security/cve/CVE-2020-14416" }, { "category": "external", "summary": "SUSE Bug 1162002 for CVE-2020-14416", "url": "https://bugzilla.suse.com/1162002" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.138.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.138.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_138-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-05T14:26:45Z", "details": "moderate" } ], "title": "CVE-2020-14416" } ] }
suse-su-2020:2156-1
Vulnerability from csaf_suse
Published
2020-08-06 18:03
Modified
2020-08-06 18:03
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP4 RT kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-10135: Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key (bnc#1171988).
- CVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).
- CVE-2019-20908: An issue was discovered in drivers/firmware/efi/efi.c where incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032 (bnc#1173567).
- CVE-2020-10781: zram sysfs resource consumption was fixed (bnc#1173074).
- CVE-2020-15780: An issue was discovered in drivers/acpi/acpi_configfs.c where injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30 (bnc#1173573).
- CVE-2020-15393: usbtest_disconnect in drivers/usb/misc/usbtest.c had a memory leak, aka CID-28ebeb8db770 (bnc#1173514).
- CVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c had a deadlock if a coalescing operation fails (bnc#1171732).
- CVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).
- CVE-2020-10769: A buffer over-read flaw was found in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm's module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash. This flaw allowed a local attacker with user privileges to cause a denial of service (bnc#1173265).
- CVE-2020-10773: A kernel stack information leak on s390/s390x was fixed (bnc#1172999).
- CVE-2020-14416: A race condition in tty->disc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).
- CVE-2020-10766: Fixed an issue which allowed an attacker with a local account to disable SSBD protection (bnc#1172781).
- CVE-2020-10767: Fixed an issue where Indirect Branch Prediction Barrier was disabled in certain circumstances, leaving the system open to a spectre v2 style attack (bnc#1172782).
- CVE-2020-10768: Fixed an issue with the prctl() function, where indirect branch speculation could be enabled even though it was diabled before (bnc#1172783).
- CVE-2020-13974: Fixed a integer overflow in drivers/tty/vt/keyboard.c, if k_ascii is called several times in a row (bnc#1172775).
- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it. This attack is known as Special Register Buffer Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).
- CVE-2020-13974: Fixed an integer overflow in drivers/tty/vt/keyboard.c which could have been caused by calling multiple time in a row k_ascii (bsc#1172775).
- CVE-2020-13143: Fixed an out-of-bounds read in gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c (bsc#1171982).
- CVE-2020-12769: Fixed an issue which could have allowed attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one (bsc#1171983).
- CVE-2020-12657: An a use-after-free in block/bfq-iosched.c (bsc#1171205).
- CVE-2020-12656: Fixed an improper handling of certain domain_release calls leadingch could have led to a memory leak (bsc#1171219).
- CVE-2020-12655: Fixed an issue which could have allowed attackers to trigger a sync of excessive duration via an XFS v5 image with crafted metadata (bsc#1171217).
- CVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a remote AP to trigger a heap-based buffer overflow (bsc#1171202).
- CVE-2020-12653: Fixed an issue in the wifi driver which could have allowed local users to gain privileges or cause a denial of service (bsc#1171195).
- CVE-2020-12652: Fixed an issue which could have allowed local users to hold an incorrect lock during the ioctl operation and trigger a race condition (bsc#1171218).
- CVE-2020-12464: Fixed a use-after-free due to a transfer without a reference (bsc#1170901).
- CVE-2020-12114: Fixed a pivot_root race condition which could have allowed local users to cause a denial of service (panic) by corrupting a mountpoint reference counter (bsc#1171098).
- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172317).
- CVE-2020-10751: Fixed an improper implementation in SELinux LSM hook where it was assumed that an skb would only contain a single netlink message (bsc#1171189).
- CVE-2020-10732: Fixed kernel data leak in userspace coredumps due to uninitialized data (bsc#1171220).
- CVE-2020-10720: Fixed a use-after-free read in napi_gro_frags() (bsc#1170778).
- CVE-2020-10711: Fixed a null pointer dereference in SELinux subsystem which could have allowed a remote network user to crash the kernel resulting in a denial of service (bsc#1171191).
- CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev (bsc#1170056).
- CVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a video driver. This could lead to local information disclosure with System execution privileges needed (bsc#1170345).
- CVE-2019-20812: Fixed an issue in prb_calc_retire_blk_tmo() which could have resulted in a denial of service (bsc#1172453).
- CVE-2019-20810: Fixed a memory leak in due to not calling of snd_card_free (bsc#1172458).
- CVE-2019-20806: Fixed a null pointer dereference which may had lead to denial of service (bsc#1172199).
- CVE-2019-19462: Fixed an issue which could have allowed local user to cause denial of service (bsc#1158265).
- CVE-2019-16746: An issue was discovered in net/wireless/nl80211.c, where the length of variable elements in a beacon head was not checked, leading to a buffer overflow (bnc#1152107 1173659).
- CVE-2019-20810: go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c did not call snd_card_free for a failure path, which caused a memory leak, aka CID-9453264ef586 (bnc#1172458).
- CVE-2018-1000199: Fixed a potential local code execution via ptrace (bsc#1089895).
The following non-security bugs were fixed:
- ACPI: CPPC: Fix reference count leak in acpi_cppc_processor_probe() (bsc#1051510).
- ACPI: PM: Avoid using power resources if there are none for D0 (bsc#1051510).
- ACPI: sysfs: Fix reference count leak in acpi_sysfs_add_hotplug_profile() (bsc#1051510).
- acpi/x86: ignore unspecified bit positions in the ACPI global lock field (bsc#1051510).
- agp/intel: Reinforce the barrier after GTT updates (bsc#1051510).
- ALSA: ctxfi: Remove unnecessary cast in kfree (bsc#1051510).
- ALSA: dummy: Fix PCM format loop in proc output (bsc#1111666).
- ALSA: es1688: Add the missed snd_card_free() (bsc#1051510).
- ALSA: hda: Do not release card at firmware loading error (bsc#1051510).
- ALSA: hda/hdmi: fix race in monitor detection during probe (bsc#1051510).
- ALSA: hda/hdmi: fix without unlocked before return (bsc#1051510).
- ALSA: hda: Keep the controller initialization even if no codecs found (bsc#1051510).
- ALSA: hda/realtek - Add more fixup entries for Clevo machines (git-fixes).
- ALSA: hda/realtek - Add new codec supported for ALC245 (bsc#1051510).
- ALSA: hda/realtek - Add new codec supported for ALC287 (git-fixes).
- ALSA: hda/realtek - Fix S3 pop noise on Dell Wyse (git-fixes).
- ALSA: hda/realtek - Fix unexpected init_amp override (bsc#1051510).
- ALSA: hda/realtek - Limit int mic boost for Thinkpad T530 (git-fixes bsc#1171293).
- ALSA: hda/realtek - Two front mics on a Lenovo ThinkCenter (bsc#1051510).
- ALSA: hwdep: fix a left shifting 1 by 31 UB bug (git-fixes).
- ALSA: iec1712: Initialize STDSP24 properly when using the model=staudio option (git-fixes).
- ALSA: opti9xx: shut up gcc-10 range warning (bsc#1051510).
- ALSA: pcm: fix incorrect hw_base increase (git-fixes).
- ALSA: pcm: oss: Place the plugin buffer overflow checks correctly (bsc#1170522).
- ALSA: rawmidi: Fix racy buffer resize under concurrent accesses (git-fixes).
- ALSA: usb-audio: Add control message quirk delay for Kingston HyperX headset (git-fixes).
- ALSA: usb-audio: Correct a typo of NuPrime DAC-10 USB ID (bsc#1051510).
- ALSA: usb-audio: Do not override ignore_ctl_error value from the map (bsc#1051510).
- ALSA: usb-audio: Fix usb audio refcnt leak when getting spdif (bsc#1051510).
- ALSA: usb-audio: mixer: volume quirk for ESS Technology Asus USB DAC (git-fixes).
- ALSA: usx2y: Fix potential NULL dereference (bsc#1051510).
- ASoC: codecs: hdac_hdmi: Fix incorrect use of list_for_each_entry (bsc#1051510).
- ASoC: dapm: connect virtual mux with default value (bsc#1051510).
- ASoC: dapm: fixup dapm kcontrol widget (bsc#1051510).
- ASoC: dpcm: allow start or stop during pause for backend (bsc#1051510).
- ASoC: fix regwmask (bsc#1051510).
- ASoC: msm8916-wcd-digital: Reset RX interpolation path after use (bsc#1051510).
- ASoC: samsung: Prevent clk_get_rate() calls in atomic context (bsc#1111666).
- ASoC: topology: Check return value of pcm_new_ver (bsc#1051510).
- ASoC: topology: use name_prefix for new kcontrol (bsc#1051510).
- b43legacy: Fix case where channel status is corrupted (bsc#1051510).
- batman-adv: fix batadv_nc_random_weight_tq (git-fixes).
- batman-adv: Fix refcnt leak in batadv_show_throughput_override (git-fixes).
- batman-adv: Fix refcnt leak in batadv_store_throughput_override (git-fixes).
- batman-adv: Fix refcnt leak in batadv_v_ogm_process (git-fixes).
- bcache: avoid unnecessary btree nodes flushing in btree_flush_write() (git fixes (block drivers)).
- bcache: Fix an error code in bch_dump_read() (git fixes (block drivers)).
- bcache: fix incorrect data type usage in btree_flush_write() (git fixes (block drivers)).
- bcache: Revert 'bcache: shrink btree node cache after bch_btree_check()' (git fixes (block drivers)).
- block, bfq: add requeue-request hook (bsc#1104967 bsc#1171673).
- block, bfq: postpone rq preparation to insert or merge (bsc#1104967 bsc#1171673).
- block/drbd: delete invalid function drbd_md_mark_dirty_ (bsc#1171527).
- block: drbd: remove a stray unlock in __drbd_send_protocol() (bsc#1171599).
- block: fix busy device checking in blk_drop_partitions again (bsc#1171948).
- block: fix busy device checking in blk_drop_partitions (bsc#1171948).
- block: fix memleak of bio integrity data (git fixes (block drivers)).
- block: remove QUEUE_FLAG_STACKABLE (git fixes (block drivers)).
- block: remove the bd_openers checks in blk_drop_partitions (bsc#1171948).
- block: sed-opal: fix sparse warning: convert __be64 data (git fixes (block drivers)).
- bnxt_en: fix memory leaks in bnxt_dcbnl_ieee_getets() (networking-stable-20_03_28).
- bnxt_en: reinitialize IRQs when MTU is modified (networking-stable-20_03_14).
- bonding/alb: make sure arp header is pulled before accessing it (networking-stable-20_03_14).
- brcmfmac: abort and release host after error (bsc#1051510).
- btrfs: always wait on ordered extents at fsync time (bsc#1171761).
- btrfs: clean up the left over logged_list usage (bsc#1171761).
- btrfs: do not zero f_bavail if we have available space (bsc#1168081).
- btrfs: fix deadlock with memory reclaim during scrub (bsc#1172127).
- Btrfs: fix list_add corruption and soft lockups in fsync (bsc#1171761).
- btrfs: fix log context list corruption after rename whiteout error (bsc#1172342).
- Btrfs: fix missing data checksums after a ranged fsync (msync) (bsc#1171761).
- btrfs: fix missing file extent item for hole after ranged fsync (bsc#1171761).
- Btrfs: fix missing hole after hole punching and fsync when using NO_HOLES (bsc#1171761).
- btrfs: fix missing semaphore unlock in btrfs_sync_file (bsc#1171761).
- btrfs: fix partial loss of prealloc extent past i_size after fsync (bsc#1172343).
- Btrfs: fix rare chances for data loss when doing a fast fsync (bsc#1171761).
- btrfs: move the dio_sem higher up the callchain (bsc#1171761).
- btrfs: reloc: clear DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417 bsc#1160947 bsc#1172366).
- btrfs: reloc: fix reloc root leak and NULL pointer dereference (bsc#1171417 bsc#1160947 bsc#1172366).
- btrfs: Remove extra parentheses from condition in copy_items() (bsc#1171761).
- Btrfs: remove no longer used io_err from btrfs_log_ctx (bsc#1171761).
- Btrfs: remove no longer used logged range variables when logging extents (bsc#1171761).
- Btrfs: remove no longer used 'sync' member from transaction handle (bsc#1171761).
- btrfs: remove remaing full_sync logic from btrfs_sync_file (bsc#1171761).
- btrfs: remove the logged extents infrastructure (bsc#1171761).
- btrfs: remove the wait ordered logic in the log_one_extent path (bsc#1171761).
- btrfs: setup a nofs context for memory allocation at btrfs_create_tree() (bsc#1172127).
- btrfs: setup a nofs context for memory allocation at __btrfs_set_acl (bsc#1172127).
- btrfs: use nofs context when initializing security xattrs to avoid deadlock (bsc#1172127).
- btrfs: volumes: Remove ENOSPC-prone btrfs_can_relocate() (bsc#1171124).
- can: add missing attribute validation for termination (networking-stable-20_03_14).
- cdc-acm: close race betrween suspend() and acm_softint (git-fixes).
- CDC-ACM: heed quirk also in error handling (git-fixes).
- cdc-acm: introduce a cool down (git-fixes).
- ceph: fix double unlock in handle_cap_export() (bsc#1171694).
- ceph: fix endianness bug when handling MDS session feature bits (bsc#1171695).
- cgroup, netclassid: periodically release file_lock on classid updating (networking-stable-20_03_14).
- CIFS: Allocate crypto structures on the fly for calculating signatures of incoming packets (bsc#1144333).
- CIFS: Allocate encryption header through kmalloc (bsc#1144333).
- CIFS: allow unlock flock and OFD lock across fork (bsc#1144333).
- CIFS: check new file size when extending file by fallocate (bsc#1144333).
- CIFS: cifspdu.h: Replace zero-length array with flexible-array member (bsc#1144333).
- CIFS: clear PF_MEMALLOC before exiting demultiplex thread (bsc#1144333).
- CIFS: do not share tcons with DFS (bsc#1144333).
- CIFS: dump the session id and keys also for SMB2 sessions (bsc#1144333).
- CIFS: ensure correct super block for DFS reconnect (bsc#1144333).
- CIFS: Fix bug which the return value by asynchronous read is error (bsc#1144333).
- CIFS: fix uninitialised lease_key in open_shroot() (bsc#1144333).
- cifs: get rid of unused parameter in reconn_setup_dfs_targets() (bsc#1144333).
- cifs: handle hostnames that resolve to same ip in failover (bsc#1144333 bsc#1161016).
- CIFS: improve read performance for page size 64KB & cache=strict & vers=2.1+ (bsc#1144333).
- CIFS: Increment num_remote_opens stats counter even in case of smb2_query_dir_first (bsc#1144333).
- CIFS: minor update to comments around the cifs_tcp_ses_lock mutex (bsc#1144333).
- CIFS: protect updating server->dstaddr with a spinlock (bsc#1144333).
- cifs: set up next DFS target before generic_ip_connect() (bsc#1144333 bsc#1161016).
- CIFS: smb2pdu.h: Replace zero-length array with flexible-array member (bsc#1144333).
- CIFS: smbd: Calculate the correct maximum packet size for segmented SMBDirect send/receive (bsc#1144333).
- CIFS: smbd: Check and extend sender credits in interrupt context (bsc#1144333).
- CIFS: smbd: Check send queue size before posting a send (bsc#1144333).
- CIFS: smbd: Do not schedule work to send immediate packet on every receive (bsc#1144333).
- CIFS: smbd: Merge code to track pending packets (bsc#1144333).
- CIFS: smbd: Properly process errors on ib_post_send (bsc#1144333).
- CIFS: smbd: Update receive credits before sending and deal with credits roll back on failure before sending (bsc#1144333).
- CIFS: Warn less noisily on default mount (bsc#1144333).
- clk: Add clk_hw_unregister_composite helper function definition (bsc#1051510).
- clk: bcm2835: Fix return type of bcm2835_register_gate (bsc#1051510).
- clk: clk-flexgen: fix clock-critical handling (bsc#1051510).
- clk: imx6ull: use OSC clock during AXI rate change (bsc#1051510).
- clk: imx: make mux parent strings const (bsc#1051510).
- clk: mediatek: correct the clocks for MT2701 HDMI PHY module (bsc#1051510).
- clk: sunxi: Fix incorrect usage of round_down() (bsc#1051510).
- clk: sunxi-ng: a64: Fix gate bit of DSI DPHY (bsc#1051510).
- clocksource/drivers/hyper-v: Set TSC clocksource as default w/ InvariantTSC (bsc#1170620).
- clocksource: dw_apb_timer_of: Fix missing clockevent timers (bsc#1051510).
- compat_ioctl: block: handle BLKREPORTZONE/BLKRESETZONE (git fixes (block drivers)).
- compat_ioctl: block: handle Persistent Reservations (git fixes (block drivers)).
- component: Silence bind error on -EPROBE_DEFER (bsc#1051510).
- copy_{to,from}_user(): consolidate object size checks (git fixes).
- coresight: do not use the BIT() macro in the UAPI header (git fixes (block drivers)).
- cpufreq: s3c64xx: Remove pointless NULL check in s3c64xx_cpufreq_driver_init (bsc#1051510).
- crypto: cavium/nitrox - Fix 'nitrox_get_first_device()' when ndevlist is fully iterated (git-fixes).
- crypto: ccp - AES CFB mode is a stream cipher (git-fixes).
- crypto: ccp - Clean up and exit correctly on allocation failure (git-fixes).
- crypto: ccp - Cleanup misc_dev on sev_exit() (bsc#1114279).
- crypto: ccp - Cleanup sp_dev_master in psp_dev_destroy() (bsc#1114279).
- debugfs: Add debugfs_create_xul() for hexadecimal unsigned long (git-fixes).
- dmaengine: dmatest: Fix iteration non-stop logic (bsc#1051510).
- dm btree: increase rebalance threshold in __rebalance2() (git fixes (block drivers)).
- dm cache: fix a crash due to incorrect work item cancelling (git fixes (block drivers)).
- dm crypt: fix benbi IV constructor crash if used in authenticated mode (git fixes (block drivers)).
- dm: fix potential for q->make_request_fn NULL pointer (git fixes (block drivers)).
- dm mpath: switch paths in dm_blk_ioctl() code path (bsc#1167574).
- dm space map common: fix to ensure new block isn't already in use (git fixes (block drivers)).
- dm: various cleanups to md->queue initialization code (git fixes).
- dm verity fec: fix hash block number in verity_fec_decode (git fixes (block drivers)).
- dm verity fec: fix memory leak in verity_fec_dtr (git fixes (block drivers)).
- dm writecache: fix data corruption when reloading the target (git fixes (block drivers)).
- dm writecache: fix incorrect flush sequence when doing SSD mode commit (git fixes (block drivers)).
- dm writecache: verify watermark during resume (git fixes (block drivers)).
- dm zoned: fix invalid memory access (git fixes (block drivers)).
- dm zoned: reduce overhead of backing device checks (git fixes (block drivers)).
- dm zoned: remove duplicate nr_rnd_zones increase in dmz_init_zone() (git fixes (block drivers)).
- dm zoned: support zone sizes smaller than 128MiB (git fixes (block drivers)).
- dp83640: reverse arguments to list_add_tail (git-fixes).
- Drivers: hv: Add a module description line to the hv_vmbus driver (bsc#1172253).
- Drivers: HV: Send one page worth of kmsg dump over Hyper-V during panic (bsc#1170618).
- Drivers: hv: vmbus: Fix the issue with freeing up hv_ctl_table_hdr (bsc#1170618).
- Drivers: hv: vmbus: Get rid of MSR access from vmbus_drv.c (bsc#1170618).
- Drivers: hv: vmus: Fix the check for return value from kmsg get dump buffer (bsc#1170618).
- Drivers/net/ibmvnic: Update VNIC protocol version reporting (bsc#1065729).
- Drivers: soc: ti: knav_qmss_queue: Make knav_gp_range_ops static (bsc#1051510).
- drm: amd/acp: fix broken menu structure (bsc#1114279) * context changes
- drm/crc: Actually allow to change the crc source (bsc#1114279) * offset changes
- drm/dp_mst: Fix clearing payload state on topology disable (bsc#1051510).
- drm/dp_mst: Reformat drm_dp_check_act_status() a bit (bsc#1051510).
- drm/edid: Fix off-by-one in DispID DTD pixel clock (bsc#1114279)
- drm: encoder_slave: fix refcouting error for modules (bsc#1114279)
- drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of (bsc#1114279)
- drm/i915: properly sanity check batch_start_offset (bsc#1114279) * renamed display/intel_fbc.c -> intel_fb.c * renamed gt/intel_rc6.c -> intel_pm.c * context changes
- drm/meson: Delete an error message in meson_dw_hdmi_bind() (bsc#1051510).
- drm: NULL pointer dereference [null-pointer-deref] (CWE 476) problem (bsc#1114279)
- drm/qxl: qxl_release leak in qxl_draw_dirty_fb() (bsc#1051510).
- drm/qxl: qxl_release leak in qxl_hw_surface_alloc() (bsc#1051510).
- drm/qxl: qxl_release use after free (bsc#1051510).
- drm: Remove PageReserved manipulation from drm_pci_alloc (bsc#1114279) * offset changes
- dump_stack: avoid the livelock of the dump_lock (git fixes (block drivers)).
- e1000e: Disable TSO for buffer overrun workaround (bsc#1051510).
- e1000e: Do not wake up the system via WOL if device wakeup is disabled (bsc#1051510).
- EDAC/amd64: Read back the scrub rate PCI register on F15h (bsc#1114279).
- EDAC, sb_edac: Add support for systems with segmented PCI buses (bsc#1169525).
- evm: Check also if *tfm is an error pointer in init_desc() (bsc#1051510).
- evm: Fix a small race in init_desc() (bsc#1051510).
- ext4: do not zeroout extents beyond i_disksize (bsc#1167851).
- ext4: fix extent_status fragmentation for plain files (bsc#1171949).
- ext4: use non-movable memory for superblock readahead (bsc#1171952).
- extcon: adc-jack: Fix an error handling path in 'adc_jack_probe()' (bsc#1051510).
- fanotify: fix merging marks masks with FAN_ONDIR (bsc#1171679).
- fbcon: fix null-ptr-deref in fbcon_switch (bsc#1114279) * rename drivers/video/fbdev/core to drivers/video/console * context changes
- fbdev: potential information leak in do_fb_ioctl() (bsc#1114279)
- fbmem: Adjust indentation in fb_prepare_logo and fb_blank (bsc#1114279)
- fib: add missing attribute validation for tun_id (networking-stable-20_03_14).
- firmware: qcom: scm: fix compilation error when disabled (bsc#1051510).
- fs/cifs: fix gcc warning in sid_to_id (bsc#1144333).
- fs/seq_file.c: simplify seq_file iteration code and interface (bsc#1170125).
- gpiolib: Document that GPIO line names are not globally unique (bsc#1051510).
- gpio: tegra: mask GPIO IRQs during IRQ shutdown (bsc#1051510).
- gre: fix uninit-value in __iptunnel_pull_header (networking-stable-20_03_14).
- HID: hid-input: clear unmapped usages (git-fixes).
- HID: hyperv: Add a module description line (bsc#1172253).
- HID: i2c-hid: add Trekstor Primebook C11B to descriptor override (git-fixes).
- HID: i2c-hid: override HID descriptors for certain devices (git-fixes).
- HID: multitouch: add eGalaxTouch P80H84 support (bsc#1051510).
- HID: sony: Fix for broken buttons on DS3 USB dongles (bsc#1051510).
- HID: wacom: Read HID_DG_CONTACTMAX directly for non-generic devices (git-fixes).
- hrtimer: Annotate lockless access to timer->state (git fixes (block drivers)).
- hsr: add restart routine into hsr_get_node_list() (networking-stable-20_03_28).
- hsr: check protocol version in hsr_newlink() (networking-stable-20_04_17).
- hsr: fix general protection fault in hsr_addr_is_self() (networking-stable-20_03_28).
- hsr: set .netnsok flag (networking-stable-20_03_28).
- hsr: use rcu_read_lock() in hsr_get_node_{list/status}() (networking-stable-20_03_28).
- i2c: acpi: Force bus speed to 400KHz if a Silead touchscreen is present (git-fixes).
- i2c: acpi: put device when verifying client fails (git-fixes).
- i2c: brcmstb: remove unused struct member (git-fixes).
- i2c: core: Allow empty id_table in ACPI case as well (git-fixes).
- i2c: core: decrease reference count of device node in i2c_unregister_device (git-fixes).
- i2c: dev: Fix the race between the release of i2c_dev and cdev (bsc#1051510).
- i2c: fix missing pm_runtime_put_sync in i2c_device_probe (git-fixes).
- i2c-hid: properly terminate i2c_hid_dmi_desc_override_table array (git-fixes).
- i2c: i801: Do not add ICH_RES_IO_SMI for the iTCO_wdt device (git-fixes).
- i2c: iproc: Stop advertising support of SMBUS quick cmd (git-fixes).
- i2c: isch: Remove unnecessary acpi.h include (git-fixes).
- i2c: mux: demux-pinctrl: Fix an error handling path in 'i2c_demux_pinctrl_probe()' (bsc#1051510).
- i2c: st: fix missing struct parameter description (bsc#1051510).
- IB/ipoib: Add child to parent list only if device initialized (bsc#1168503).
- IB/ipoib: Consolidate checking of the proposed child interface (bsc#1168503).
- IB/ipoib: Do not remove child devices from within the ndo_uninit (bsc#1168503).
- IB/ipoib: Get rid of IPOIB_FLAG_GOING_DOWN (bsc#1168503).
- IB/ipoib: Get rid of the sysfs_mutex (bsc#1168503).
- IB/ipoib: Maintain the child_intfs list from ndo_init/uninit (bsc#1168503).
- IB/ipoib: Move all uninit code into ndo_uninit (bsc#1168503).
- IB/ipoib: Move init code to ndo_init (bsc#1168503).
- IB/ipoib: Replace printk with pr_warn (bsc#1168503).
- IB/ipoib: Use cancel_delayed_work_sync for neigh-clean task (bsc#1168503).
- IB/ipoib: Warn when one port fails to initialize (bsc#1168503).
- ibmveth: Fix max MTU limit (bsc#1173428 ltc#186397).
- ibmvfc: do not send implicit logouts prior to NPIV login (bsc#1169625 ltc#184611).
- ibmvnic: continue to init in CRQ reset returns H_CLOSED (bsc#1173280 ltc#185369).
- ibmvnic: Flush existing work items before device removal (bsc#1065729).
- ibmvnic: Harden device login requests (bsc#1170011 ltc#183538).
- ibmvnic: Skip fatal error reset after passive init (bsc#1171078 ltc#184239).
- iio:ad7797: Use correct attribute_group (bsc#1051510).
- iio: adc: stm32-adc: fix device used to request dma (bsc#1051510).
- iio: adc: stm32-adc: fix sleep in atomic context (git-fixes).
- iio: adc: stm32-adc: Use dma_request_chan() instead dma_request_slave_channel() (bsc#1051510).
- iio: buffer: Do not allow buffers without any channels enabled to be activated (bsc#1051510).
- iio: dac: vf610: Fix an error handling path in 'vf610_dac_probe()' (bsc#1051510).
- iio: pressure: bmp280: Tolerate IRQ before registering (bsc#1051510).
- iio: sca3000: Remove an erroneous 'get_device()' (bsc#1051510).
- iio: xilinx-xadc: Fix ADC-B powerdown (bsc#1051510).
- iio: xilinx-xadc: Fix clearing interrupt when enabling trigger (bsc#1051510).
- iio: xilinx-xadc: Fix sequencer configuration for aux channels in simultaneous mode (bsc#1051510).
- ima: Directly assign the ima_default_policy pointer to ima_rules (bsc#1051510).
- ima: Fix ima digest hash table key calculation (bsc#1051510).
- ima: Fix return value of ima_write_policy() (git-fixes).
- include/asm-generic/topology.h: guard cpumask_of_node() macro argument (bsc#1148868).
- Input: evdev - call input_flush_device() on release(), not flush() (bsc#1051510).
- Input: hyperv-keyboard - add module description (bsc#1172253).
- Input: i8042 - add Acer Aspire 5738z to nomux list (bsc#1051510).
- Input: i8042 - add ThinkPad S230u to i8042 reset list (bsc#1051510).
- Input: raydium_i2c_ts - use true and false for boolean values (bsc#1051510).
- Input: synaptics-rmi4 - fix error return code in rmi_driver_probe() (bsc#1051510).
- Input: synaptics-rmi4 - really fix attn_data use-after-free (git-fixes).
- Input: usbtouchscreen - add support for BonXeon TP (bsc#1051510).
- Input: xpad - add custom init packet for Xbox One S controllers (bsc#1051510).
- iommu/amd: Call domain_flush_complete() in update_domain() (bsc#1172096).
- iommu/amd: Do not flush Device Table in iommu_map_page() (bsc#1172097).
- iommu/amd: Do not loop forever when trying to increase address space (bsc#1172098).
- iommu/amd: Fix legacy interrupt remapping for x2APIC-enabled system (bsc#1172099).
- iommu/amd: Fix over-read of ACPI UID from IVRS table (bsc#1172101).
- iommu/amd: Fix race in increase_address_space()/fetch_pte() (bsc#1172102).
- iommu/amd: Update Device Table in increase_address_space() (bsc#1172103).
- iommu: Fix reference count leak in iommu_group_alloc (bsc#1172397).
- ipmi: fix hung processes in __get_guid() (git-fixes).
- ipv4: fix a RCU-list lock in fib_triestat_seq_show (networking-stable-20_04_02).
- ipv6/addrconf: call ipv6_mc_up() for non-Ethernet interface (networking-stable-20_03_14).
- ipv6: do not auto-add link-local address to lag ports (networking-stable-20_04_09).
- ipv6: Fix nlmsg_flags when splitting a multipath route (networking-stable-20_03_01).
- ipv6: Fix route replacement with dev-only route (networking-stable-20_03_01).
- ipvlan: add cond_resched_rcu() while processing muticast backlog (networking-stable-20_03_14).
- ipvlan: do not deref eth hdr before checking it's set (networking-stable-20_03_14).
- ipvlan: do not use cond_resched_rcu() in ipvlan_process_multicast() (networking-stable-20_03_14).
- iwlwifi: pcie: actually release queue memory in TVQM (bsc#1051510).
- kABI fix for early XHCI debug (git-fixes).
- kabi for for md: improve handling of bio with REQ_PREFLUSH in md_flush_request() (git-fixes).
- kabi, protect struct ib_device (bsc#1168503).
- kabi/severities: Do not track KVM internal symbols.
- kabi/severities: Ingnore get_dev_data() The function is internal to the AMD IOMMU driver and must not be called by any third party.
- kabi workaround for snd_rawmidi buffer_ref field addition (git-fixes).
- KEYS: reaching the keys quotas correctly (bsc#1051510).
- KVM: arm64: Change hyp_panic()s dependency on tpidr_el2 (bsc#1133021).
- KVM: arm64: Stop save/restoring host tpidr_el1 on VHE (bsc#1133021).
- KVM: Check validity of resolved slot when searching memslots (bsc#1172104).
- KVM: nVMX: Do not reread VMCS-agnostic state when switching VMCS (bsc#1114279).
- KVM: nVMX: Skip IBPB when switching between vmcs01 and vmcs02 (bsc#1114279).
- KVM: s390: vsie: Fix delivery of addressing exceptions (git-fixes).
- KVM: s390: vsie: Fix possible race when shadowing region 3 tables (git-fixes).
- KVM: s390: vsie: Fix region 1 ASCE sanity shadow address checks (git-fixes).
- KVM: SVM: Fix potential memory leak in svm_cpu_init() (bsc#1171736).
- KVM x86: Extend AMD specific guest behavior to Hygon virtual CPUs (bsc#1152489).
- kvm: x86: Fix L1TF mitigation for shadow MMU (bsc#1171904).
- KVM: x86/mmu: Set mmio_value to '0' if reserved #PF can't be generated (bsc#1171904).
- KVM: x86: only do L1TF workaround on affected processors (bsc#1171904).
- l2tp: Allow management of tunnels and session in user namespace (networking-stable-20_04_17).
- libata: Remove extra scsi_host_put() in ata_scsi_add_hosts() (bsc#1051510).
- libata: Return correct status in sata_pmp_eh_recover_pm() when ATA_DFLAG_DETACH is set (bsc#1051510).
- libceph: do not omit recovery_deletes in target_copy() (bsc#1173462).
- lib: raid6: fix awk build warnings (git fixes (block drivers)).
- lib/raid6/test: fix build on distros whose /bin/sh is not bash (git fixes (block drivers)).
- lib/stackdepot.c: fix global out-of-bounds in stack_slabs (git fixes (block drivers)).
- livepatch: Apply vmlinux-specific KLP relocations early (bsc#1071995).
- livepatch: Disallow vmlinux.ko (bsc#1071995).
- livepatch: Make klp_apply_object_relocs static (bsc#1071995).
- livepatch: Prevent module-specific KLP rela sections from referencing vmlinux symbols (bsc#1071995).
- livepatch: Remove .klp.arch (bsc#1071995).
- locks: print unsigned ino in /proc/locks (bsc#1171951).
- mac80211: add ieee80211_is_any_nullfunc() (bsc#1051510).
- mac80211_hwsim: Use kstrndup() in place of kasprintf() (bsc#1051510).
- mac80211: mesh: fix discovery timer re-arming issue / crash (bsc#1051510).
- macsec: avoid to set wrong mtu (bsc#1051510).
- macsec: restrict to ethernet devices (networking-stable-20_03_28).
- macvlan: add cond_resched() during multicast processing (networking-stable-20_03_14).
- macvlan: fix null dereference in macvlan_device_event() (bsc#1051510).
- md: Avoid namespace collision with bitmap API (git fixes (block drivers)).
- md: improve handling of bio with REQ_PREFLUSH in md_flush_request() (git-fixes).
- md/raid0: Fix an error message in raid0_make_request() (git fixes (block drivers)).
- md/raid10: prevent access of uninitialized resync_pages offset (git-fixes).
- md: use memalloc scope APIs in mddev_suspend()/mddev_resume() (git fixes (block drivers)).
- media: dvb: return -EREMOTEIO on i2c transfer failure (bsc#1051510).
- media: platform: fcp: Set appropriate DMA parameters (bsc#1051510).
- media: ti-vpe: cal: fix disable_irqs to only the intended target (git-fixes).
- mei: release me_cl object reference (bsc#1051510).
- mlxsw: Fix some IS_ERR() vs NULL bugs (networking-stable-20_04_27).
- mlxsw: spectrum_flower: Do not stop at FLOW_ACTION_VLAN_MANGLE (networking-stable-20_04_09).
- mmc: atmel-mci: Fix debugfs on 64-bit platforms (git-fixes).
- mmc: dw_mmc: Fix debugfs on 64-bit platforms (git-fixes).
- mmc: fix compilation of user API (bsc#1051510).
- mmc: meson-gx: make sure the descriptor is stopped on errors (git-fixes).
- mmc: meson-gx: simplify interrupt handler (git-fixes).
- mmc: renesas_sdhi: limit block count to 16 bit for old revisions (git-fixes).
- mmc: sdhci-esdhc-imx: fix the mask for tuning start point (bsc#1051510).
- mmc: sdhci-msm: Clear tuning done flag while hs400 tuning (bsc#1051510).
- mmc: sdhci-of-at91: fix memleak on clk_get failure (git-fixes).
- mmc: sdhci-pci: Fix eMMC driver strength for BYT-based controllers (bsc#1051510).
- mmc: sdhci-xenon: fix annoying 1.8V regulator warning (bsc#1051510).
- mmc: sdio: Fix potential NULL pointer error in mmc_sdio_init_card() (bsc#1051510).
- mmc: tmio: fix access width of Block Count Register (git-fixes).
- mm: thp: handle page cache THP correctly in PageTransCompoundMap (git fixes (block drivers)).
- mtd: cfi: fix deadloop in cfi_cmdset_0002.c do_write_buffer (bsc#1051510).
- mtd: spi-nor: cadence-quadspi: add a delay in write sequence (git-fixes).
- mtd: spi-nor: enable 4B opcodes for mx66l51235l (git-fixes).
- mtd: spi-nor: fsl-quadspi: Do not let -EINVAL on the bus (git-fixes).
- mwifiex: avoid -Wstringop-overflow warning (bsc#1051510).
- mwifiex: Fix memory corruption in dump_station (bsc#1051510).
- net: bcmgenet: correct per TX/RX ring statistics (networking-stable-20_04_27).
- net: dsa: b53: Fix ARL register definitions (networking-stable-20_04_27).
- net: dsa: b53: Rework ARL bin logic (networking-stable-20_04_27).
- net: dsa: bcm_sf2: Do not register slave MDIO bus with OF (networking-stable-20_04_09).
- net: dsa: bcm_sf2: Ensure correct sub-node is parsed (networking-stable-20_04_09).
- net: dsa: bcm_sf2: Fix overflow checks (git-fixes).
- net: dsa: Fix duplicate frames flooded by learning (networking-stable-20_03_28).
- net: dsa: mv88e6xxx: fix lockup on warm boot (networking-stable-20_03_14).
- net: fec: validate the new settings in fec_enet_set_coalesce() (networking-stable-20_03_14).
- net: fib_rules: Correctly set table field when table number exceeds 8 bits (networking-stable-20_03_01).
- netfilter: connlabels: prefer static lock initialiser (git-fixes).
- netfilter: conntrack: sctp: use distinct states for new SCTP connections (bsc#1159199).
- netfilter: ctnetlink: netns exit must wait for callbacks (bsc#1169795).
- netfilter: not mark a spinlock as __read_mostly (git-fixes).
- net: fix race condition in __inet_lookup_established() (bsc#1151794).
- net: fq: add missing attribute validation for orphan mask (networking-stable-20_03_14).
- net, ip_tunnel: fix interface lookup with no key (networking-stable-20_04_02).
- net: ipv4: devinet: Fix crash when add/del multicast IP with autojoin (networking-stable-20_04_17).
- net: ipv6: do not consider routes via gateways for anycast address check (networking-stable-20_04_17).
- netlink: Use netlink header as base to calculate bad attribute offset (networking-stable-20_03_14).
- net: macsec: update SCI upon MAC address change (networking-stable-20_03_14).
- net: memcg: fix lockdep splat in inet_csk_accept() (networking-stable-20_03_14).
- net: memcg: late association of sock to memcg (networking-stable-20_03_14).
- net/mlx4_en: avoid indirect call in TX completion (networking-stable-20_04_27).
- net/mlx5: Add new fields to Port Type and Speed register (bsc#1171118).
- net/mlx5: Add RoCE RX ICRC encapsulated counter (bsc#1171118).
- net/mlx5e: Fix ethtool self test: link speed (bsc#1171118).
- net/mlx5e: Move port speed code from en_ethtool.c to en/port.c (bsc#1171118).
- net/mlx5: Expose link speed directly (bsc#1171118).
- net/mlx5: Expose port speed when possible (bsc#1171118).
- net: mvneta: Fix the case where the last poll did not process all rx (networking-stable-20_03_28).
- net: netrom: Fix potential nr_neigh refcnt leak in nr_add_node (networking-stable-20_04_27).
- net/packet: tpacket_rcv: do not increment ring index on drop (networking-stable-20_03_14).
- net: phy: restore mdio regs in the iproc mdio driver (networking-stable-20_03_01).
- net: qmi_wwan: add support for ASKEY WWHC050 (networking-stable-20_03_28).
- net: revert default NAPI poll timeout to 2 jiffies (networking-stable-20_04_17).
- net_sched: cls_route: remove the right filter from hashtable (networking-stable-20_03_28).
- net/smc: add fallback check to connect() (git-fixes).
- net/smc: fix refcount non-blocking connect() -part 2 (git-fixes).
- net: vmxnet3: fix possible buffer overflow caused by bad DMA value in vmxnet3_get_rss() (bsc#1172484).
- net/x25: Fix x25_neigh refcnt leak when receiving frame (networking-stable-20_04_27).
- nfc: add missing attribute validation for SE API (networking-stable-20_03_14).
- nfc: add missing attribute validation for vendor subcommand (networking-stable-20_03_14).
- nfc: pn544: Fix occasional HW initialization failure (networking-stable-20_03_01).
- nfc: st21nfca: add missed kfree_skb() in an error path (bsc#1051510).
- nfsd4: fix up replay_matches_cache() (git-fixes).
- nfsd: Ensure CLONE persists data and metadata changes to the target file (git-fixes).
- nfsd: fix delay timer on 32-bit architectures (git-fixes).
- nfsd: fix jiffies/time_t mixup in LRU list (git-fixes).
- NFS: Directory page cache pages need to be locked when read (git-fixes).
- nfsd: memory corruption in nfsd4_lock() (git-fixes).
- NFS: Do not call generic_error_remove_page() while holding locks (bsc#1170457).
- NFS: Fix an RCU lock leak in nfs4_refresh_delegation_stateid() (bsc#1170592).
- NFS: Fix memory leaks and corruption in readdir (git-fixes).
- NFS: Fix O_DIRECT accounting of number of bytes read/written (git-fixes).
- NFS: Fix potential posix_acl refcnt leak in nfs3_set_acl (git-fixes).
- NFS: fix racey wait in nfs_set_open_stateid_locked (bsc#1170592).
- NFS/flexfiles: Use the correct TCP timeout for flexfiles I/O (git-fixes).
- NFS/pnfs: Fix pnfs_generic_prepare_to_resend_writes() (git-fixes).
- NFS: Revalidate the file size on a fatal write error (git-fixes).
- NFSv4.0: nfs4_do_fsinfo() should not do implicit lease renewals (git-fixes).
- NFSv4: Do not allow a cached open with a revoked delegation (git-fixes).
- NFSv4: Fix leak of clp->cl_acceptor string (git-fixes).
- NFSv4/pnfs: Return valid stateids in nfs_layout_find_inode_by_stateid() (git-fixes).
- NFSv4: Retry CLOSE and DELEGRETURN on NFS4ERR_OLD_STATEID (bsc#1170592).
- NFSv4: try lease recovery on NFS4ERR_EXPIRED (git-fixes).
- NFSv4.x: Drop the slot if nfs4_delegreturn_prepare waits for layoutreturn (git-fixes).
- nl802154: add missing attribute validation for dev_type (networking-stable-20_03_14).
- nl802154: add missing attribute validation (networking-stable-20_03_14).
- nvme: check for NVME_CTRL_LIVE in nvme_report_ns_ids() (bcs#1171558 bsc#1159058).
- nvme: do not update multipath disk information if the controller is down (bcs#1171558 bsc#1159058).
- nvme-fc: print proper nvme-fc devloss_tmo value (bsc#1172391).
- objtool: Add is_static_jump() helper (bsc#1169514).
- objtool: Add relocation check for alternative sections (bsc#1169514).
- objtool: Clean instruction state before each function validation (bsc#1169514).
- objtool: Fix stack offset tracking for indirect CFAs (bsc#1169514).
- objtool: Fix switch table detection in .text.unlikely (bsc#1169514).
- objtool: Ignore empty alternatives (bsc#1169514).
- objtool: Make BP scratch register warning more robust (bsc#1169514).
- OMAP: DSS2: remove non-zero check on variable r (bsc#1114279)
- overflow: Fix -Wtype-limits compilation warnings (git fixes).
- overflow.h: Add arithmetic shift helper (git fixes).
- p54usb: add AirVasT USB stick device-id (bsc#1051510).
- padata: Remove broken queue flushing (git-fixes).
- Partially revert 'kfifo: fix kfifo_alloc() and kfifo_init()' (git fixes (block drivers)).
- PCI: Allow pci_resize_resource() for devices on root bus (bsc#1051510).
- PCI: Fix pci_register_host_bridge() device_register() error handling (bsc#1051510).
- PCI: Program MPS for RCiEP devices (bsc#1051510).
- PCI/PTM: Inherit Switch Downstream Port PTM settings from Upstream Port (bsc#1051510).
- perf: Allocate context task_ctx_data for child event (git-fixes).
- perf/cgroup: Fix perf cgroup hierarchy support (git-fixes).
- perf: Copy parent's address filter offsets on clone (git-fixes).
- perf/core: Add sanity check to deal with pinned event failure (git-fixes).
- perf/core: Avoid freeing static PMU contexts when PMU is unregistered (git-fixes).
- perf/core: Correct event creation with PERF_FORMAT_GROUP (git-fixes).
- perf/core: Do not WARN() for impossible ring-buffer sizes (git-fixes).
- perf/core: Fix crash when using HW tracing kernel filters (git-fixes).
- perf/core: Fix ctx_event_type in ctx_resched() (git-fixes).
- perf/core: Fix error handling in perf_event_alloc() (git-fixes).
- perf/core: Fix exclusive events' grouping (git-fixes).
- perf/core: Fix group scheduling with mixed hw and sw events (git-fixes).
- perf/core: Fix impossible ring-buffer sizes warning (git-fixes).
- perf/core: Fix locking for children siblings group read (git-fixes).
- perf/core: Fix perf_event_read_value() locking (git-fixes).
- perf/core: Fix perf_pmu_unregister() locking (git-fixes).
- perf/core: Fix perf_sample_regs_user() mm check (git-fixes).
- perf/core: Fix possible Spectre-v1 indexing for ->aux_pages (git-fixes).
- perf/core: Fix race between close() and fork() (git-fixes).
- perf/core: Fix the address filtering fix (git-fixes).
- perf/core: Fix use-after-free in uprobe_perf_close() (git-fixes).
- perf/core: Force USER_DS when recording user stack data (git-fixes).
- perf/core: Restore mmap record type correctly (git-fixes).
- perf: Fix header.size for namespace events (git-fixes).
- perf/ioctl: Add check for the sample_period value (git-fixes).
- perf, pt, coresight: Fix address filters for vmas with non-zero offset (git-fixes).
- perf: Return proper values for user stack errors (git-fixes).
- perf/x86/amd: Constrain Large Increment per Cycle events (git-fixes).
- perf/x86/amd/ibs: Fix reading of the IBS OpData register and thus precise RIP validity (git-fixes).
- perf/x86/amd/ibs: Fix sample bias for dispatched micro-ops (git-fixes).
- perf/x86/amd/ibs: Handle erratum #420 only on the affected CPU family (10h) (git-fixes).
- perf/x86/amd/iommu: Make the 'amd_iommu_attr_groups' symbol static (git-fixes).
- perf/x86/amd/uncore: Do not set 'ThreadMask' and 'SliceMask' for non-L3 PMCs (git-fixes stable).
- perf/x86/amd/uncore: Set the thread mask for F17h L3 PMCs (git-fixes).
- perf/x86/amd/uncore: Set ThreadMask and SliceMask for L3 Cache perf events (git-fixes stable).
- perf/x86: Enable free running PEBS for REGS_USER/INTR (git-fixes).
- perf/x86: Fix incorrect PEBS_REGS (git-fixes).
- perf/x86/intel: Add generic branch tracing check to intel_pmu_has_bts() (git-fixes).
- perf/x86/intel: Add proper condition to run sched_task callbacks (git-fixes).
- perf/x86/intel/bts: Fix the use of page_private() (git-fixes).
- perf/x86/intel: Fix PT PMI handling (git-fixes).
- perf/x86/intel: Move branch tracing setup to the Intel-specific source file (git-fixes).
- perf/x86/intel/uncore: Add Node ID mask (git-fixes).
- perf/x86/intel/uncore: Fix PCI BDF address of M3UPI on SKX (git-fixes).
- perf/x86/uncore: Fix event group support (git-fixes).
- pid: Improve the comment about waiting in zap_pid_ns_processes (git fixes)).
- pinctrl: baytrail: Enable pin configuration setting for GPIO chip (git-fixes).
- pinctrl: cherryview: Add missing spinlock usage in chv_gpio_irq_handler (git-fixes).
- pinctrl: freescale: imx: Fix an error handling path in 'imx_pinctrl_probe()' (bsc#1051510).
- pinctrl: imxl: Fix an error handling path in 'imx1_pinctrl_core_probe()' (bsc#1051510).
- pinctrl: samsung: Save/restore eint_mask over suspend for EINT_TYPE GPIOs (bsc#1051510).
- platform/x86: asus-nb-wmi: Do not load on Asus T100TA and T200TA (bsc#1051510).
- pNFS: Ensure we do clear the return-on-close layout stateid on fatal errors (git-fixes).
- pnp: Use list_for_each_entry() instead of open coding (git fixes).
- powerpc/64s: Do not let DT CPU features set FSCR_DSCR (bsc#1065729).
- powerpc/64s: Save FSCR to init_task.thread.fscr after feature init (bsc#1065729).
- powerpc: Add attributes for setjmp/longjmp (bsc#1065729).
- powerpc/pci/of: Parse unassigned resources (bsc#1065729).
- powerpc/setup_64: Set cache-line-size based on cache-block-size (bsc#1065729).
- powerpc/sstep: Fix DS operand in ld encoding to appropriate value (bsc#1065729).
- powerpc/xive: Clear the page tables for the ESB IO mapping (bsc#1085030).
- power: supply: bq24257_charger: Replace depends on REGMAP_I2C with select (bsc#1051510).
- power: supply: lp8788: Fix an error handling path in 'lp8788_charger_probe()' (bsc#1051510).
- power: supply: smb347-charger: IRQSTAT_D is volatile (bsc#1051510).
- qede: Fix race between rdma destroy workqueue and link change event (networking-stable-20_03_01).
- r8152: check disconnect status after long sleep (networking-stable-20_03_14).
- raid5: remove gfp flags from scribble_alloc() (git fixes (block drivers)).
- raid6/ppc: Fix build for clang (git fixes (block drivers)).
- rcu: locking and unlocking need to always be at least barriers (git fixes (block drivers)).
- RDMA/ipoib: Fix use of sizeof() (bsc#1168503).
- RDMA/netdev: Fix netlink support in IPoIB (bsc#1168503).
- RDMA/netdev: Hoist alloc_netdev_mqs out of the driver (bsc#1168503).
- RDMA/netdev: Use priv_destructor for netdev cleanup (bsc#1168503).
- README.BRANCH: Replace Matt Fleming with Davidlohr Bueso as maintainer.
- Revert 'dm crypt: use WQ_HIGHPRI for the IO and crypt workqueues' (git fixes (block drivers)).
- Revert 'drm/panel: simple: Add support for Sharp LQ150X1LG11 panels' (bsc#1114279) * offset changes
- Revert 'ipc,sem: remove uneeded sem_undo_list lock usage in exit_sem()' (bsc#1172221).
- Revert 'tools lib traceevent: Remove unneeded qsort and uses memmove'
- rpm/kernel-docs.spec.in: Require python-packaging for build.
- rtlwifi: Fix a double free in _rtl_usb_tx_urb_setup() (bsc#1051510).
- s390/bpf: Maintain 8-byte stack alignment (bsc#1169194).
- s390/cio: avoid duplicated 'ADD' uevents (git-fixes).
- s390/cio: generate delayed uevent for vfio-ccw subchannels (git-fixes).
- s390/cpuinfo: fix wrong output when CPU0 is offline (git-fixes).
- s390/diag: fix display of diagnose call statistics (git-fixes).
- s390: fix syscall_get_error for compat processes (git-fixes).
- s390/ftrace: fix potential crashes when switching tracers (git-fixes).
- s390/gmap: return proper error code on ksm unsharing (git-fixes).
- s390/ism: fix error return code in ism_probe() (git-fixes).
- s390/pci: Fix possible deadlock in recover_store() (bsc#1165183 LTC#184103).
- s390/pci: Recover handle in clp_set_pci_fn() (bsc#1165183 LTC#184103).
- s390/qdio: consistently restore the IRQ handler (git-fixes).
- s390/qdio: lock device while installing IRQ handler (git-fixes).
- s390/qdio: put thinint indicator after early error (git-fixes).
- s390/qdio: tear down thinint indicator after early error (git-fixes).
- s390/qeth: cancel RX reclaim work earlier (git-fixes).
- s390/qeth: do not return -ENOTSUPP to userspace (git-fixes).
- s390/qeth: do not warn for napi with 0 budget (git-fixes).
- s390/qeth: fix error handling for isolation mode cmds (git-fixes).
- s390/qeth: fix off-by-one in RX copybreak check (git-fixes).
- s390/qeth: fix promiscuous mode after reset (git-fixes).
- s390/qeth: fix qdio teardown after early init error (git-fixes).
- s390/qeth: handle error due to unsupported transport mode (git-fixes).
- s390/qeth: handle error when backing RX buffer (git-fixes).
- s390/qeth: lock the card while changing its hsuid (git-fixes).
- s390/qeth: support net namespaces for L3 devices (git-fixes).
- s390/time: Fix clk type in get_tod_clock (git-fixes).
- scripts/decodecode: fix trapping instruction formatting (bsc#1065729).
- scripts/dtc: Remove redundant YYLOC global declaration (bsc#1160388).
- scsi: bnx2i: fix potential use after free (bsc#1171600).
- scsi: core: Handle drivers which set sg_tablesize to zero (bsc#1171601) This commit also required: > scsi: core: avoid preallocating big SGL for data
- scsi: core: save/restore command resid for error handling (bsc#1171602).
- scsi: core: scsi_trace: Use get_unaligned_be*() (bsc#1171604).
- scsi: core: try to get module before removing device (bsc#1171605).
- scsi: csiostor: Adjust indentation in csio_device_reset (bsc#1171606).
- scsi: csiostor: Do not enable IRQs too early (bsc#1171607).
- scsi: esas2r: unlock on error in esas2r_nvram_read_direct() (bsc#1171608).
- scsi: fnic: fix invalid stack access (bsc#1171609).
- scsi: fnic: fix msix interrupt allocation (bsc#1171610).
- scsi: ibmvscsi: Do not send host info in adapter info MAD after LPM (bsc#1172759 ltc#184814).
- scsi: ibmvscsi: Fix WARN_ON during event pool release (bsc#1170791 ltc#185128).
- scsi: iscsi: Avoid potential deadlock in iscsi_if_rx func (bsc#1171611).
- scsi: iscsi: Fix a potential deadlock in the timeout handler (bsc#1171612).
- scsi: iscsi: qla4xxx: fix double free in probe (bsc#1171613).
- scsi: lpfc: fix: Coverity: lpfc_cmpl_els_rsp(): Null pointer dereferences (bsc#1171614).
- scsi: lpfc: Fix crash in target side cable pulls hitting WAIT_FOR_UNREG (bsc#1171615).
- scsi: megaraid_sas: Do not initiate OCR if controller is not in ready state (bsc#1171616).
- scsi: qedf: Add port_id getter (bsc#1150660).
- scsi: qla2xxx: add ring buffer for tracing debug logs (bsc#1157169).
- scsi: qla2xxx: check UNLOADING before posting async work (bsc#1157169).
- scsi: qla2xxx: Delete all sessions before unregister local nvme port (bsc#1157169).
- scsi: qla2xxx: Do not log message when reading port speed via sysfs (bsc#1157169).
- scsi: qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV (bsc#1157169).
- scsi: qla2xxx: Fix regression warnings (bsc#1157169).
- scsi: qla2xxx: Remove non functional code (bsc#1157169).
- scsi: qla2xxx: Set NVMe status code for failed NVMe FCP request (bsc#1158983).
- scsi: qla2xxx: set UNLOADING before waiting for session deletion (bsc#1157169).
- scsi: qla4xxx: Adjust indentation in qla4xxx_mem_free (bsc#1171617).
- scsi: qla4xxx: fix double free bug (bsc#1171618).
- scsi: sd: Clear sdkp->protection_type if disk is reformatted without PI (bsc#1171619).
- scsi: sg: add sg_remove_request in sg_common_write (bsc#1171620).
- scsi: tracing: Fix handling of TRANSFER LENGTH == 0 for READ(6) and WRITE(6) (bsc#1171621).
- scsi: ufs: change msleep to usleep_range (bsc#1171622).
- scsi: ufs: Clean up ufshcd_scale_clks() and clock scaling error out path (bsc#1171623).
- scsi: ufs: Fix ufshcd_hold() caused scheduling while atomic (bsc#1171624).
- scsi: ufs: Fix ufshcd_probe_hba() reture value in case ufshcd_scsi_add_wlus() fails (bsc#1171625).
- scsi: ufs: Recheck bkops level if bkops is disabled (bsc#1171626).
- scsi: zfcp: fix missing erp_lock in port recovery trigger for point-to-point (git-fixes).
- sctp: fix possibly using a bad saddr with a given dst (networking-stable-20_04_02).
- sctp: fix refcount bug in sctp_wfree (networking-stable-20_04_02).
- sctp: move the format error check out of __sctp_sf_do_9_1_abort (networking-stable-20_03_01).
- seq_file: fix problem when seeking mid-record (bsc#1170125).
- serial: uartps: Move the spinlock after the read of the tx empty (git-fixes).
- sfc: detach from cb_page in efx_copy_channel() (networking-stable-20_03_14).
- signal/pid_namespace: Fix reboot_pid_ns to use send_sig not force_sig (bsc#1172185).
- slcan: not call free_netdev before rtnl_unlock in slcan_open (networking-stable-20_03_28).
- slip: make slhc_compress() more robust against malicious packets (networking-stable-20_03_14).
- smb3: Additional compression structures (bsc#1144333).
- smb3: Add new compression flags (bsc#1144333).
- smb3: change noisy error message to FYI (bsc#1144333).
- smb3: enable swap on SMB3 mounts (bsc#1144333).
- smb3: Minor cleanup of protocol definitions (bsc#1144333).
- smb3: remove overly noisy debug line in signing errors (bsc#1144333).
- smb3: smbdirect support can be configured by default (bsc#1144333).
- smb3: use SMB2_SIGNATURE_SIZE define (bsc#1144333).
- spi: bcm2835: Fix 3-wire mode if DMA is enabled (git-fixes).
- spi: bcm63xx-hsspi: Really keep pll clk enabled (bsc#1051510).
- spi: bcm-qspi: when tx/rx buffer is NULL set to 0 (bsc#1051510).
- spi: dw: Add SPI Rx-done wait method to DMA-based transfer (bsc#1051510).
- spi: dw: Add SPI Tx-done wait method to DMA-based transfer (bsc#1051510).
- spi: dw: use 'smp_mb()' to avoid sending spi data error (bsc#1051510).
- spi: dw: Zero DMA Tx and Rx configurations on stack (bsc#1051510).
- spi: fsl: do not map irq during probe (git-fixes).
- spi: fsl: use platform_get_irq() instead of of_irq_to_resource() (git-fixes).
- spi: pxa2xx: Add CS control clock quirk (bsc#1051510).
- spi: qup: call spi_qup_pm_resume_runtime before suspending (bsc#1051510).
- spi: spi-fsl-dspi: Replace interruptible wait queue with a simple completion (git-fixes).
- spi: spi-s3c64xx: Fix system resume support (git-fixes).
- spi/zynqmp: remove entry that causes a cs glitch (bsc#1051510).
- staging: comedi: dt2815: fix writing hi byte of analog output (bsc#1051510).
- staging: comedi: Fix comedi_device refcnt leak in comedi_open (bsc#1051510).
- staging: iio: ad2s1210: Fix SPI reading (bsc#1051510).
- staging: rtl8712: Fix IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK (bsc#1051510).
- staging: sm750fb: add missing case while setting FB_VISUAL (bsc#1051510).
- staging: vt6656: Do not set RCR_MULTICAST or RCR_BROADCAST by default (git-fixes).
- staging: vt6656: Fix drivers TBTT timing counter (git-fixes).
- staging: vt6656: Fix pairwise key entry save (git-fixes).
- sunrpc: expiry_time should be seconds not timeval (git-fixes).
- SUNRPC: Fix a potential buffer overflow in 'svc_print_xprts()' (git-fixes).
- SUNRPC: The TCP back channel mustn't disappear while requests are outstanding (bsc#1152624).
- supported.conf: Add br_netfilter to base (bsc#1169020).
- svcrdma: Fix leak of transport addresses (git-fixes).
- taskstats: fix data-race (bsc#1172188).
- tcp: cache line align MAX_TCP_HEADER (networking-stable-20_04_27).
- tcp: repair: fix TCP_QUEUE_SEQ implementation (networking-stable-20_03_28).
- team: add missing attribute validation for array index (networking-stable-20_03_14).
- team: add missing attribute validation for port ifindex (networking-stable-20_03_14).
- team: fix hang in team_mode_get() (networking-stable-20_04_27).
- tools lib traceevent: Remove unneeded qsort and uses memmove instead (git-fixes).
- tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send() (bsc#1065729).
- tpm/tpm_tis: Free IRQ if probing fails (bsc#1082555).
- tpm/tpm_tis: Free IRQ if probing fails (git-fixes).
- tracing: Add a vmalloc_sync_mappings() for safe measure (git-fixes).
- tracing: Disable trace_printk() on post poned tests (git-fixes).
- tracing: Fix event trigger to accept redundant spaces (git-fixes).
- tracing: Fix the race between registering 'snapshot' event trigger and triggering 'snapshot' operation (git-fixes).
- tty: n_gsm: Fix bogus i++ in gsm_data_kick (bsc#1051510).
- tty: n_gsm: Fix SOF skipping (bsc#1051510).
- tty: n_gsm: Fix waking up upper tty layer when room available (bsc#1051510).
- tty: rocket, avoid OOB access (git-fixes).
- UAS: fix deadlock in error handling and PM flushing work (git-fixes).
- UAS: no use logging any details in case of ENODEV (git-fixes).
- USB: Add USB_QUIRK_DELAY_CTRL_MSG and USB_QUIRK_DELAY_INIT for Corsair K70 RGB RAPIDFIRE (git-fixes).
- USB: cdc-acm: restore capability check order (git-fixes).
- USB: core: Fix misleading driver bug report (bsc#1051510).
- USB: dwc2: gadget: move gadget resume after the core is in L0 state (bsc#1051510).
- USB: dwc3: do not set gadget->is_otg flag (git-fixes).
- USB: dwc3: gadget: Do link recovery for SS and SSP (git-fixes).
- USB: early: Handle AMD's spec-compliant identifiers, too (git-fixes).
- USB: f_fs: Clear OS Extended descriptor counts to zero in ffs_data_reset() (git-fixes).
- USB: gadget: audio: Fix a missing error return value in audio_bind() (git-fixes).
- USB: gadget: composite: Inform controller driver of self-powered (git-fixes).
- USB: gadget: legacy: fix error return code in cdc_bind() (git-fixes).
- USB: gadget: legacy: fix error return code in gncm_bind() (git-fixes).
- USB: gadget: legacy: fix redundant initialization warnings (bsc#1051510).
- USB: gadget: lpc32xx_udc: do not dereference ep pointer before null check (bsc#1051510).
- USB: gadget: net2272: Fix a memory leak in an error handling path in 'net2272_plat_probe()' (git-fixes).
- USB: gadget: udc: atmel: Fix vbus disconnect handling (git-fixes).
- USB: gadget: udc: atmel: Make some symbols static (git-fixes).
- USB: gadget: udc: bdc: Remove unnecessary NULL checks in bdc_req_complete (git-fixes).
- USB: gadget: udc: s3c2410_udc: Remove pointless NULL check in s3c2410_udc_nuke (bsc#1051510).
- USB: host: ehci-mxc: Add error handling in ehci_mxc_drv_probe() (bsc#1051510).
- USB: host: xhci-plat: keep runtime active when removing host (git-fixes).
- USB: hub: Fix handling of connect changes during sleep (git-fixes).
- USB: musb: Fix runtime PM imbalance on error (bsc#1051510).
- USB: musb: start session in resume for host port (bsc#1051510).
- usbnet: silence an unnecessary warning (bsc#1170770).
- USB: serial: garmin_gps: add sanity checking for data length (git-fixes).
- USB: serial: option: add BroadMobi BM806U (git-fixes).
- USB: serial: option: add support for ASKEY WWHC050 (git-fixes).
- USB: serial: option: add Telit LE910C1-EUX compositions (bsc#1051510).
- USB: serial: option: add Wistron Neweb D19Q1 (git-fixes).
- USB: serial: qcserial: add DW5816e QDL support (bsc#1051510).
- USB: serial: qcserial: Add DW5816e support (git-fixes).
- USB: serial: usb_wwan: do not resubmit rx urb on fatal errors (bsc#1051510).
- USB: serial: usb_wwan: do not resubmit rx urb on fatal errors (git-fixes).
- USB: sisusbvga: Change port variable from signed to unsigned (git-fixes).
- USB-storage: Add unusual_devs entry for JMicron JMS566 (git-fixes).
- USB: uas: add quirk for LaCie 2Big Quadra (git-fixes).
- USB: xhci: Fix NULL pointer dereference when enqueuing trbs from urb sg list (git-fixes).
- video: fbdev: sis: Remove unnecessary parentheses and commented code (bsc#1114279)
- video: fbdev: w100fb: Fix a potential double free (bsc#1051510).
- virtio-blk: handle block_device_operations callbacks after hot unplug (git fixes (block drivers)).
- vmxnet3: add geneve and vxlan tunnel offload support (bsc#1172484).
- vmxnet3: add support to get/set rx flow hash (bsc#1172484).
- vmxnet3: allow rx flow hash ops only when rss is enabled (bsc#1172484).
- vmxnet3: avoid format strint overflow warning (bsc#1172484).
- vmxnet3: prepare for version 4 changes (bsc#1172484).
- vmxnet3: Remove always false conditional statement (bsc#1172484).
- vmxnet3: remove redundant initialization of pointer 'rq' (bsc#1172484).
- vmxnet3: remove unused flag 'rxcsum' from struct vmxnet3_adapter (bsc#1172484).
- vmxnet3: Replace msleep(1) with usleep_range() (bsc#1172484).
- vmxnet3: update to version 4 (bsc#1172484).
- vmxnet3: use correct hdr reference when packet is encapsulated (bsc#1172484).
- vrf: Check skb for XFRM_TRANSFORMED flag (networking-stable-20_04_27).
- vt: ioctl, switch VT_IS_IN_USE and VT_BUSY to inlines (git-fixes).
- vt: selection, introduce vc_is_sel (git-fixes).
- vt: vt_ioctl: fix race in VT_RESIZEX (git-fixes).
- vt: vt_ioctl: fix use-after-free in vt_in_use() (git-fixes).
- vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console (git-fixes).
- vxlan: check return value of gro_cells_init() (networking-stable-20_03_28).
- w1: omap-hdq: cleanup to add missing newline for some dev_dbg (bsc#1051510).
- watchdog: reset last_hw_keepalive time at start (git-fixes).
- wcn36xx: Fix error handling path in 'wcn36xx_probe()' (bsc#1051510).
- wil6210: remove reset file from debugfs (git-fixes).
- wimax/i2400m: Fix potential urb refcnt leak (bsc#1051510).
- work around mvfs bug (bsc#1162063).
- workqueue: do not use wq_select_unbound_cpu() for bound works (bsc#1172130).
- x86/cpu/amd: Make erratum #1054 a legacy erratum (bsc#1114279).
- x86/entry/64: Fix unwind hints in kernel exit path (bsc#1058115).
- x86/entry/64: Fix unwind hints in register clearing code (bsc#1058115).
- x86/entry/64: Fix unwind hints in rewind_stack_do_exit() (bsc#1058115).
- x86/entry/64: Fix unwind hints in __switch_to_asm() (bsc#1058115).
- x86/events/intel/ds: Add PERF_SAMPLE_PERIOD into PEBS_FREERUNNING_FLAGS (git-fixes).
- x86: Fix early boot crash on gcc-10, third try (bsc#1114279).
- x86/Hyper-V: Allow guests to enable InvariantTSC (bsc#1170620).
- x86/Hyper-V: Free hv_panic_page when fail to register kmsg dump (bsc#1170618).
- x86/Hyper-V: Report crash data in die() when panic_on_oops is set (bsc#1170618).
- x86/Hyper-V: Report crash register data or kmsg before running crash kernel (bsc#1170618).
- x86/Hyper-V: Report crash register data when sysctl_record_panic_msg is not set (bsc#1170618).
- x86/Hyper-V: report value of misc_features (git-fixes).
- x86/Hyper-V: Trigger crash enlightenment only once during system crash (bsc#1170618).
- x86/Hyper-V: Unload vmbus channel in hv panic callback (bsc#1170618).
- x86/kprobes: Avoid kretprobe recursion bug (bsc#1114279).
- x86/{mce,mm}: Unmap the entire page if the whole page is affected and poisoned (bsc#1172257).
- x86/reboot/quirks: Add MacBook6,1 reboot quirk (bsc#1114279).
- x86/resctrl: Fix invalid attempt at removing the default resource group (git-fixes).
- x86/resctrl: Preserve CDP enable over CPU hotplug (bsc#1114279).
- x86/unwind/orc: Do not skip the first frame for inactive tasks (bsc#1058115).
- x86/unwind/orc: Fix error handling in __unwind_start() (bsc#1058115).
- x86/unwind/orc: Fix error path for bad ORC entry type (bsc#1058115).
- x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks (bsc#1058115).
- x86/unwind/orc: Prevent unwinding before ORC initialization (bsc#1058115).
- x86/unwind: Prevent false warnings for non-current tasks (bsc#1058115).
- x86/xen: fix booting 32-bit pv guest (bsc#1071995).
- x86/xen: Make the boot CPU idle task reliable (bsc#1071995).
- x86/xen: Make the secondary CPU idle tasks reliable (bsc#1071995).
- xen/pci: reserve MCFG areas earlier (bsc#1170145).
- xfrm: Always set XFRM_TRANSFORMED in xfrm{4,6}_output_finish (networking-stable-20_04_27).
- xfrm: fix error in comment (git fixes).
- xfs: Correctly invert xfs_buftarg LRU isolation logic (git-fixes).
- xfs: do not ever return a stale pointer from __xfs_dir3_free_read (git-fixes).
- xprtrdma: Fix completion wait during device removal (git-fixes).
Patchnames
SUSE-2020-2156,SUSE-SLE-RT-12-SP4-2020-2156
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 12 SP4 RT kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2020-10135: Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key (bnc#1171988).\n- CVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).\n- CVE-2019-20908: An issue was discovered in drivers/firmware/efi/efi.c where incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032 (bnc#1173567).\n- CVE-2020-10781: zram sysfs resource consumption was fixed (bnc#1173074).\n- CVE-2020-15780: An issue was discovered in drivers/acpi/acpi_configfs.c where injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30 (bnc#1173573).\n- CVE-2020-15393: usbtest_disconnect in drivers/usb/misc/usbtest.c had a memory leak, aka CID-28ebeb8db770 (bnc#1173514).\n- CVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c had a deadlock if a coalescing operation fails (bnc#1171732).\n- CVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).\n- CVE-2020-10769: A buffer over-read flaw was found in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm\u0027s module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash. This flaw allowed a local attacker with user privileges to cause a denial of service (bnc#1173265).\n- CVE-2020-10773: A kernel stack information leak on s390/s390x was fixed (bnc#1172999).\n- CVE-2020-14416: A race condition in tty-\u003edisc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).\n- CVE-2020-10766: Fixed an issue which allowed an attacker with a local account to disable SSBD protection (bnc#1172781).\n- CVE-2020-10767: Fixed an issue where Indirect Branch Prediction Barrier was disabled in certain circumstances, leaving the system open to a spectre v2 style attack (bnc#1172782).\n- CVE-2020-10768: Fixed an issue with the prctl() function, where indirect branch speculation could be enabled even though it was diabled before (bnc#1172783).\n- CVE-2020-13974: Fixed a integer overflow in drivers/tty/vt/keyboard.c, if k_ascii is called several times in a row (bnc#1172775).\n- CVE-2020-0543: Fixed a side channel attack against special registers which could have resulted in leaking of read values to cores other than the one which called it. This attack is known as Special Register Buffer Data Sampling (SRBDS) or \u0027CrossTalk\u0027 (bsc#1154824).\n- CVE-2020-13974: Fixed an integer overflow in drivers/tty/vt/keyboard.c which could have been caused by calling multiple time in a row k_ascii (bsc#1172775).\n- CVE-2020-13143: Fixed an out-of-bounds read in gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c (bsc#1171982).\n- CVE-2020-12769: Fixed an issue which could have allowed attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one (bsc#1171983).\n- CVE-2020-12657: An a use-after-free in block/bfq-iosched.c (bsc#1171205).\n- CVE-2020-12656: Fixed an improper handling of certain domain_release calls leadingch could have led to a memory leak (bsc#1171219).\n- CVE-2020-12655: Fixed an issue which could have allowed attackers to trigger a sync of excessive duration via an XFS v5 image with crafted metadata (bsc#1171217).\n- CVE-2020-12654: Fixed an issue in he wifi driver which could have allowed a remote AP to trigger a heap-based buffer overflow (bsc#1171202).\n- CVE-2020-12653: Fixed an issue in the wifi driver which could have allowed local users to gain privileges or cause a denial of service (bsc#1171195).\n- CVE-2020-12652: Fixed an issue which could have allowed local users to hold an incorrect lock during the ioctl operation and trigger a race condition (bsc#1171218).\n- CVE-2020-12464: Fixed a use-after-free due to a transfer without a reference (bsc#1170901).\n- CVE-2020-12114: Fixed a pivot_root race condition which could have allowed local users to cause a denial of service (panic) by corrupting a mountpoint reference counter (bsc#1171098).\n- CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap could have caused user PTE access (bsc#1172317).\n- CVE-2020-10751: Fixed an improper implementation in SELinux LSM hook where it was assumed that an skb would only contain a single netlink message (bsc#1171189).\n- CVE-2020-10732: Fixed kernel data leak in userspace coredumps due to uninitialized data (bsc#1171220).\n- CVE-2020-10720: Fixed a use-after-free read in napi_gro_frags() (bsc#1170778).\n- CVE-2020-10711: Fixed a null pointer dereference in SELinux subsystem which could have allowed a remote network user to crash the kernel resulting in a denial of service (bsc#1171191).\n- CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev (bsc#1170056).\n- CVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a video driver. This could lead to local information disclosure with System execution privileges needed (bsc#1170345).\n- CVE-2019-20812: Fixed an issue in prb_calc_retire_blk_tmo() which could have resulted in a denial of service (bsc#1172453).\n- CVE-2019-20810: Fixed a memory leak in due to not calling of snd_card_free (bsc#1172458).\n- CVE-2019-20806: Fixed a null pointer dereference which may had lead to denial of service (bsc#1172199).\n- CVE-2019-19462: Fixed an issue which could have allowed local user to cause denial of service (bsc#1158265).\n- CVE-2019-16746: An issue was discovered in net/wireless/nl80211.c, where the length of variable elements in a beacon head was not checked, leading to a buffer overflow (bnc#1152107 1173659).\n- CVE-2019-20810: go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c did not call snd_card_free for a failure path, which caused a memory leak, aka CID-9453264ef586 (bnc#1172458).\n- CVE-2018-1000199: Fixed a potential local code execution via ptrace (bsc#1089895).\n\nThe following non-security bugs were fixed:\n\n- ACPI: CPPC: Fix reference count leak in acpi_cppc_processor_probe() (bsc#1051510).\n- ACPI: PM: Avoid using power resources if there are none for D0 (bsc#1051510).\n- ACPI: sysfs: Fix reference count leak in acpi_sysfs_add_hotplug_profile() (bsc#1051510).\n- acpi/x86: ignore unspecified bit positions in the ACPI global lock field (bsc#1051510).\n- agp/intel: Reinforce the barrier after GTT updates (bsc#1051510).\n- ALSA: ctxfi: Remove unnecessary cast in kfree (bsc#1051510).\n- ALSA: dummy: Fix PCM format loop in proc output (bsc#1111666).\n- ALSA: es1688: Add the missed snd_card_free() (bsc#1051510).\n- ALSA: hda: Do not release card at firmware loading error (bsc#1051510).\n- ALSA: hda/hdmi: fix race in monitor detection during probe (bsc#1051510).\n- ALSA: hda/hdmi: fix without unlocked before return (bsc#1051510).\n- ALSA: hda: Keep the controller initialization even if no codecs found (bsc#1051510).\n- ALSA: hda/realtek - Add more fixup entries for Clevo machines (git-fixes).\n- ALSA: hda/realtek - Add new codec supported for ALC245 (bsc#1051510).\n- ALSA: hda/realtek - Add new codec supported for ALC287 (git-fixes).\n- ALSA: hda/realtek - Fix S3 pop noise on Dell Wyse (git-fixes).\n- ALSA: hda/realtek - Fix unexpected init_amp override (bsc#1051510).\n- ALSA: hda/realtek - Limit int mic boost for Thinkpad T530 (git-fixes bsc#1171293).\n- ALSA: hda/realtek - Two front mics on a Lenovo ThinkCenter (bsc#1051510).\n- ALSA: hwdep: fix a left shifting 1 by 31 UB bug (git-fixes).\n- ALSA: iec1712: Initialize STDSP24 properly when using the model=staudio option (git-fixes).\n- ALSA: opti9xx: shut up gcc-10 range warning (bsc#1051510).\n- ALSA: pcm: fix incorrect hw_base increase (git-fixes).\n- ALSA: pcm: oss: Place the plugin buffer overflow checks correctly (bsc#1170522).\n- ALSA: rawmidi: Fix racy buffer resize under concurrent accesses (git-fixes).\n- ALSA: usb-audio: Add control message quirk delay for Kingston HyperX headset (git-fixes).\n- ALSA: usb-audio: Correct a typo of NuPrime DAC-10 USB ID (bsc#1051510).\n- ALSA: usb-audio: Do not override ignore_ctl_error value from the map (bsc#1051510).\n- ALSA: usb-audio: Fix usb audio refcnt leak when getting spdif (bsc#1051510).\n- ALSA: usb-audio: mixer: volume quirk for ESS Technology Asus USB DAC (git-fixes).\n- ALSA: usx2y: Fix potential NULL dereference (bsc#1051510).\n- ASoC: codecs: hdac_hdmi: Fix incorrect use of list_for_each_entry (bsc#1051510).\n- ASoC: dapm: connect virtual mux with default value (bsc#1051510).\n- ASoC: dapm: fixup dapm kcontrol widget (bsc#1051510).\n- ASoC: dpcm: allow start or stop during pause for backend (bsc#1051510).\n- ASoC: fix regwmask (bsc#1051510).\n- ASoC: msm8916-wcd-digital: Reset RX interpolation path after use (bsc#1051510).\n- ASoC: samsung: Prevent clk_get_rate() calls in atomic context (bsc#1111666).\n- ASoC: topology: Check return value of pcm_new_ver (bsc#1051510).\n- ASoC: topology: use name_prefix for new kcontrol (bsc#1051510).\n- b43legacy: Fix case where channel status is corrupted (bsc#1051510).\n- batman-adv: fix batadv_nc_random_weight_tq (git-fixes).\n- batman-adv: Fix refcnt leak in batadv_show_throughput_override (git-fixes).\n- batman-adv: Fix refcnt leak in batadv_store_throughput_override (git-fixes).\n- batman-adv: Fix refcnt leak in batadv_v_ogm_process (git-fixes).\n- bcache: avoid unnecessary btree nodes flushing in btree_flush_write() (git fixes (block drivers)).\n- bcache: Fix an error code in bch_dump_read() (git fixes (block drivers)).\n- bcache: fix incorrect data type usage in btree_flush_write() (git fixes (block drivers)).\n- bcache: Revert \u0027bcache: shrink btree node cache after bch_btree_check()\u0027 (git fixes (block drivers)).\n- block, bfq: add requeue-request hook (bsc#1104967 bsc#1171673).\n- block, bfq: postpone rq preparation to insert or merge (bsc#1104967 bsc#1171673).\n- block/drbd: delete invalid function drbd_md_mark_dirty_ (bsc#1171527).\n- block: drbd: remove a stray unlock in __drbd_send_protocol() (bsc#1171599).\n- block: fix busy device checking in blk_drop_partitions again (bsc#1171948).\n- block: fix busy device checking in blk_drop_partitions (bsc#1171948).\n- block: fix memleak of bio integrity data (git fixes (block drivers)).\n- block: remove QUEUE_FLAG_STACKABLE (git fixes (block drivers)).\n- block: remove the bd_openers checks in blk_drop_partitions (bsc#1171948).\n- block: sed-opal: fix sparse warning: convert __be64 data (git fixes (block drivers)).\n- bnxt_en: fix memory leaks in bnxt_dcbnl_ieee_getets() (networking-stable-20_03_28).\n- bnxt_en: reinitialize IRQs when MTU is modified (networking-stable-20_03_14).\n- bonding/alb: make sure arp header is pulled before accessing it (networking-stable-20_03_14).\n- brcmfmac: abort and release host after error (bsc#1051510).\n- btrfs: always wait on ordered extents at fsync time (bsc#1171761).\n- btrfs: clean up the left over logged_list usage (bsc#1171761).\n- btrfs: do not zero f_bavail if we have available space (bsc#1168081).\n- btrfs: fix deadlock with memory reclaim during scrub (bsc#1172127).\n- Btrfs: fix list_add corruption and soft lockups in fsync (bsc#1171761).\n- btrfs: fix log context list corruption after rename whiteout error (bsc#1172342).\n- Btrfs: fix missing data checksums after a ranged fsync (msync) (bsc#1171761).\n- btrfs: fix missing file extent item for hole after ranged fsync (bsc#1171761).\n- Btrfs: fix missing hole after hole punching and fsync when using NO_HOLES (bsc#1171761).\n- btrfs: fix missing semaphore unlock in btrfs_sync_file (bsc#1171761).\n- btrfs: fix partial loss of prealloc extent past i_size after fsync (bsc#1172343).\n- Btrfs: fix rare chances for data loss when doing a fast fsync (bsc#1171761).\n- btrfs: move the dio_sem higher up the callchain (bsc#1171761).\n- btrfs: reloc: clear DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417 bsc#1160947 bsc#1172366).\n- btrfs: reloc: fix reloc root leak and NULL pointer dereference (bsc#1171417 bsc#1160947 bsc#1172366).\n- btrfs: Remove extra parentheses from condition in copy_items() (bsc#1171761).\n- Btrfs: remove no longer used io_err from btrfs_log_ctx (bsc#1171761).\n- Btrfs: remove no longer used logged range variables when logging extents (bsc#1171761).\n- Btrfs: remove no longer used \u0027sync\u0027 member from transaction handle (bsc#1171761).\n- btrfs: remove remaing full_sync logic from btrfs_sync_file (bsc#1171761).\n- btrfs: remove the logged extents infrastructure (bsc#1171761).\n- btrfs: remove the wait ordered logic in the log_one_extent path (bsc#1171761).\n- btrfs: setup a nofs context for memory allocation at btrfs_create_tree() (bsc#1172127).\n- btrfs: setup a nofs context for memory allocation at __btrfs_set_acl (bsc#1172127).\n- btrfs: use nofs context when initializing security xattrs to avoid deadlock (bsc#1172127).\n- btrfs: volumes: Remove ENOSPC-prone btrfs_can_relocate() (bsc#1171124).\n- can: add missing attribute validation for termination (networking-stable-20_03_14).\n- cdc-acm: close race betrween suspend() and acm_softint (git-fixes).\n- CDC-ACM: heed quirk also in error handling (git-fixes).\n- cdc-acm: introduce a cool down (git-fixes).\n- ceph: fix double unlock in handle_cap_export() (bsc#1171694).\n- ceph: fix endianness bug when handling MDS session feature bits (bsc#1171695).\n- cgroup, netclassid: periodically release file_lock on classid updating (networking-stable-20_03_14).\n- CIFS: Allocate crypto structures on the fly for calculating signatures of incoming packets (bsc#1144333).\n- CIFS: Allocate encryption header through kmalloc (bsc#1144333).\n- CIFS: allow unlock flock and OFD lock across fork (bsc#1144333).\n- CIFS: check new file size when extending file by fallocate (bsc#1144333).\n- CIFS: cifspdu.h: Replace zero-length array with flexible-array member (bsc#1144333).\n- CIFS: clear PF_MEMALLOC before exiting demultiplex thread (bsc#1144333).\n- CIFS: do not share tcons with DFS (bsc#1144333).\n- CIFS: dump the session id and keys also for SMB2 sessions (bsc#1144333).\n- CIFS: ensure correct super block for DFS reconnect (bsc#1144333).\n- CIFS: Fix bug which the return value by asynchronous read is error (bsc#1144333).\n- CIFS: fix uninitialised lease_key in open_shroot() (bsc#1144333).\n- cifs: get rid of unused parameter in reconn_setup_dfs_targets() (bsc#1144333).\n- cifs: handle hostnames that resolve to same ip in failover (bsc#1144333 bsc#1161016).\n- CIFS: improve read performance for page size 64KB \u0026 cache=strict \u0026 vers=2.1+ (bsc#1144333).\n- CIFS: Increment num_remote_opens stats counter even in case of smb2_query_dir_first (bsc#1144333).\n- CIFS: minor update to comments around the cifs_tcp_ses_lock mutex (bsc#1144333).\n- CIFS: protect updating server-\u003edstaddr with a spinlock (bsc#1144333).\n- cifs: set up next DFS target before generic_ip_connect() (bsc#1144333 bsc#1161016).\n- CIFS: smb2pdu.h: Replace zero-length array with flexible-array member (bsc#1144333).\n- CIFS: smbd: Calculate the correct maximum packet size for segmented SMBDirect send/receive (bsc#1144333).\n- CIFS: smbd: Check and extend sender credits in interrupt context (bsc#1144333).\n- CIFS: smbd: Check send queue size before posting a send (bsc#1144333).\n- CIFS: smbd: Do not schedule work to send immediate packet on every receive (bsc#1144333).\n- CIFS: smbd: Merge code to track pending packets (bsc#1144333).\n- CIFS: smbd: Properly process errors on ib_post_send (bsc#1144333).\n- CIFS: smbd: Update receive credits before sending and deal with credits roll back on failure before sending (bsc#1144333).\n- CIFS: Warn less noisily on default mount (bsc#1144333).\n- clk: Add clk_hw_unregister_composite helper function definition (bsc#1051510).\n- clk: bcm2835: Fix return type of bcm2835_register_gate (bsc#1051510).\n- clk: clk-flexgen: fix clock-critical handling (bsc#1051510).\n- clk: imx6ull: use OSC clock during AXI rate change (bsc#1051510).\n- clk: imx: make mux parent strings const (bsc#1051510).\n- clk: mediatek: correct the clocks for MT2701 HDMI PHY module (bsc#1051510).\n- clk: sunxi: Fix incorrect usage of round_down() (bsc#1051510).\n- clk: sunxi-ng: a64: Fix gate bit of DSI DPHY (bsc#1051510).\n- clocksource/drivers/hyper-v: Set TSC clocksource as default w/ InvariantTSC (bsc#1170620).\n- clocksource: dw_apb_timer_of: Fix missing clockevent timers (bsc#1051510).\n- compat_ioctl: block: handle BLKREPORTZONE/BLKRESETZONE (git fixes (block drivers)).\n- compat_ioctl: block: handle Persistent Reservations (git fixes (block drivers)).\n- component: Silence bind error on -EPROBE_DEFER (bsc#1051510).\n- copy_{to,from}_user(): consolidate object size checks (git fixes).\n- coresight: do not use the BIT() macro in the UAPI header (git fixes (block drivers)).\n- cpufreq: s3c64xx: Remove pointless NULL check in s3c64xx_cpufreq_driver_init (bsc#1051510).\n- crypto: cavium/nitrox - Fix \u0027nitrox_get_first_device()\u0027 when ndevlist is fully iterated (git-fixes).\n- crypto: ccp - AES CFB mode is a stream cipher (git-fixes).\n- crypto: ccp - Clean up and exit correctly on allocation failure (git-fixes).\n- crypto: ccp - Cleanup misc_dev on sev_exit() (bsc#1114279).\n- crypto: ccp - Cleanup sp_dev_master in psp_dev_destroy() (bsc#1114279).\n- debugfs: Add debugfs_create_xul() for hexadecimal unsigned long (git-fixes).\n- dmaengine: dmatest: Fix iteration non-stop logic (bsc#1051510).\n- dm btree: increase rebalance threshold in __rebalance2() (git fixes (block drivers)).\n- dm cache: fix a crash due to incorrect work item cancelling (git fixes (block drivers)).\n- dm crypt: fix benbi IV constructor crash if used in authenticated mode (git fixes (block drivers)).\n- dm: fix potential for q-\u003emake_request_fn NULL pointer (git fixes (block drivers)).\n- dm mpath: switch paths in dm_blk_ioctl() code path (bsc#1167574).\n- dm space map common: fix to ensure new block isn\u0027t already in use (git fixes (block drivers)).\n- dm: various cleanups to md-\u003equeue initialization code (git fixes).\n- dm verity fec: fix hash block number in verity_fec_decode (git fixes (block drivers)).\n- dm verity fec: fix memory leak in verity_fec_dtr (git fixes (block drivers)).\n- dm writecache: fix data corruption when reloading the target (git fixes (block drivers)).\n- dm writecache: fix incorrect flush sequence when doing SSD mode commit (git fixes (block drivers)).\n- dm writecache: verify watermark during resume (git fixes (block drivers)).\n- dm zoned: fix invalid memory access (git fixes (block drivers)).\n- dm zoned: reduce overhead of backing device checks (git fixes (block drivers)).\n- dm zoned: remove duplicate nr_rnd_zones increase in dmz_init_zone() (git fixes (block drivers)).\n- dm zoned: support zone sizes smaller than 128MiB (git fixes (block drivers)).\n- dp83640: reverse arguments to list_add_tail (git-fixes).\n- Drivers: hv: Add a module description line to the hv_vmbus driver (bsc#1172253).\n- Drivers: HV: Send one page worth of kmsg dump over Hyper-V during panic (bsc#1170618).\n- Drivers: hv: vmbus: Fix the issue with freeing up hv_ctl_table_hdr (bsc#1170618).\n- Drivers: hv: vmbus: Get rid of MSR access from vmbus_drv.c (bsc#1170618).\n- Drivers: hv: vmus: Fix the check for return value from kmsg get dump buffer (bsc#1170618).\n- Drivers/net/ibmvnic: Update VNIC protocol version reporting (bsc#1065729).\n- Drivers: soc: ti: knav_qmss_queue: Make knav_gp_range_ops static (bsc#1051510).\n- drm: amd/acp: fix broken menu structure (bsc#1114279) \t* context changes\n- drm/crc: Actually allow to change the crc source (bsc#1114279) \t* offset changes\n- drm/dp_mst: Fix clearing payload state on topology disable (bsc#1051510).\n- drm/dp_mst: Reformat drm_dp_check_act_status() a bit (bsc#1051510).\n- drm/edid: Fix off-by-one in DispID DTD pixel clock (bsc#1114279)\n- drm: encoder_slave: fix refcouting error for modules (bsc#1114279)\n- drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of (bsc#1114279)\n- drm/i915: properly sanity check batch_start_offset (bsc#1114279) \t* renamed display/intel_fbc.c -\u003e intel_fb.c \t* renamed gt/intel_rc6.c -\u003e intel_pm.c \t* context changes\n- drm/meson: Delete an error message in meson_dw_hdmi_bind() (bsc#1051510).\n- drm: NULL pointer dereference [null-pointer-deref] (CWE 476) problem (bsc#1114279)\n- drm/qxl: qxl_release leak in qxl_draw_dirty_fb() (bsc#1051510).\n- drm/qxl: qxl_release leak in qxl_hw_surface_alloc() (bsc#1051510).\n- drm/qxl: qxl_release use after free (bsc#1051510).\n- drm: Remove PageReserved manipulation from drm_pci_alloc (bsc#1114279) \t* offset changes\n- dump_stack: avoid the livelock of the dump_lock (git fixes (block drivers)).\n- e1000e: Disable TSO for buffer overrun workaround (bsc#1051510).\n- e1000e: Do not wake up the system via WOL if device wakeup is disabled (bsc#1051510).\n- EDAC/amd64: Read back the scrub rate PCI register on F15h (bsc#1114279).\n- EDAC, sb_edac: Add support for systems with segmented PCI buses (bsc#1169525).\n- evm: Check also if *tfm is an error pointer in init_desc() (bsc#1051510).\n- evm: Fix a small race in init_desc() (bsc#1051510).\n- ext4: do not zeroout extents beyond i_disksize (bsc#1167851).\n- ext4: fix extent_status fragmentation for plain files (bsc#1171949).\n- ext4: use non-movable memory for superblock readahead (bsc#1171952).\n- extcon: adc-jack: Fix an error handling path in \u0027adc_jack_probe()\u0027 (bsc#1051510).\n- fanotify: fix merging marks masks with FAN_ONDIR (bsc#1171679).\n- fbcon: fix null-ptr-deref in fbcon_switch (bsc#1114279) \t* rename drivers/video/fbdev/core to drivers/video/console \t* context changes\n- fbdev: potential information leak in do_fb_ioctl() (bsc#1114279)\n- fbmem: Adjust indentation in fb_prepare_logo and fb_blank (bsc#1114279)\n- fib: add missing attribute validation for tun_id (networking-stable-20_03_14).\n- firmware: qcom: scm: fix compilation error when disabled (bsc#1051510).\n- fs/cifs: fix gcc warning in sid_to_id (bsc#1144333).\n- fs/seq_file.c: simplify seq_file iteration code and interface (bsc#1170125).\n- gpiolib: Document that GPIO line names are not globally unique (bsc#1051510).\n- gpio: tegra: mask GPIO IRQs during IRQ shutdown (bsc#1051510).\n- gre: fix uninit-value in __iptunnel_pull_header (networking-stable-20_03_14).\n- HID: hid-input: clear unmapped usages (git-fixes).\n- HID: hyperv: Add a module description line (bsc#1172253).\n- HID: i2c-hid: add Trekstor Primebook C11B to descriptor override (git-fixes).\n- HID: i2c-hid: override HID descriptors for certain devices (git-fixes).\n- HID: multitouch: add eGalaxTouch P80H84 support (bsc#1051510).\n- HID: sony: Fix for broken buttons on DS3 USB dongles (bsc#1051510).\n- HID: wacom: Read HID_DG_CONTACTMAX directly for non-generic devices (git-fixes).\n- hrtimer: Annotate lockless access to timer-\u003estate (git fixes (block drivers)).\n- hsr: add restart routine into hsr_get_node_list() (networking-stable-20_03_28).\n- hsr: check protocol version in hsr_newlink() (networking-stable-20_04_17).\n- hsr: fix general protection fault in hsr_addr_is_self() (networking-stable-20_03_28).\n- hsr: set .netnsok flag (networking-stable-20_03_28).\n- hsr: use rcu_read_lock() in hsr_get_node_{list/status}() (networking-stable-20_03_28).\n- i2c: acpi: Force bus speed to 400KHz if a Silead touchscreen is present (git-fixes).\n- i2c: acpi: put device when verifying client fails (git-fixes).\n- i2c: brcmstb: remove unused struct member (git-fixes).\n- i2c: core: Allow empty id_table in ACPI case as well (git-fixes).\n- i2c: core: decrease reference count of device node in i2c_unregister_device (git-fixes).\n- i2c: dev: Fix the race between the release of i2c_dev and cdev (bsc#1051510).\n- i2c: fix missing pm_runtime_put_sync in i2c_device_probe (git-fixes).\n- i2c-hid: properly terminate i2c_hid_dmi_desc_override_table array (git-fixes).\n- i2c: i801: Do not add ICH_RES_IO_SMI for the iTCO_wdt device (git-fixes).\n- i2c: iproc: Stop advertising support of SMBUS quick cmd (git-fixes).\n- i2c: isch: Remove unnecessary acpi.h include (git-fixes).\n- i2c: mux: demux-pinctrl: Fix an error handling path in \u0027i2c_demux_pinctrl_probe()\u0027 (bsc#1051510).\n- i2c: st: fix missing struct parameter description (bsc#1051510).\n- IB/ipoib: Add child to parent list only if device initialized (bsc#1168503).\n- IB/ipoib: Consolidate checking of the proposed child interface (bsc#1168503).\n- IB/ipoib: Do not remove child devices from within the ndo_uninit (bsc#1168503).\n- IB/ipoib: Get rid of IPOIB_FLAG_GOING_DOWN (bsc#1168503).\n- IB/ipoib: Get rid of the sysfs_mutex (bsc#1168503).\n- IB/ipoib: Maintain the child_intfs list from ndo_init/uninit (bsc#1168503).\n- IB/ipoib: Move all uninit code into ndo_uninit (bsc#1168503).\n- IB/ipoib: Move init code to ndo_init (bsc#1168503).\n- IB/ipoib: Replace printk with pr_warn (bsc#1168503).\n- IB/ipoib: Use cancel_delayed_work_sync for neigh-clean task (bsc#1168503).\n- IB/ipoib: Warn when one port fails to initialize (bsc#1168503).\n- ibmveth: Fix max MTU limit (bsc#1173428 ltc#186397).\n- ibmvfc: do not send implicit logouts prior to NPIV login (bsc#1169625 ltc#184611).\n- ibmvnic: continue to init in CRQ reset returns H_CLOSED (bsc#1173280 ltc#185369).\n- ibmvnic: Flush existing work items before device removal (bsc#1065729).\n- ibmvnic: Harden device login requests (bsc#1170011 ltc#183538).\n- ibmvnic: Skip fatal error reset after passive init (bsc#1171078 ltc#184239).\n- iio:ad7797: Use correct attribute_group (bsc#1051510).\n- iio: adc: stm32-adc: fix device used to request dma (bsc#1051510).\n- iio: adc: stm32-adc: fix sleep in atomic context (git-fixes).\n- iio: adc: stm32-adc: Use dma_request_chan() instead dma_request_slave_channel() (bsc#1051510).\n- iio: buffer: Do not allow buffers without any channels enabled to be activated (bsc#1051510).\n- iio: dac: vf610: Fix an error handling path in \u0027vf610_dac_probe()\u0027 (bsc#1051510).\n- iio: pressure: bmp280: Tolerate IRQ before registering (bsc#1051510).\n- iio: sca3000: Remove an erroneous \u0027get_device()\u0027 (bsc#1051510).\n- iio: xilinx-xadc: Fix ADC-B powerdown (bsc#1051510).\n- iio: xilinx-xadc: Fix clearing interrupt when enabling trigger (bsc#1051510).\n- iio: xilinx-xadc: Fix sequencer configuration for aux channels in simultaneous mode (bsc#1051510).\n- ima: Directly assign the ima_default_policy pointer to ima_rules (bsc#1051510).\n- ima: Fix ima digest hash table key calculation (bsc#1051510).\n- ima: Fix return value of ima_write_policy() (git-fixes).\n- include/asm-generic/topology.h: guard cpumask_of_node() macro argument (bsc#1148868).\n- Input: evdev - call input_flush_device() on release(), not flush() (bsc#1051510).\n- Input: hyperv-keyboard - add module description (bsc#1172253).\n- Input: i8042 - add Acer Aspire 5738z to nomux list (bsc#1051510).\n- Input: i8042 - add ThinkPad S230u to i8042 reset list (bsc#1051510).\n- Input: raydium_i2c_ts - use true and false for boolean values (bsc#1051510).\n- Input: synaptics-rmi4 - fix error return code in rmi_driver_probe() (bsc#1051510).\n- Input: synaptics-rmi4 - really fix attn_data use-after-free (git-fixes).\n- Input: usbtouchscreen - add support for BonXeon TP (bsc#1051510).\n- Input: xpad - add custom init packet for Xbox One S controllers (bsc#1051510).\n- iommu/amd: Call domain_flush_complete() in update_domain() (bsc#1172096).\n- iommu/amd: Do not flush Device Table in iommu_map_page() (bsc#1172097).\n- iommu/amd: Do not loop forever when trying to increase address space (bsc#1172098).\n- iommu/amd: Fix legacy interrupt remapping for x2APIC-enabled system (bsc#1172099).\n- iommu/amd: Fix over-read of ACPI UID from IVRS table (bsc#1172101).\n- iommu/amd: Fix race in increase_address_space()/fetch_pte() (bsc#1172102).\n- iommu/amd: Update Device Table in increase_address_space() (bsc#1172103).\n- iommu: Fix reference count leak in iommu_group_alloc (bsc#1172397).\n- ipmi: fix hung processes in __get_guid() (git-fixes).\n- ipv4: fix a RCU-list lock in fib_triestat_seq_show (networking-stable-20_04_02).\n- ipv6/addrconf: call ipv6_mc_up() for non-Ethernet interface (networking-stable-20_03_14).\n- ipv6: do not auto-add link-local address to lag ports (networking-stable-20_04_09).\n- ipv6: Fix nlmsg_flags when splitting a multipath route (networking-stable-20_03_01).\n- ipv6: Fix route replacement with dev-only route (networking-stable-20_03_01).\n- ipvlan: add cond_resched_rcu() while processing muticast backlog (networking-stable-20_03_14).\n- ipvlan: do not deref eth hdr before checking it\u0027s set (networking-stable-20_03_14).\n- ipvlan: do not use cond_resched_rcu() in ipvlan_process_multicast() (networking-stable-20_03_14).\n- iwlwifi: pcie: actually release queue memory in TVQM (bsc#1051510).\n- kABI fix for early XHCI debug (git-fixes).\n- kabi for for md: improve handling of bio with REQ_PREFLUSH in md_flush_request() (git-fixes).\n- kabi, protect struct ib_device (bsc#1168503).\n- kabi/severities: Do not track KVM internal symbols.\n- kabi/severities: Ingnore get_dev_data() The function is internal to the AMD IOMMU driver and must not be called by any third party.\n- kabi workaround for snd_rawmidi buffer_ref field addition (git-fixes).\n- KEYS: reaching the keys quotas correctly (bsc#1051510).\n- KVM: arm64: Change hyp_panic()s dependency on tpidr_el2 (bsc#1133021).\n- KVM: arm64: Stop save/restoring host tpidr_el1 on VHE (bsc#1133021).\n- KVM: Check validity of resolved slot when searching memslots (bsc#1172104).\n- KVM: nVMX: Do not reread VMCS-agnostic state when switching VMCS (bsc#1114279).\n- KVM: nVMX: Skip IBPB when switching between vmcs01 and vmcs02 (bsc#1114279).\n- KVM: s390: vsie: Fix delivery of addressing exceptions (git-fixes).\n- KVM: s390: vsie: Fix possible race when shadowing region 3 tables (git-fixes).\n- KVM: s390: vsie: Fix region 1 ASCE sanity shadow address checks (git-fixes).\n- KVM: SVM: Fix potential memory leak in svm_cpu_init() (bsc#1171736).\n- KVM x86: Extend AMD specific guest behavior to Hygon virtual CPUs (bsc#1152489).\n- kvm: x86: Fix L1TF mitigation for shadow MMU (bsc#1171904).\n- KVM: x86/mmu: Set mmio_value to \u00270\u0027 if reserved #PF can\u0027t be generated (bsc#1171904).\n- KVM: x86: only do L1TF workaround on affected processors (bsc#1171904).\n- l2tp: Allow management of tunnels and session in user namespace (networking-stable-20_04_17).\n- libata: Remove extra scsi_host_put() in ata_scsi_add_hosts() (bsc#1051510).\n- libata: Return correct status in sata_pmp_eh_recover_pm() when ATA_DFLAG_DETACH is set (bsc#1051510).\n- libceph: do not omit recovery_deletes in target_copy() (bsc#1173462).\n- lib: raid6: fix awk build warnings (git fixes (block drivers)).\n- lib/raid6/test: fix build on distros whose /bin/sh is not bash (git fixes (block drivers)).\n- lib/stackdepot.c: fix global out-of-bounds in stack_slabs (git fixes (block drivers)).\n- livepatch: Apply vmlinux-specific KLP relocations early (bsc#1071995).\n- livepatch: Disallow vmlinux.ko (bsc#1071995).\n- livepatch: Make klp_apply_object_relocs static (bsc#1071995).\n- livepatch: Prevent module-specific KLP rela sections from referencing vmlinux symbols (bsc#1071995).\n- livepatch: Remove .klp.arch (bsc#1071995).\n- locks: print unsigned ino in /proc/locks (bsc#1171951). \n- mac80211: add ieee80211_is_any_nullfunc() (bsc#1051510).\n- mac80211_hwsim: Use kstrndup() in place of kasprintf() (bsc#1051510).\n- mac80211: mesh: fix discovery timer re-arming issue / crash (bsc#1051510).\n- macsec: avoid to set wrong mtu (bsc#1051510).\n- macsec: restrict to ethernet devices (networking-stable-20_03_28).\n- macvlan: add cond_resched() during multicast processing (networking-stable-20_03_14).\n- macvlan: fix null dereference in macvlan_device_event() (bsc#1051510).\n- md: Avoid namespace collision with bitmap API (git fixes (block drivers)).\n- md: improve handling of bio with REQ_PREFLUSH in md_flush_request() (git-fixes).\n- md/raid0: Fix an error message in raid0_make_request() (git fixes (block drivers)).\n- md/raid10: prevent access of uninitialized resync_pages offset (git-fixes).\n- md: use memalloc scope APIs in mddev_suspend()/mddev_resume() (git fixes (block drivers)).\n- media: dvb: return -EREMOTEIO on i2c transfer failure (bsc#1051510).\n- media: platform: fcp: Set appropriate DMA parameters (bsc#1051510).\n- media: ti-vpe: cal: fix disable_irqs to only the intended target (git-fixes).\n- mei: release me_cl object reference (bsc#1051510).\n- mlxsw: Fix some IS_ERR() vs NULL bugs (networking-stable-20_04_27).\n- mlxsw: spectrum_flower: Do not stop at FLOW_ACTION_VLAN_MANGLE (networking-stable-20_04_09).\n- mmc: atmel-mci: Fix debugfs on 64-bit platforms (git-fixes).\n- mmc: dw_mmc: Fix debugfs on 64-bit platforms (git-fixes).\n- mmc: fix compilation of user API (bsc#1051510).\n- mmc: meson-gx: make sure the descriptor is stopped on errors (git-fixes).\n- mmc: meson-gx: simplify interrupt handler (git-fixes).\n- mmc: renesas_sdhi: limit block count to 16 bit for old revisions (git-fixes).\n- mmc: sdhci-esdhc-imx: fix the mask for tuning start point (bsc#1051510).\n- mmc: sdhci-msm: Clear tuning done flag while hs400 tuning (bsc#1051510).\n- mmc: sdhci-of-at91: fix memleak on clk_get failure (git-fixes).\n- mmc: sdhci-pci: Fix eMMC driver strength for BYT-based controllers (bsc#1051510).\n- mmc: sdhci-xenon: fix annoying 1.8V regulator warning (bsc#1051510).\n- mmc: sdio: Fix potential NULL pointer error in mmc_sdio_init_card() (bsc#1051510).\n- mmc: tmio: fix access width of Block Count Register (git-fixes).\n- mm: thp: handle page cache THP correctly in PageTransCompoundMap (git fixes (block drivers)).\n- mtd: cfi: fix deadloop in cfi_cmdset_0002.c do_write_buffer (bsc#1051510).\n- mtd: spi-nor: cadence-quadspi: add a delay in write sequence (git-fixes).\n- mtd: spi-nor: enable 4B opcodes for mx66l51235l (git-fixes).\n- mtd: spi-nor: fsl-quadspi: Do not let -EINVAL on the bus (git-fixes).\n- mwifiex: avoid -Wstringop-overflow warning (bsc#1051510).\n- mwifiex: Fix memory corruption in dump_station (bsc#1051510).\n- net: bcmgenet: correct per TX/RX ring statistics (networking-stable-20_04_27).\n- net: dsa: b53: Fix ARL register definitions (networking-stable-20_04_27).\n- net: dsa: b53: Rework ARL bin logic (networking-stable-20_04_27).\n- net: dsa: bcm_sf2: Do not register slave MDIO bus with OF (networking-stable-20_04_09).\n- net: dsa: bcm_sf2: Ensure correct sub-node is parsed (networking-stable-20_04_09).\n- net: dsa: bcm_sf2: Fix overflow checks (git-fixes).\n- net: dsa: Fix duplicate frames flooded by learning (networking-stable-20_03_28).\n- net: dsa: mv88e6xxx: fix lockup on warm boot (networking-stable-20_03_14).\n- net: fec: validate the new settings in fec_enet_set_coalesce() (networking-stable-20_03_14).\n- net: fib_rules: Correctly set table field when table number exceeds 8 bits (networking-stable-20_03_01).\n- netfilter: connlabels: prefer static lock initialiser (git-fixes).\n- netfilter: conntrack: sctp: use distinct states for new SCTP connections (bsc#1159199).\n- netfilter: ctnetlink: netns exit must wait for callbacks (bsc#1169795).\n- netfilter: not mark a spinlock as __read_mostly (git-fixes).\n- net: fix race condition in __inet_lookup_established() (bsc#1151794).\n- net: fq: add missing attribute validation for orphan mask (networking-stable-20_03_14).\n- net, ip_tunnel: fix interface lookup with no key (networking-stable-20_04_02).\n- net: ipv4: devinet: Fix crash when add/del multicast IP with autojoin (networking-stable-20_04_17).\n- net: ipv6: do not consider routes via gateways for anycast address check (networking-stable-20_04_17).\n- netlink: Use netlink header as base to calculate bad attribute offset (networking-stable-20_03_14).\n- net: macsec: update SCI upon MAC address change (networking-stable-20_03_14).\n- net: memcg: fix lockdep splat in inet_csk_accept() (networking-stable-20_03_14).\n- net: memcg: late association of sock to memcg (networking-stable-20_03_14).\n- net/mlx4_en: avoid indirect call in TX completion (networking-stable-20_04_27).\n- net/mlx5: Add new fields to Port Type and Speed register (bsc#1171118).\n- net/mlx5: Add RoCE RX ICRC encapsulated counter (bsc#1171118).\n- net/mlx5e: Fix ethtool self test: link speed (bsc#1171118).\n- net/mlx5e: Move port speed code from en_ethtool.c to en/port.c (bsc#1171118).\n- net/mlx5: Expose link speed directly (bsc#1171118).\n- net/mlx5: Expose port speed when possible (bsc#1171118).\n- net: mvneta: Fix the case where the last poll did not process all rx (networking-stable-20_03_28).\n- net: netrom: Fix potential nr_neigh refcnt leak in nr_add_node (networking-stable-20_04_27).\n- net/packet: tpacket_rcv: do not increment ring index on drop (networking-stable-20_03_14).\n- net: phy: restore mdio regs in the iproc mdio driver (networking-stable-20_03_01).\n- net: qmi_wwan: add support for ASKEY WWHC050 (networking-stable-20_03_28).\n- net: revert default NAPI poll timeout to 2 jiffies (networking-stable-20_04_17).\n- net_sched: cls_route: remove the right filter from hashtable (networking-stable-20_03_28).\n- net/smc: add fallback check to connect() (git-fixes).\n- net/smc: fix refcount non-blocking connect() -part 2 (git-fixes).\n- net: vmxnet3: fix possible buffer overflow caused by bad DMA value in vmxnet3_get_rss() (bsc#1172484).\n- net/x25: Fix x25_neigh refcnt leak when receiving frame (networking-stable-20_04_27).\n- nfc: add missing attribute validation for SE API (networking-stable-20_03_14).\n- nfc: add missing attribute validation for vendor subcommand (networking-stable-20_03_14).\n- nfc: pn544: Fix occasional HW initialization failure (networking-stable-20_03_01).\n- nfc: st21nfca: add missed kfree_skb() in an error path (bsc#1051510).\n- nfsd4: fix up replay_matches_cache() (git-fixes).\n- nfsd: Ensure CLONE persists data and metadata changes to the target file (git-fixes).\n- nfsd: fix delay timer on 32-bit architectures (git-fixes).\n- nfsd: fix jiffies/time_t mixup in LRU list (git-fixes).\n- NFS: Directory page cache pages need to be locked when read (git-fixes).\n- nfsd: memory corruption in nfsd4_lock() (git-fixes).\n- NFS: Do not call generic_error_remove_page() while holding locks (bsc#1170457).\n- NFS: Fix an RCU lock leak in nfs4_refresh_delegation_stateid() (bsc#1170592).\n- NFS: Fix memory leaks and corruption in readdir (git-fixes).\n- NFS: Fix O_DIRECT accounting of number of bytes read/written (git-fixes).\n- NFS: Fix potential posix_acl refcnt leak in nfs3_set_acl (git-fixes).\n- NFS: fix racey wait in nfs_set_open_stateid_locked (bsc#1170592).\n- NFS/flexfiles: Use the correct TCP timeout for flexfiles I/O (git-fixes).\n- NFS/pnfs: Fix pnfs_generic_prepare_to_resend_writes() (git-fixes).\n- NFS: Revalidate the file size on a fatal write error (git-fixes).\n- NFSv4.0: nfs4_do_fsinfo() should not do implicit lease renewals (git-fixes).\n- NFSv4: Do not allow a cached open with a revoked delegation (git-fixes).\n- NFSv4: Fix leak of clp-\u003ecl_acceptor string (git-fixes).\n- NFSv4/pnfs: Return valid stateids in nfs_layout_find_inode_by_stateid() (git-fixes).\n- NFSv4: Retry CLOSE and DELEGRETURN on NFS4ERR_OLD_STATEID (bsc#1170592).\n- NFSv4: try lease recovery on NFS4ERR_EXPIRED (git-fixes).\n- NFSv4.x: Drop the slot if nfs4_delegreturn_prepare waits for layoutreturn (git-fixes).\n- nl802154: add missing attribute validation for dev_type (networking-stable-20_03_14).\n- nl802154: add missing attribute validation (networking-stable-20_03_14).\n- nvme: check for NVME_CTRL_LIVE in nvme_report_ns_ids() (bcs#1171558 bsc#1159058).\n- nvme: do not update multipath disk information if the controller is down (bcs#1171558 bsc#1159058).\n- nvme-fc: print proper nvme-fc devloss_tmo value (bsc#1172391).\n- objtool: Add is_static_jump() helper (bsc#1169514).\n- objtool: Add relocation check for alternative sections (bsc#1169514).\n- objtool: Clean instruction state before each function validation (bsc#1169514).\n- objtool: Fix stack offset tracking for indirect CFAs (bsc#1169514).\n- objtool: Fix switch table detection in .text.unlikely (bsc#1169514).\n- objtool: Ignore empty alternatives (bsc#1169514).\n- objtool: Make BP scratch register warning more robust (bsc#1169514).\n- OMAP: DSS2: remove non-zero check on variable r (bsc#1114279)\n- overflow: Fix -Wtype-limits compilation warnings (git fixes).\n- overflow.h: Add arithmetic shift helper (git fixes).\n- p54usb: add AirVasT USB stick device-id (bsc#1051510).\n- padata: Remove broken queue flushing (git-fixes).\n- Partially revert \u0027kfifo: fix kfifo_alloc() and kfifo_init()\u0027 (git fixes (block drivers)).\n- PCI: Allow pci_resize_resource() for devices on root bus (bsc#1051510).\n- PCI: Fix pci_register_host_bridge() device_register() error handling (bsc#1051510).\n- PCI: Program MPS for RCiEP devices (bsc#1051510).\n- PCI/PTM: Inherit Switch Downstream Port PTM settings from Upstream Port (bsc#1051510).\n- perf: Allocate context task_ctx_data for child event (git-fixes).\n- perf/cgroup: Fix perf cgroup hierarchy support (git-fixes).\n- perf: Copy parent\u0027s address filter offsets on clone (git-fixes).\n- perf/core: Add sanity check to deal with pinned event failure (git-fixes).\n- perf/core: Avoid freeing static PMU contexts when PMU is unregistered (git-fixes).\n- perf/core: Correct event creation with PERF_FORMAT_GROUP (git-fixes).\n- perf/core: Do not WARN() for impossible ring-buffer sizes (git-fixes).\n- perf/core: Fix crash when using HW tracing kernel filters (git-fixes).\n- perf/core: Fix ctx_event_type in ctx_resched() (git-fixes).\n- perf/core: Fix error handling in perf_event_alloc() (git-fixes).\n- perf/core: Fix exclusive events\u0027 grouping (git-fixes).\n- perf/core: Fix group scheduling with mixed hw and sw events (git-fixes).\n- perf/core: Fix impossible ring-buffer sizes warning (git-fixes).\n- perf/core: Fix locking for children siblings group read (git-fixes).\n- perf/core: Fix perf_event_read_value() locking (git-fixes).\n- perf/core: Fix perf_pmu_unregister() locking (git-fixes).\n- perf/core: Fix perf_sample_regs_user() mm check (git-fixes).\n- perf/core: Fix possible Spectre-v1 indexing for -\u003eaux_pages (git-fixes).\n- perf/core: Fix race between close() and fork() (git-fixes).\n- perf/core: Fix the address filtering fix (git-fixes).\n- perf/core: Fix use-after-free in uprobe_perf_close() (git-fixes).\n- perf/core: Force USER_DS when recording user stack data (git-fixes).\n- perf/core: Restore mmap record type correctly (git-fixes).\n- perf: Fix header.size for namespace events (git-fixes).\n- perf/ioctl: Add check for the sample_period value (git-fixes).\n- perf, pt, coresight: Fix address filters for vmas with non-zero offset (git-fixes).\n- perf: Return proper values for user stack errors (git-fixes).\n- perf/x86/amd: Constrain Large Increment per Cycle events (git-fixes).\n- perf/x86/amd/ibs: Fix reading of the IBS OpData register and thus precise RIP validity (git-fixes).\n- perf/x86/amd/ibs: Fix sample bias for dispatched micro-ops (git-fixes).\n- perf/x86/amd/ibs: Handle erratum #420 only on the affected CPU family (10h) (git-fixes).\n- perf/x86/amd/iommu: Make the \u0027amd_iommu_attr_groups\u0027 symbol static (git-fixes).\n- perf/x86/amd/uncore: Do not set \u0027ThreadMask\u0027 and \u0027SliceMask\u0027 for non-L3 PMCs (git-fixes stable).\n- perf/x86/amd/uncore: Set the thread mask for F17h L3 PMCs (git-fixes).\n- perf/x86/amd/uncore: Set ThreadMask and SliceMask for L3 Cache perf events (git-fixes stable).\n- perf/x86: Enable free running PEBS for REGS_USER/INTR (git-fixes).\n- perf/x86: Fix incorrect PEBS_REGS (git-fixes).\n- perf/x86/intel: Add generic branch tracing check to intel_pmu_has_bts() (git-fixes).\n- perf/x86/intel: Add proper condition to run sched_task callbacks (git-fixes).\n- perf/x86/intel/bts: Fix the use of page_private() (git-fixes).\n- perf/x86/intel: Fix PT PMI handling (git-fixes).\n- perf/x86/intel: Move branch tracing setup to the Intel-specific source file (git-fixes).\n- perf/x86/intel/uncore: Add Node ID mask (git-fixes).\n- perf/x86/intel/uncore: Fix PCI BDF address of M3UPI on SKX (git-fixes).\n- perf/x86/uncore: Fix event group support (git-fixes).\n- pid: Improve the comment about waiting in zap_pid_ns_processes (git fixes)).\n- pinctrl: baytrail: Enable pin configuration setting for GPIO chip (git-fixes).\n- pinctrl: cherryview: Add missing spinlock usage in chv_gpio_irq_handler (git-fixes).\n- pinctrl: freescale: imx: Fix an error handling path in \u0027imx_pinctrl_probe()\u0027 (bsc#1051510).\n- pinctrl: imxl: Fix an error handling path in \u0027imx1_pinctrl_core_probe()\u0027 (bsc#1051510).\n- pinctrl: samsung: Save/restore eint_mask over suspend for EINT_TYPE GPIOs (bsc#1051510).\n- platform/x86: asus-nb-wmi: Do not load on Asus T100TA and T200TA (bsc#1051510).\n- pNFS: Ensure we do clear the return-on-close layout stateid on fatal errors (git-fixes).\n- pnp: Use list_for_each_entry() instead of open coding (git fixes).\n- powerpc/64s: Do not let DT CPU features set FSCR_DSCR (bsc#1065729).\n- powerpc/64s: Save FSCR to init_task.thread.fscr after feature init (bsc#1065729).\n- powerpc: Add attributes for setjmp/longjmp (bsc#1065729).\n- powerpc/pci/of: Parse unassigned resources (bsc#1065729).\n- powerpc/setup_64: Set cache-line-size based on cache-block-size (bsc#1065729).\n- powerpc/sstep: Fix DS operand in ld encoding to appropriate value (bsc#1065729).\n- powerpc/xive: Clear the page tables for the ESB IO mapping (bsc#1085030).\n- power: supply: bq24257_charger: Replace depends on REGMAP_I2C with select (bsc#1051510).\n- power: supply: lp8788: Fix an error handling path in \u0027lp8788_charger_probe()\u0027 (bsc#1051510).\n- power: supply: smb347-charger: IRQSTAT_D is volatile (bsc#1051510).\n- qede: Fix race between rdma destroy workqueue and link change event (networking-stable-20_03_01).\n- r8152: check disconnect status after long sleep (networking-stable-20_03_14).\n- raid5: remove gfp flags from scribble_alloc() (git fixes (block drivers)).\n- raid6/ppc: Fix build for clang (git fixes (block drivers)).\n- rcu: locking and unlocking need to always be at least barriers (git fixes (block drivers)).\n- RDMA/ipoib: Fix use of sizeof() (bsc#1168503).\n- RDMA/netdev: Fix netlink support in IPoIB (bsc#1168503).\n- RDMA/netdev: Hoist alloc_netdev_mqs out of the driver (bsc#1168503).\n- RDMA/netdev: Use priv_destructor for netdev cleanup (bsc#1168503).\n- README.BRANCH: Replace Matt Fleming with Davidlohr Bueso as maintainer.\n- Revert \u0027dm crypt: use WQ_HIGHPRI for the IO and crypt workqueues\u0027 (git fixes (block drivers)).\n- Revert \u0027drm/panel: simple: Add support for Sharp LQ150X1LG11 panels\u0027 (bsc#1114279) \t* offset changes\n- Revert \u0027ipc,sem: remove uneeded sem_undo_list lock usage in exit_sem()\u0027 (bsc#1172221).\n- Revert \u0027tools lib traceevent: Remove unneeded qsort and uses memmove\u0027\n- rpm/kernel-docs.spec.in: Require python-packaging for build.\n- rtlwifi: Fix a double free in _rtl_usb_tx_urb_setup() (bsc#1051510).\n- s390/bpf: Maintain 8-byte stack alignment (bsc#1169194).\n- s390/cio: avoid duplicated \u0027ADD\u0027 uevents (git-fixes).\n- s390/cio: generate delayed uevent for vfio-ccw subchannels (git-fixes).\n- s390/cpuinfo: fix wrong output when CPU0 is offline (git-fixes).\n- s390/diag: fix display of diagnose call statistics (git-fixes).\n- s390: fix syscall_get_error for compat processes (git-fixes).\n- s390/ftrace: fix potential crashes when switching tracers (git-fixes).\n- s390/gmap: return proper error code on ksm unsharing (git-fixes).\n- s390/ism: fix error return code in ism_probe() (git-fixes).\n- s390/pci: Fix possible deadlock in recover_store() (bsc#1165183 LTC#184103).\n- s390/pci: Recover handle in clp_set_pci_fn() (bsc#1165183 LTC#184103).\n- s390/qdio: consistently restore the IRQ handler (git-fixes).\n- s390/qdio: lock device while installing IRQ handler (git-fixes).\n- s390/qdio: put thinint indicator after early error (git-fixes).\n- s390/qdio: tear down thinint indicator after early error (git-fixes).\n- s390/qeth: cancel RX reclaim work earlier (git-fixes).\n- s390/qeth: do not return -ENOTSUPP to userspace (git-fixes).\n- s390/qeth: do not warn for napi with 0 budget (git-fixes).\n- s390/qeth: fix error handling for isolation mode cmds (git-fixes).\n- s390/qeth: fix off-by-one in RX copybreak check (git-fixes).\n- s390/qeth: fix promiscuous mode after reset (git-fixes).\n- s390/qeth: fix qdio teardown after early init error (git-fixes).\n- s390/qeth: handle error due to unsupported transport mode (git-fixes).\n- s390/qeth: handle error when backing RX buffer (git-fixes).\n- s390/qeth: lock the card while changing its hsuid (git-fixes).\n- s390/qeth: support net namespaces for L3 devices (git-fixes).\n- s390/time: Fix clk type in get_tod_clock (git-fixes).\n- scripts/decodecode: fix trapping instruction formatting (bsc#1065729).\n- scripts/dtc: Remove redundant YYLOC global declaration (bsc#1160388).\n- scsi: bnx2i: fix potential use after free (bsc#1171600).\n- scsi: core: Handle drivers which set sg_tablesize to zero (bsc#1171601) This commit also required: \u003e scsi: core: avoid preallocating big SGL for data\n- scsi: core: save/restore command resid for error handling (bsc#1171602).\n- scsi: core: scsi_trace: Use get_unaligned_be*() (bsc#1171604).\n- scsi: core: try to get module before removing device (bsc#1171605).\n- scsi: csiostor: Adjust indentation in csio_device_reset (bsc#1171606).\n- scsi: csiostor: Do not enable IRQs too early (bsc#1171607).\n- scsi: esas2r: unlock on error in esas2r_nvram_read_direct() (bsc#1171608).\n- scsi: fnic: fix invalid stack access (bsc#1171609).\n- scsi: fnic: fix msix interrupt allocation (bsc#1171610).\n- scsi: ibmvscsi: Do not send host info in adapter info MAD after LPM (bsc#1172759 ltc#184814).\n- scsi: ibmvscsi: Fix WARN_ON during event pool release (bsc#1170791 ltc#185128).\n- scsi: iscsi: Avoid potential deadlock in iscsi_if_rx func (bsc#1171611).\n- scsi: iscsi: Fix a potential deadlock in the timeout handler (bsc#1171612).\n- scsi: iscsi: qla4xxx: fix double free in probe (bsc#1171613).\n- scsi: lpfc: fix: Coverity: lpfc_cmpl_els_rsp(): Null pointer dereferences (bsc#1171614).\n- scsi: lpfc: Fix crash in target side cable pulls hitting WAIT_FOR_UNREG (bsc#1171615).\n- scsi: megaraid_sas: Do not initiate OCR if controller is not in ready state (bsc#1171616).\n- scsi: qedf: Add port_id getter (bsc#1150660).\n- scsi: qla2xxx: add ring buffer for tracing debug logs (bsc#1157169).\n- scsi: qla2xxx: check UNLOADING before posting async work (bsc#1157169).\n- scsi: qla2xxx: Delete all sessions before unregister local nvme port (bsc#1157169).\n- scsi: qla2xxx: Do not log message when reading port speed via sysfs (bsc#1157169).\n- scsi: qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV (bsc#1157169).\n- scsi: qla2xxx: Fix regression warnings (bsc#1157169).\n- scsi: qla2xxx: Remove non functional code (bsc#1157169).\n- scsi: qla2xxx: Set NVMe status code for failed NVMe FCP request (bsc#1158983).\n- scsi: qla2xxx: set UNLOADING before waiting for session deletion (bsc#1157169).\n- scsi: qla4xxx: Adjust indentation in qla4xxx_mem_free (bsc#1171617).\n- scsi: qla4xxx: fix double free bug (bsc#1171618).\n- scsi: sd: Clear sdkp-\u003eprotection_type if disk is reformatted without PI (bsc#1171619).\n- scsi: sg: add sg_remove_request in sg_common_write (bsc#1171620).\n- scsi: tracing: Fix handling of TRANSFER LENGTH == 0 for READ(6) and WRITE(6) (bsc#1171621).\n- scsi: ufs: change msleep to usleep_range (bsc#1171622).\n- scsi: ufs: Clean up ufshcd_scale_clks() and clock scaling error out path (bsc#1171623).\n- scsi: ufs: Fix ufshcd_hold() caused scheduling while atomic (bsc#1171624).\n- scsi: ufs: Fix ufshcd_probe_hba() reture value in case ufshcd_scsi_add_wlus() fails (bsc#1171625).\n- scsi: ufs: Recheck bkops level if bkops is disabled (bsc#1171626).\n- scsi: zfcp: fix missing erp_lock in port recovery trigger for point-to-point (git-fixes).\n- sctp: fix possibly using a bad saddr with a given dst (networking-stable-20_04_02).\n- sctp: fix refcount bug in sctp_wfree (networking-stable-20_04_02).\n- sctp: move the format error check out of __sctp_sf_do_9_1_abort (networking-stable-20_03_01).\n- seq_file: fix problem when seeking mid-record (bsc#1170125).\n- serial: uartps: Move the spinlock after the read of the tx empty (git-fixes).\n- sfc: detach from cb_page in efx_copy_channel() (networking-stable-20_03_14).\n- signal/pid_namespace: Fix reboot_pid_ns to use send_sig not force_sig (bsc#1172185).\n- slcan: not call free_netdev before rtnl_unlock in slcan_open (networking-stable-20_03_28).\n- slip: make slhc_compress() more robust against malicious packets (networking-stable-20_03_14).\n- smb3: Additional compression structures (bsc#1144333).\n- smb3: Add new compression flags (bsc#1144333).\n- smb3: change noisy error message to FYI (bsc#1144333).\n- smb3: enable swap on SMB3 mounts (bsc#1144333).\n- smb3: Minor cleanup of protocol definitions (bsc#1144333).\n- smb3: remove overly noisy debug line in signing errors (bsc#1144333).\n- smb3: smbdirect support can be configured by default (bsc#1144333).\n- smb3: use SMB2_SIGNATURE_SIZE define (bsc#1144333).\n- spi: bcm2835: Fix 3-wire mode if DMA is enabled (git-fixes).\n- spi: bcm63xx-hsspi: Really keep pll clk enabled (bsc#1051510).\n- spi: bcm-qspi: when tx/rx buffer is NULL set to 0 (bsc#1051510).\n- spi: dw: Add SPI Rx-done wait method to DMA-based transfer (bsc#1051510).\n- spi: dw: Add SPI Tx-done wait method to DMA-based transfer (bsc#1051510).\n- spi: dw: use \u0027smp_mb()\u0027 to avoid sending spi data error (bsc#1051510).\n- spi: dw: Zero DMA Tx and Rx configurations on stack (bsc#1051510).\n- spi: fsl: do not map irq during probe (git-fixes).\n- spi: fsl: use platform_get_irq() instead of of_irq_to_resource() (git-fixes).\n- spi: pxa2xx: Add CS control clock quirk (bsc#1051510).\n- spi: qup: call spi_qup_pm_resume_runtime before suspending (bsc#1051510).\n- spi: spi-fsl-dspi: Replace interruptible wait queue with a simple completion (git-fixes).\n- spi: spi-s3c64xx: Fix system resume support (git-fixes).\n- spi/zynqmp: remove entry that causes a cs glitch (bsc#1051510).\n- staging: comedi: dt2815: fix writing hi byte of analog output (bsc#1051510).\n- staging: comedi: Fix comedi_device refcnt leak in comedi_open (bsc#1051510).\n- staging: iio: ad2s1210: Fix SPI reading (bsc#1051510).\n- staging: rtl8712: Fix IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK (bsc#1051510).\n- staging: sm750fb: add missing case while setting FB_VISUAL (bsc#1051510).\n- staging: vt6656: Do not set RCR_MULTICAST or RCR_BROADCAST by default (git-fixes).\n- staging: vt6656: Fix drivers TBTT timing counter (git-fixes).\n- staging: vt6656: Fix pairwise key entry save (git-fixes).\n- sunrpc: expiry_time should be seconds not timeval (git-fixes).\n- SUNRPC: Fix a potential buffer overflow in \u0027svc_print_xprts()\u0027 (git-fixes).\n- SUNRPC: The TCP back channel mustn\u0027t disappear while requests are outstanding (bsc#1152624).\n- supported.conf: Add br_netfilter to base (bsc#1169020).\n- svcrdma: Fix leak of transport addresses (git-fixes).\n- taskstats: fix data-race (bsc#1172188).\n- tcp: cache line align MAX_TCP_HEADER (networking-stable-20_04_27).\n- tcp: repair: fix TCP_QUEUE_SEQ implementation (networking-stable-20_03_28).\n- team: add missing attribute validation for array index (networking-stable-20_03_14).\n- team: add missing attribute validation for port ifindex (networking-stable-20_03_14).\n- team: fix hang in team_mode_get() (networking-stable-20_04_27).\n- tools lib traceevent: Remove unneeded qsort and uses memmove instead (git-fixes).\n- tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send() (bsc#1065729).\n- tpm/tpm_tis: Free IRQ if probing fails (bsc#1082555).\n- tpm/tpm_tis: Free IRQ if probing fails (git-fixes).\n- tracing: Add a vmalloc_sync_mappings() for safe measure (git-fixes).\n- tracing: Disable trace_printk() on post poned tests (git-fixes).\n- tracing: Fix event trigger to accept redundant spaces (git-fixes).\n- tracing: Fix the race between registering \u0027snapshot\u0027 event trigger and triggering \u0027snapshot\u0027 operation (git-fixes).\n- tty: n_gsm: Fix bogus i++ in gsm_data_kick (bsc#1051510).\n- tty: n_gsm: Fix SOF skipping (bsc#1051510).\n- tty: n_gsm: Fix waking up upper tty layer when room available (bsc#1051510).\n- tty: rocket, avoid OOB access (git-fixes).\n- UAS: fix deadlock in error handling and PM flushing work (git-fixes).\n- UAS: no use logging any details in case of ENODEV (git-fixes).\n- USB: Add USB_QUIRK_DELAY_CTRL_MSG and USB_QUIRK_DELAY_INIT for Corsair K70 RGB RAPIDFIRE (git-fixes).\n- USB: cdc-acm: restore capability check order (git-fixes).\n- USB: core: Fix misleading driver bug report (bsc#1051510).\n- USB: dwc2: gadget: move gadget resume after the core is in L0 state (bsc#1051510).\n- USB: dwc3: do not set gadget-\u003eis_otg flag (git-fixes).\n- USB: dwc3: gadget: Do link recovery for SS and SSP (git-fixes).\n- USB: early: Handle AMD\u0027s spec-compliant identifiers, too (git-fixes).\n- USB: f_fs: Clear OS Extended descriptor counts to zero in ffs_data_reset() (git-fixes).\n- USB: gadget: audio: Fix a missing error return value in audio_bind() (git-fixes).\n- USB: gadget: composite: Inform controller driver of self-powered (git-fixes).\n- USB: gadget: legacy: fix error return code in cdc_bind() (git-fixes).\n- USB: gadget: legacy: fix error return code in gncm_bind() (git-fixes).\n- USB: gadget: legacy: fix redundant initialization warnings (bsc#1051510).\n- USB: gadget: lpc32xx_udc: do not dereference ep pointer before null check (bsc#1051510).\n- USB: gadget: net2272: Fix a memory leak in an error handling path in \u0027net2272_plat_probe()\u0027 (git-fixes).\n- USB: gadget: udc: atmel: Fix vbus disconnect handling (git-fixes).\n- USB: gadget: udc: atmel: Make some symbols static (git-fixes).\n- USB: gadget: udc: bdc: Remove unnecessary NULL checks in bdc_req_complete (git-fixes).\n- USB: gadget: udc: s3c2410_udc: Remove pointless NULL check in s3c2410_udc_nuke (bsc#1051510).\n- USB: host: ehci-mxc: Add error handling in ehci_mxc_drv_probe() (bsc#1051510).\n- USB: host: xhci-plat: keep runtime active when removing host (git-fixes).\n- USB: hub: Fix handling of connect changes during sleep (git-fixes).\n- USB: musb: Fix runtime PM imbalance on error (bsc#1051510).\n- USB: musb: start session in resume for host port (bsc#1051510).\n- usbnet: silence an unnecessary warning (bsc#1170770).\n- USB: serial: garmin_gps: add sanity checking for data length (git-fixes).\n- USB: serial: option: add BroadMobi BM806U (git-fixes).\n- USB: serial: option: add support for ASKEY WWHC050 (git-fixes).\n- USB: serial: option: add Telit LE910C1-EUX compositions (bsc#1051510).\n- USB: serial: option: add Wistron Neweb D19Q1 (git-fixes).\n- USB: serial: qcserial: add DW5816e QDL support (bsc#1051510).\n- USB: serial: qcserial: Add DW5816e support (git-fixes).\n- USB: serial: usb_wwan: do not resubmit rx urb on fatal errors (bsc#1051510).\n- USB: serial: usb_wwan: do not resubmit rx urb on fatal errors (git-fixes).\n- USB: sisusbvga: Change port variable from signed to unsigned (git-fixes).\n- USB-storage: Add unusual_devs entry for JMicron JMS566 (git-fixes).\n- USB: uas: add quirk for LaCie 2Big Quadra (git-fixes).\n- USB: xhci: Fix NULL pointer dereference when enqueuing trbs from urb sg list (git-fixes).\n- video: fbdev: sis: Remove unnecessary parentheses and commented code (bsc#1114279)\n- video: fbdev: w100fb: Fix a potential double free (bsc#1051510).\n- virtio-blk: handle block_device_operations callbacks after hot unplug (git fixes (block drivers)).\n- vmxnet3: add geneve and vxlan tunnel offload support (bsc#1172484).\n- vmxnet3: add support to get/set rx flow hash (bsc#1172484).\n- vmxnet3: allow rx flow hash ops only when rss is enabled (bsc#1172484).\n- vmxnet3: avoid format strint overflow warning (bsc#1172484).\n- vmxnet3: prepare for version 4 changes (bsc#1172484).\n- vmxnet3: Remove always false conditional statement (bsc#1172484).\n- vmxnet3: remove redundant initialization of pointer \u0027rq\u0027 (bsc#1172484).\n- vmxnet3: remove unused flag \u0027rxcsum\u0027 from struct vmxnet3_adapter (bsc#1172484).\n- vmxnet3: Replace msleep(1) with usleep_range() (bsc#1172484).\n- vmxnet3: update to version 4 (bsc#1172484).\n- vmxnet3: use correct hdr reference when packet is encapsulated (bsc#1172484).\n- vrf: Check skb for XFRM_TRANSFORMED flag (networking-stable-20_04_27).\n- vt: ioctl, switch VT_IS_IN_USE and VT_BUSY to inlines (git-fixes).\n- vt: selection, introduce vc_is_sel (git-fixes).\n- vt: vt_ioctl: fix race in VT_RESIZEX (git-fixes).\n- vt: vt_ioctl: fix use-after-free in vt_in_use() (git-fixes).\n- vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console (git-fixes).\n- vxlan: check return value of gro_cells_init() (networking-stable-20_03_28).\n- w1: omap-hdq: cleanup to add missing newline for some dev_dbg (bsc#1051510).\n- watchdog: reset last_hw_keepalive time at start (git-fixes).\n- wcn36xx: Fix error handling path in \u0027wcn36xx_probe()\u0027 (bsc#1051510).\n- wil6210: remove reset file from debugfs (git-fixes).\n- wimax/i2400m: Fix potential urb refcnt leak (bsc#1051510).\n- work around mvfs bug (bsc#1162063).\n- workqueue: do not use wq_select_unbound_cpu() for bound works (bsc#1172130).\n- x86/cpu/amd: Make erratum #1054 a legacy erratum (bsc#1114279).\n- x86/entry/64: Fix unwind hints in kernel exit path (bsc#1058115).\n- x86/entry/64: Fix unwind hints in register clearing code (bsc#1058115).\n- x86/entry/64: Fix unwind hints in rewind_stack_do_exit() (bsc#1058115).\n- x86/entry/64: Fix unwind hints in __switch_to_asm() (bsc#1058115).\n- x86/events/intel/ds: Add PERF_SAMPLE_PERIOD into PEBS_FREERUNNING_FLAGS (git-fixes).\n- x86: Fix early boot crash on gcc-10, third try (bsc#1114279).\n- x86/Hyper-V: Allow guests to enable InvariantTSC (bsc#1170620).\n- x86/Hyper-V: Free hv_panic_page when fail to register kmsg dump (bsc#1170618).\n- x86/Hyper-V: Report crash data in die() when panic_on_oops is set (bsc#1170618).\n- x86/Hyper-V: Report crash register data or kmsg before running crash kernel (bsc#1170618).\n- x86/Hyper-V: Report crash register data when sysctl_record_panic_msg is not set (bsc#1170618).\n- x86/Hyper-V: report value of misc_features (git-fixes).\n- x86/Hyper-V: Trigger crash enlightenment only once during system crash (bsc#1170618).\n- x86/Hyper-V: Unload vmbus channel in hv panic callback (bsc#1170618).\n- x86/kprobes: Avoid kretprobe recursion bug (bsc#1114279).\n- x86/{mce,mm}: Unmap the entire page if the whole page is affected and poisoned (bsc#1172257).\n- x86/reboot/quirks: Add MacBook6,1 reboot quirk (bsc#1114279).\n- x86/resctrl: Fix invalid attempt at removing the default resource group (git-fixes).\n- x86/resctrl: Preserve CDP enable over CPU hotplug (bsc#1114279).\n- x86/unwind/orc: Do not skip the first frame for inactive tasks (bsc#1058115).\n- x86/unwind/orc: Fix error handling in __unwind_start() (bsc#1058115).\n- x86/unwind/orc: Fix error path for bad ORC entry type (bsc#1058115).\n- x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks (bsc#1058115).\n- x86/unwind/orc: Prevent unwinding before ORC initialization (bsc#1058115).\n- x86/unwind: Prevent false warnings for non-current tasks (bsc#1058115).\n- x86/xen: fix booting 32-bit pv guest (bsc#1071995).\n- x86/xen: Make the boot CPU idle task reliable (bsc#1071995).\n- x86/xen: Make the secondary CPU idle tasks reliable (bsc#1071995).\n- xen/pci: reserve MCFG areas earlier (bsc#1170145).\n- xfrm: Always set XFRM_TRANSFORMED in xfrm{4,6}_output_finish (networking-stable-20_04_27).\n- xfrm: fix error in comment (git fixes).\n- xfs: Correctly invert xfs_buftarg LRU isolation logic (git-fixes).\n- xfs: do not ever return a stale pointer from __xfs_dir3_free_read (git-fixes).\n- xprtrdma: Fix completion wait during device removal (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-2156,SUSE-SLE-RT-12-SP4-2020-2156", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2156-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:2156-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20202156-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:2156-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1058115", "url": "https://bugzilla.suse.com/1058115" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1082555", "url": "https://bugzilla.suse.com/1082555" }, { "category": "self", "summary": "SUSE Bug 1085030", "url": "https://bugzilla.suse.com/1085030" }, { "category": "self", "summary": "SUSE Bug 1089895", "url": "https://bugzilla.suse.com/1089895" }, { "category": "self", "summary": "SUSE Bug 1104967", "url": "https://bugzilla.suse.com/1104967" }, { "category": "self", "summary": "SUSE Bug 1111666", "url": "https://bugzilla.suse.com/1111666" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1133021", "url": "https://bugzilla.suse.com/1133021" }, { "category": "self", "summary": "SUSE Bug 1144333", "url": "https://bugzilla.suse.com/1144333" }, { "category": "self", "summary": "SUSE Bug 1148868", "url": "https://bugzilla.suse.com/1148868" }, { "category": "self", "summary": "SUSE Bug 1150660", "url": "https://bugzilla.suse.com/1150660" }, { "category": "self", "summary": "SUSE Bug 1151794", "url": "https://bugzilla.suse.com/1151794" }, { "category": "self", "summary": "SUSE Bug 1152107", "url": "https://bugzilla.suse.com/1152107" }, { "category": "self", "summary": "SUSE Bug 1152489", "url": "https://bugzilla.suse.com/1152489" }, { "category": "self", "summary": "SUSE Bug 1152624", "url": "https://bugzilla.suse.com/1152624" }, { "category": "self", "summary": "SUSE Bug 1154824", "url": "https://bugzilla.suse.com/1154824" }, { "category": "self", "summary": "SUSE Bug 1157169", "url": "https://bugzilla.suse.com/1157169" }, { "category": "self", "summary": "SUSE Bug 1158265", "url": "https://bugzilla.suse.com/1158265" }, { "category": "self", "summary": "SUSE Bug 1158983", "url": "https://bugzilla.suse.com/1158983" }, { "category": "self", "summary": "SUSE Bug 1159058", "url": "https://bugzilla.suse.com/1159058" }, { "category": "self", "summary": "SUSE Bug 1159199", "url": "https://bugzilla.suse.com/1159199" }, { "category": "self", "summary": "SUSE Bug 1160388", "url": "https://bugzilla.suse.com/1160388" }, { "category": "self", "summary": "SUSE Bug 1160947", "url": "https://bugzilla.suse.com/1160947" }, { "category": "self", "summary": "SUSE Bug 1161016", "url": "https://bugzilla.suse.com/1161016" }, { "category": "self", "summary": "SUSE Bug 1162002", "url": "https://bugzilla.suse.com/1162002" }, { "category": "self", "summary": "SUSE Bug 1162063", "url": "https://bugzilla.suse.com/1162063" }, { "category": "self", "summary": "SUSE Bug 1165183", "url": "https://bugzilla.suse.com/1165183" }, { "category": "self", "summary": "SUSE Bug 1165741", "url": "https://bugzilla.suse.com/1165741" }, { "category": "self", "summary": "SUSE Bug 1166969", "url": "https://bugzilla.suse.com/1166969" }, { "category": "self", "summary": "SUSE Bug 1167574", "url": "https://bugzilla.suse.com/1167574" }, { "category": "self", "summary": "SUSE Bug 1167851", "url": "https://bugzilla.suse.com/1167851" }, { "category": "self", "summary": "SUSE Bug 1168081", "url": "https://bugzilla.suse.com/1168081" }, { "category": "self", "summary": "SUSE Bug 1168503", "url": "https://bugzilla.suse.com/1168503" }, { "category": "self", "summary": "SUSE Bug 1168670", "url": "https://bugzilla.suse.com/1168670" }, { "category": "self", "summary": "SUSE Bug 1169020", "url": "https://bugzilla.suse.com/1169020" }, { "category": "self", "summary": "SUSE Bug 1169194", "url": "https://bugzilla.suse.com/1169194" }, { "category": "self", "summary": "SUSE Bug 1169514", "url": "https://bugzilla.suse.com/1169514" }, { "category": "self", "summary": "SUSE Bug 1169525", "url": "https://bugzilla.suse.com/1169525" }, { "category": "self", "summary": "SUSE Bug 1169625", "url": "https://bugzilla.suse.com/1169625" }, { "category": "self", "summary": "SUSE Bug 1169795", "url": "https://bugzilla.suse.com/1169795" }, { "category": "self", "summary": "SUSE Bug 1170011", "url": "https://bugzilla.suse.com/1170011" }, { "category": "self", "summary": "SUSE Bug 1170056", "url": "https://bugzilla.suse.com/1170056" }, { "category": "self", "summary": "SUSE Bug 1170125", "url": "https://bugzilla.suse.com/1170125" }, { "category": "self", "summary": "SUSE Bug 1170145", "url": "https://bugzilla.suse.com/1170145" }, { "category": "self", "summary": "SUSE Bug 1170345", "url": "https://bugzilla.suse.com/1170345" }, { "category": "self", "summary": "SUSE Bug 1170457", "url": "https://bugzilla.suse.com/1170457" }, { "category": "self", "summary": "SUSE Bug 1170522", "url": "https://bugzilla.suse.com/1170522" }, { "category": "self", "summary": "SUSE Bug 1170592", "url": "https://bugzilla.suse.com/1170592" }, { "category": "self", "summary": "SUSE Bug 1170618", "url": "https://bugzilla.suse.com/1170618" }, { "category": "self", "summary": "SUSE Bug 1170620", "url": "https://bugzilla.suse.com/1170620" }, { "category": "self", "summary": "SUSE Bug 1170770", "url": "https://bugzilla.suse.com/1170770" }, { "category": "self", "summary": "SUSE Bug 1170778", "url": "https://bugzilla.suse.com/1170778" }, { "category": "self", "summary": "SUSE Bug 1170791", "url": "https://bugzilla.suse.com/1170791" }, { "category": "self", "summary": "SUSE Bug 1170901", "url": "https://bugzilla.suse.com/1170901" }, { "category": "self", "summary": "SUSE Bug 1171078", "url": "https://bugzilla.suse.com/1171078" }, { "category": "self", "summary": "SUSE Bug 1171098", "url": "https://bugzilla.suse.com/1171098" }, { "category": "self", "summary": "SUSE Bug 1171118", "url": "https://bugzilla.suse.com/1171118" }, { "category": "self", "summary": "SUSE Bug 1171124", "url": "https://bugzilla.suse.com/1171124" }, { "category": "self", "summary": "SUSE Bug 1171189", "url": "https://bugzilla.suse.com/1171189" }, { "category": "self", "summary": "SUSE Bug 1171191", "url": "https://bugzilla.suse.com/1171191" }, { "category": "self", "summary": "SUSE Bug 1171195", "url": "https://bugzilla.suse.com/1171195" }, { "category": "self", "summary": "SUSE Bug 1171202", "url": "https://bugzilla.suse.com/1171202" }, { "category": "self", "summary": "SUSE Bug 1171205", "url": "https://bugzilla.suse.com/1171205" }, { "category": "self", "summary": "SUSE Bug 1171217", "url": "https://bugzilla.suse.com/1171217" }, { "category": "self", "summary": "SUSE Bug 1171218", "url": "https://bugzilla.suse.com/1171218" }, { "category": "self", "summary": "SUSE Bug 1171219", "url": "https://bugzilla.suse.com/1171219" }, { "category": "self", "summary": "SUSE Bug 1171220", "url": "https://bugzilla.suse.com/1171220" }, { "category": "self", "summary": "SUSE Bug 1171293", "url": "https://bugzilla.suse.com/1171293" }, { "category": "self", "summary": "SUSE Bug 1171417", "url": "https://bugzilla.suse.com/1171417" }, { "category": "self", "summary": "SUSE Bug 1171424", "url": "https://bugzilla.suse.com/1171424" }, { "category": "self", "summary": "SUSE Bug 1171527", "url": "https://bugzilla.suse.com/1171527" }, { "category": "self", "summary": "SUSE Bug 1171558", "url": "https://bugzilla.suse.com/1171558" }, { "category": "self", "summary": "SUSE Bug 1171599", "url": "https://bugzilla.suse.com/1171599" }, { "category": "self", "summary": "SUSE Bug 1171600", "url": "https://bugzilla.suse.com/1171600" }, { "category": "self", "summary": "SUSE Bug 1171601", "url": "https://bugzilla.suse.com/1171601" }, { "category": "self", "summary": "SUSE Bug 1171602", "url": "https://bugzilla.suse.com/1171602" }, { "category": "self", "summary": "SUSE Bug 1171604", "url": "https://bugzilla.suse.com/1171604" }, { "category": "self", "summary": "SUSE Bug 1171605", "url": "https://bugzilla.suse.com/1171605" }, { "category": "self", "summary": "SUSE Bug 1171606", "url": "https://bugzilla.suse.com/1171606" }, { "category": "self", "summary": "SUSE Bug 1171607", "url": "https://bugzilla.suse.com/1171607" }, { "category": "self", "summary": "SUSE Bug 1171608", "url": "https://bugzilla.suse.com/1171608" }, { "category": "self", "summary": "SUSE Bug 1171609", "url": "https://bugzilla.suse.com/1171609" }, { "category": "self", "summary": "SUSE Bug 1171610", "url": "https://bugzilla.suse.com/1171610" }, { "category": "self", "summary": "SUSE Bug 1171611", "url": "https://bugzilla.suse.com/1171611" }, { "category": "self", "summary": "SUSE Bug 1171612", "url": "https://bugzilla.suse.com/1171612" }, { "category": "self", "summary": "SUSE Bug 1171613", "url": "https://bugzilla.suse.com/1171613" }, { "category": "self", "summary": "SUSE Bug 1171614", "url": "https://bugzilla.suse.com/1171614" }, { "category": "self", "summary": "SUSE Bug 1171615", "url": "https://bugzilla.suse.com/1171615" }, { "category": "self", "summary": "SUSE Bug 1171616", "url": "https://bugzilla.suse.com/1171616" }, { "category": "self", "summary": "SUSE Bug 1171617", "url": "https://bugzilla.suse.com/1171617" }, { "category": "self", "summary": "SUSE Bug 1171618", "url": "https://bugzilla.suse.com/1171618" }, { "category": "self", "summary": "SUSE Bug 1171619", "url": "https://bugzilla.suse.com/1171619" }, { "category": "self", "summary": "SUSE Bug 1171620", "url": "https://bugzilla.suse.com/1171620" }, { "category": "self", "summary": "SUSE Bug 1171621", "url": "https://bugzilla.suse.com/1171621" }, { "category": "self", "summary": "SUSE Bug 1171622", "url": "https://bugzilla.suse.com/1171622" }, { "category": "self", "summary": "SUSE Bug 1171623", "url": "https://bugzilla.suse.com/1171623" }, { "category": "self", "summary": "SUSE Bug 1171624", "url": "https://bugzilla.suse.com/1171624" }, { "category": "self", "summary": "SUSE Bug 1171625", "url": "https://bugzilla.suse.com/1171625" }, { "category": "self", "summary": "SUSE Bug 1171626", "url": "https://bugzilla.suse.com/1171626" }, { "category": "self", "summary": "SUSE Bug 1171673", "url": "https://bugzilla.suse.com/1171673" }, { "category": "self", "summary": "SUSE Bug 1171679", "url": "https://bugzilla.suse.com/1171679" }, { "category": "self", "summary": "SUSE Bug 1171691", "url": "https://bugzilla.suse.com/1171691" }, { "category": "self", "summary": "SUSE Bug 1171694", "url": "https://bugzilla.suse.com/1171694" }, { "category": "self", "summary": "SUSE Bug 1171695", "url": "https://bugzilla.suse.com/1171695" }, { "category": "self", "summary": "SUSE Bug 1171736", "url": "https://bugzilla.suse.com/1171736" }, { "category": "self", "summary": "SUSE Bug 1171761", "url": "https://bugzilla.suse.com/1171761" }, { "category": "self", "summary": "SUSE Bug 1171868", "url": "https://bugzilla.suse.com/1171868" }, { "category": "self", "summary": "SUSE Bug 1171904", "url": "https://bugzilla.suse.com/1171904" }, { "category": "self", "summary": "SUSE Bug 1171948", "url": "https://bugzilla.suse.com/1171948" }, { "category": "self", "summary": "SUSE Bug 1171949", "url": "https://bugzilla.suse.com/1171949" }, { "category": "self", "summary": "SUSE Bug 1171951", "url": "https://bugzilla.suse.com/1171951" }, { "category": "self", "summary": "SUSE Bug 1171952", "url": "https://bugzilla.suse.com/1171952" }, { "category": "self", "summary": "SUSE Bug 1171982", "url": "https://bugzilla.suse.com/1171982" }, { "category": "self", "summary": "SUSE Bug 1171983", "url": "https://bugzilla.suse.com/1171983" }, { "category": "self", "summary": "SUSE Bug 1172096", "url": "https://bugzilla.suse.com/1172096" }, { "category": "self", "summary": "SUSE Bug 1172097", "url": "https://bugzilla.suse.com/1172097" }, { "category": "self", "summary": "SUSE Bug 1172098", "url": "https://bugzilla.suse.com/1172098" }, { "category": "self", "summary": "SUSE Bug 1172099", "url": "https://bugzilla.suse.com/1172099" }, { "category": "self", "summary": "SUSE Bug 1172101", "url": "https://bugzilla.suse.com/1172101" }, { "category": "self", "summary": "SUSE Bug 1172102", "url": "https://bugzilla.suse.com/1172102" }, { "category": "self", "summary": "SUSE Bug 1172103", "url": "https://bugzilla.suse.com/1172103" }, { "category": "self", "summary": "SUSE Bug 1172104", "url": "https://bugzilla.suse.com/1172104" }, { "category": "self", "summary": "SUSE Bug 1172127", "url": "https://bugzilla.suse.com/1172127" }, { "category": "self", "summary": "SUSE Bug 1172130", "url": "https://bugzilla.suse.com/1172130" }, { "category": "self", "summary": "SUSE Bug 1172185", "url": "https://bugzilla.suse.com/1172185" }, { "category": "self", "summary": "SUSE Bug 1172188", "url": "https://bugzilla.suse.com/1172188" }, { "category": "self", "summary": "SUSE Bug 1172199", "url": "https://bugzilla.suse.com/1172199" }, { "category": "self", "summary": "SUSE Bug 1172221", "url": "https://bugzilla.suse.com/1172221" }, { "category": "self", "summary": "SUSE Bug 1172253", "url": "https://bugzilla.suse.com/1172253" }, { "category": "self", "summary": "SUSE Bug 1172257", "url": "https://bugzilla.suse.com/1172257" }, { "category": "self", "summary": "SUSE Bug 1172317", "url": "https://bugzilla.suse.com/1172317" }, { "category": "self", "summary": "SUSE Bug 1172342", "url": "https://bugzilla.suse.com/1172342" }, { "category": "self", "summary": "SUSE Bug 1172343", "url": "https://bugzilla.suse.com/1172343" }, { "category": "self", "summary": "SUSE Bug 1172344", "url": "https://bugzilla.suse.com/1172344" }, { "category": "self", "summary": "SUSE Bug 1172366", "url": "https://bugzilla.suse.com/1172366" }, { "category": "self", "summary": "SUSE Bug 1172391", "url": "https://bugzilla.suse.com/1172391" }, { "category": "self", "summary": "SUSE Bug 1172397", "url": "https://bugzilla.suse.com/1172397" }, { "category": "self", "summary": "SUSE Bug 1172453", "url": "https://bugzilla.suse.com/1172453" }, { "category": "self", "summary": "SUSE Bug 1172458", "url": "https://bugzilla.suse.com/1172458" }, { "category": "self", "summary": "SUSE Bug 1172484", "url": "https://bugzilla.suse.com/1172484" }, { "category": "self", "summary": "SUSE Bug 1172759", "url": "https://bugzilla.suse.com/1172759" }, { "category": "self", "summary": "SUSE Bug 1172775", "url": "https://bugzilla.suse.com/1172775" }, { "category": "self", "summary": "SUSE Bug 1172781", "url": "https://bugzilla.suse.com/1172781" }, { "category": "self", "summary": "SUSE Bug 1172782", "url": "https://bugzilla.suse.com/1172782" }, { "category": "self", "summary": "SUSE Bug 1172783", "url": "https://bugzilla.suse.com/1172783" }, { "category": "self", "summary": "SUSE Bug 1172999", "url": "https://bugzilla.suse.com/1172999" }, { "category": "self", "summary": "SUSE Bug 1173265", "url": "https://bugzilla.suse.com/1173265" }, { "category": "self", "summary": "SUSE Bug 1173280", "url": "https://bugzilla.suse.com/1173280" }, { "category": "self", "summary": "SUSE Bug 1173428", "url": "https://bugzilla.suse.com/1173428" }, { "category": "self", "summary": "SUSE Bug 1173462", "url": "https://bugzilla.suse.com/1173462" }, { "category": "self", "summary": "SUSE Bug 1173659", "url": "https://bugzilla.suse.com/1173659" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1000199 page", "url": "https://www.suse.com/security/cve/CVE-2018-1000199/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16746 page", "url": "https://www.suse.com/security/cve/CVE-2019-16746/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19462 page", "url": "https://www.suse.com/security/cve/CVE-2019-19462/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20806 page", "url": "https://www.suse.com/security/cve/CVE-2019-20806/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20810 page", "url": "https://www.suse.com/security/cve/CVE-2019-20810/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20812 page", "url": "https://www.suse.com/security/cve/CVE-2019-20812/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9455 page", "url": "https://www.suse.com/security/cve/CVE-2019-9455/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0543 page", "url": "https://www.suse.com/security/cve/CVE-2020-0543/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10690 page", "url": "https://www.suse.com/security/cve/CVE-2020-10690/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10711 page", "url": "https://www.suse.com/security/cve/CVE-2020-10711/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10720 page", "url": "https://www.suse.com/security/cve/CVE-2020-10720/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10732 page", "url": "https://www.suse.com/security/cve/CVE-2020-10732/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10751 page", "url": "https://www.suse.com/security/cve/CVE-2020-10751/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10757 page", "url": "https://www.suse.com/security/cve/CVE-2020-10757/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10766 page", "url": "https://www.suse.com/security/cve/CVE-2020-10766/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10767 page", "url": "https://www.suse.com/security/cve/CVE-2020-10767/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10768 page", "url": "https://www.suse.com/security/cve/CVE-2020-10768/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10769 page", "url": "https://www.suse.com/security/cve/CVE-2020-10769/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10773 page", "url": "https://www.suse.com/security/cve/CVE-2020-10773/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12114 page", "url": "https://www.suse.com/security/cve/CVE-2020-12114/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12464 page", "url": "https://www.suse.com/security/cve/CVE-2020-12464/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12652 page", "url": "https://www.suse.com/security/cve/CVE-2020-12652/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12653 page", "url": "https://www.suse.com/security/cve/CVE-2020-12653/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12654 page", "url": "https://www.suse.com/security/cve/CVE-2020-12654/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12655 page", "url": "https://www.suse.com/security/cve/CVE-2020-12655/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12656 page", "url": "https://www.suse.com/security/cve/CVE-2020-12656/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12657 page", "url": "https://www.suse.com/security/cve/CVE-2020-12657/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12769 page", "url": "https://www.suse.com/security/cve/CVE-2020-12769/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12888 page", "url": "https://www.suse.com/security/cve/CVE-2020-12888/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-13143 page", "url": "https://www.suse.com/security/cve/CVE-2020-13143/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-13974 page", "url": "https://www.suse.com/security/cve/CVE-2020-13974/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14416 page", "url": "https://www.suse.com/security/cve/CVE-2020-14416/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-08-06T18:03:08Z", "generator": { "date": "2020-08-06T18:03:08Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:2156-1", "initial_release_date": "2020-08-06T18:03:08Z", "revision_history": [ { "date": "2020-08-06T18:03:08Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-rt-4.12.14-8.23.1.noarch", "product": { "name": "kernel-devel-rt-4.12.14-8.23.1.noarch", "product_id": "kernel-devel-rt-4.12.14-8.23.1.noarch" } }, { "category": "product_version", "name": "kernel-source-rt-4.12.14-8.23.1.noarch", "product": { "name": "kernel-source-rt-4.12.14-8.23.1.noarch", "product_id": "kernel-source-rt-4.12.14-8.23.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "product": { "name": "cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "product_id": "cluster-md-kmp-rt-4.12.14-8.23.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt-4.12.14-8.23.1.x86_64", "product": { "name": "dlm-kmp-rt-4.12.14-8.23.1.x86_64", "product_id": "dlm-kmp-rt-4.12.14-8.23.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "product": { "name": "gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "product_id": "gfs2-kmp-rt-4.12.14-8.23.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-4.12.14-8.23.1.x86_64", "product": { "name": "kernel-rt-4.12.14-8.23.1.x86_64", "product_id": "kernel-rt-4.12.14-8.23.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-base-4.12.14-8.23.1.x86_64", "product": { "name": "kernel-rt-base-4.12.14-8.23.1.x86_64", "product_id": "kernel-rt-base-4.12.14-8.23.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-4.12.14-8.23.1.x86_64", "product": { "name": "kernel-rt-devel-4.12.14-8.23.1.x86_64", "product_id": "kernel-rt-devel-4.12.14-8.23.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "product": { "name": "kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "product_id": "kernel-rt_debug-devel-4.12.14-8.23.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-4.12.14-8.23.1.x86_64", "product": { "name": "kernel-syms-rt-4.12.14-8.23.1.x86_64", "product_id": "kernel-syms-rt-4.12.14-8.23.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt-4.12.14-8.23.1.x86_64", "product": { "name": "ocfs2-kmp-rt-4.12.14-8.23.1.x86_64", "product_id": "ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Real Time 12 SP4", "product": { "name": "SUSE Linux Enterprise Real Time 12 SP4", "product_id": "SUSE Linux Enterprise Real Time 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-linux-enterprise-rt:12:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-rt-4.12.14-8.23.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4", "product_id": "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64" }, "product_reference": "cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-rt-4.12.14-8.23.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4", "product_id": "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64" }, "product_reference": "dlm-kmp-rt-4.12.14-8.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-rt-4.12.14-8.23.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4", "product_id": "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64" }, "product_reference": "gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-rt-4.12.14-8.23.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP4", "product_id": "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch" }, "product_reference": "kernel-devel-rt-4.12.14-8.23.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-4.12.14-8.23.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4", "product_id": "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64" }, "product_reference": "kernel-rt-4.12.14-8.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-base-4.12.14-8.23.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4", "product_id": "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64" }, "product_reference": "kernel-rt-base-4.12.14-8.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-4.12.14-8.23.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4", "product_id": "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64" }, "product_reference": "kernel-rt-devel-4.12.14-8.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-devel-4.12.14-8.23.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4", "product_id": "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64" }, "product_reference": "kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-4.12.14-8.23.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP4", "product_id": "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch" }, "product_reference": "kernel-source-rt-4.12.14-8.23.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-4.12.14-8.23.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4", "product_id": "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64" }, "product_reference": "kernel-syms-rt-4.12.14-8.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-rt-4.12.14-8.23.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4", "product_id": "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" }, "product_reference": "ocfs2-kmp-rt-4.12.14-8.23.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-1000199", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1000199" } ], "notes": [ { "category": "general", "text": "The Linux Kernel version 3.18 contains a dangerous feature vulnerability in modify_user_hw_breakpoint() that can result in crash and possibly memory corruption. This attack appear to be exploitable via local code execution and the ability to use ptrace. This vulnerability appears to have been fixed in git commit f67b15037a7a50c57f72e69a6d59941ad90a0f0f.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1000199", "url": "https://www.suse.com/security/cve/CVE-2018-1000199" }, { "category": "external", "summary": "SUSE Bug 1089895 for CVE-2018-1000199", "url": "https://bugzilla.suse.com/1089895" }, { "category": "external", "summary": "SUSE Bug 1090036 for CVE-2018-1000199", "url": "https://bugzilla.suse.com/1090036" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "important" } ], "title": "CVE-2018-1000199" }, { "cve": "CVE-2019-16746", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16746" } ], "notes": [ { "category": "general", "text": "An issue was discovered in net/wireless/nl80211.c in the Linux kernel through 5.2.17. It does not check the length of variable elements in a beacon head, leading to a buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16746", "url": "https://www.suse.com/security/cve/CVE-2019-16746" }, { "category": "external", "summary": "SUSE Bug 1152107 for CVE-2019-16746", "url": "https://bugzilla.suse.com/1152107" }, { "category": "external", "summary": "SUSE Bug 1173659 for CVE-2019-16746", "url": "https://bugzilla.suse.com/1173659" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "moderate" } ], "title": "CVE-2019-16746" }, { "cve": "CVE-2019-19462", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19462" } ], "notes": [ { "category": "general", "text": "relay_open in kernel/relay.c in the Linux kernel through 5.4.1 allows local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19462", "url": "https://www.suse.com/security/cve/CVE-2019-19462" }, { "category": "external", "summary": "SUSE Bug 1158265 for CVE-2019-19462", "url": "https://bugzilla.suse.com/1158265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "low" } ], "title": "CVE-2019-19462" }, { "cve": "CVE-2019-20806", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20806" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.2. There is a NULL pointer dereference in tw5864_handle_frame() in drivers/media/pci/tw5864/tw5864-video.c, which may cause denial of service, aka CID-2e7682ebfc75.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20806", "url": "https://www.suse.com/security/cve/CVE-2019-20806" }, { "category": "external", "summary": "SUSE Bug 1172199 for CVE-2019-20806", "url": "https://bugzilla.suse.com/1172199" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "low" } ], "title": "CVE-2019-20806" }, { "cve": "CVE-2019-20810", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20810" } ], "notes": [ { "category": "general", "text": "go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel before 5.6 does not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20810", "url": "https://www.suse.com/security/cve/CVE-2019-20810" }, { "category": "external", "summary": "SUSE Bug 1172458 for CVE-2019-20810", "url": "https://bugzilla.suse.com/1172458" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "low" } ], "title": "CVE-2019-20810" }, { "cve": "CVE-2019-20812", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20812" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.4.7. The prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20812", "url": "https://www.suse.com/security/cve/CVE-2019-20812" }, { "category": "external", "summary": "SUSE Bug 1172453 for CVE-2019-20812", "url": "https://bugzilla.suse.com/1172453" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "moderate" } ], "title": "CVE-2019-20812" }, { "cve": "CVE-2019-9455", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9455" } ], "notes": [ { "category": "general", "text": "In the Android kernel in the video driver there is a kernel pointer leak due to a WARN_ON statement. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9455", "url": "https://www.suse.com/security/cve/CVE-2019-9455" }, { "category": "external", "summary": "SUSE Bug 1170345 for CVE-2019-9455", "url": "https://bugzilla.suse.com/1170345" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "moderate" } ], "title": "CVE-2019-9455" }, { "cve": "CVE-2020-0543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0543" } ], "notes": [ { "category": "general", "text": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0543", "url": "https://www.suse.com/security/cve/CVE-2020-0543" }, { "category": "external", "summary": "SUSE Bug 1154824 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1154824" }, { "category": "external", "summary": "SUSE Bug 1172205 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172205" }, { "category": "external", "summary": "SUSE Bug 1172206 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172206" }, { "category": "external", "summary": "SUSE Bug 1172207 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172207" }, { "category": "external", "summary": "SUSE Bug 1172770 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1172770" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2020-0543", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "moderate" } ], "title": "CVE-2020-0543" }, { "cve": "CVE-2020-10690", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10690" } ], "notes": [ { "category": "general", "text": "There is a use-after-free in kernel versions before 5.5 due to a race condition between the release of ptp_clock and cdev while resource deallocation. When a (high privileged) process allocates a ptp device file (like /dev/ptpX) and voluntarily goes to sleep. During this time if the underlying device is removed, it can cause an exploitable condition as the process wakes up to terminate and clean all attached files. The system crashes due to the cdev structure being invalid (as already freed) which is pointed to by the inode.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10690", "url": "https://www.suse.com/security/cve/CVE-2020-10690" }, { "category": "external", "summary": "SUSE Bug 1170056 for CVE-2020-10690", "url": "https://bugzilla.suse.com/1170056" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "moderate" } ], "title": "CVE-2020-10690" }, { "cve": "CVE-2020-10711", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10711" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s SELinux subsystem in versions before 5.7. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol\u0027s category bitmap into the SELinux extensible bitmap via the\u0027 ebitmap_netlbl_import\u0027 routine. While processing the CIPSO restricted bitmap tag in the \u0027cipso_v4_parsetag_rbm\u0027 routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allows a remote network user to crash the system kernel, resulting in a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10711", "url": "https://www.suse.com/security/cve/CVE-2020-10711" }, { "category": "external", "summary": "SUSE Bug 1171191 for CVE-2020-10711", "url": "https://bugzilla.suse.com/1171191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "moderate" } ], "title": "CVE-2020-10711" }, { "cve": "CVE-2020-10720", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10720" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of GRO in versions before 5.2. This flaw allows an attacker with local access to crash the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10720", "url": "https://www.suse.com/security/cve/CVE-2020-10720" }, { "category": "external", "summary": "SUSE Bug 1170778 for CVE-2020-10720", "url": "https://bugzilla.suse.com/1170778" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "moderate" } ], "title": "CVE-2020-10720" }, { "cve": "CVE-2020-10732", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10732" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10732", "url": "https://www.suse.com/security/cve/CVE-2020-10732" }, { "category": "external", "summary": "SUSE Bug 1171220 for CVE-2020-10732", "url": "https://bugzilla.suse.com/1171220" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "low" } ], "title": "CVE-2020-10732" }, { "cve": "CVE-2020-10751", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10751" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10751", "url": "https://www.suse.com/security/cve/CVE-2020-10751" }, { "category": "external", "summary": "SUSE Bug 1171189 for CVE-2020-10751", "url": "https://bugzilla.suse.com/1171189" }, { "category": "external", "summary": "SUSE Bug 1174963 for CVE-2020-10751", "url": "https://bugzilla.suse.com/1174963" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "moderate" } ], "title": "CVE-2020-10751" }, { "cve": "CVE-2020-10757", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10757" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10757", "url": "https://www.suse.com/security/cve/CVE-2020-10757" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172317 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1172317" }, { "category": "external", "summary": "SUSE Bug 1172437 for CVE-2020-10757", "url": "https://bugzilla.suse.com/1172437" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "important" } ], "title": "CVE-2020-10757" }, { "cve": "CVE-2020-10766", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10766" } ], "notes": [ { "category": "general", "text": "A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10766", "url": "https://www.suse.com/security/cve/CVE-2020-10766" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172781 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1172781" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "moderate" } ], "title": "CVE-2020-10766" }, { "cve": "CVE-2020-10767", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10767" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10767", "url": "https://www.suse.com/security/cve/CVE-2020-10767" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172782 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1172782" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "moderate" } ], "title": "CVE-2020-10767" }, { "cve": "CVE-2020-10768", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10768" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10768", "url": "https://www.suse.com/security/cve/CVE-2020-10768" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172783 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1172783" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "moderate" } ], "title": "CVE-2020-10768" }, { "cve": "CVE-2020-10769", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10769" } ], "notes": [ { "category": "general", "text": "A buffer over-read flaw was found in RH kernel versions before 5.0 in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm\u0027s module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash. This flaw allows a local attacker with user privileges to cause a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10769", "url": "https://www.suse.com/security/cve/CVE-2020-10769" }, { "category": "external", "summary": "SUSE Bug 1173265 for CVE-2020-10769", "url": "https://bugzilla.suse.com/1173265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "moderate" } ], "title": "CVE-2020-10769" }, { "cve": "CVE-2020-10773", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10773" } ], "notes": [ { "category": "general", "text": "A stack information leak flaw was found in s390/s390x in the Linux kernel\u0027s memory manager functionality, where it incorrectly writes to the /proc/sys/vm/cmm_timeout file. This flaw allows a local user to see the kernel data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10773", "url": "https://www.suse.com/security/cve/CVE-2020-10773" }, { "category": "external", "summary": "SUSE Bug 1172999 for CVE-2020-10773", "url": "https://bugzilla.suse.com/1172999" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "low" } ], "title": "CVE-2020-10773" }, { "cve": "CVE-2020-12114", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12114" } ], "notes": [ { "category": "general", "text": "A pivot_root race condition in fs/namespace.c in the Linux kernel 4.4.x before 4.4.221, 4.9.x before 4.9.221, 4.14.x before 4.14.178, 4.19.x before 4.19.119, and 5.x before 5.3 allows local users to cause a denial of service (panic) by corrupting a mountpoint reference counter.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12114", "url": "https://www.suse.com/security/cve/CVE-2020-12114" }, { "category": "external", "summary": "SUSE Bug 1171098 for CVE-2020-12114", "url": "https://bugzilla.suse.com/1171098" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "moderate" } ], "title": "CVE-2020-12114" }, { "cve": "CVE-2020-12464", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12464" } ], "notes": [ { "category": "general", "text": "usb_sg_cancel in drivers/usb/core/message.c in the Linux kernel before 5.6.8 has a use-after-free because a transfer occurs without a reference, aka CID-056ad39ee925.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12464", "url": "https://www.suse.com/security/cve/CVE-2020-12464" }, { "category": "external", "summary": "SUSE Bug 1170901 for CVE-2020-12464", "url": "https://bugzilla.suse.com/1170901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 1.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "low" } ], "title": "CVE-2020-12464" }, { "cve": "CVE-2020-12652", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12652" } ], "notes": [ { "category": "general", "text": "The __mptctl_ioctl function in drivers/message/fusion/mptctl.c in the Linux kernel before 5.4.14 allows local users to hold an incorrect lock during the ioctl operation and trigger a race condition, i.e., a \"double fetch\" vulnerability, aka CID-28d76df18f0a. NOTE: the vendor states \"The security impact of this bug is not as bad as it could have been because these operations are all privileged and root already has enormous destructive power.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12652", "url": "https://www.suse.com/security/cve/CVE-2020-12652" }, { "category": "external", "summary": "SUSE Bug 1171218 for CVE-2020-12652", "url": "https://bugzilla.suse.com/1171218" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "moderate" } ], "title": "CVE-2020-12652" }, { "cve": "CVE-2020-12653", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12653" } ], "notes": [ { "category": "general", "text": "An issue was found in Linux kernel before 5.5.4. The mwifiex_cmd_append_vsie_tlv() function in drivers/net/wireless/marvell/mwifiex/scan.c allows local users to gain privileges or cause a denial of service because of an incorrect memcpy and buffer overflow, aka CID-b70261a288ea.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12653", "url": "https://www.suse.com/security/cve/CVE-2020-12653" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-12653", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1171195 for CVE-2020-12653", "url": "https://bugzilla.suse.com/1171195" }, { "category": "external", "summary": "SUSE Bug 1171254 for CVE-2020-12653", "url": "https://bugzilla.suse.com/1171254" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "important" } ], "title": "CVE-2020-12653" }, { "cve": "CVE-2020-12654", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12654" } ], "notes": [ { "category": "general", "text": "An issue was found in Linux kernel before 5.5.4. mwifiex_ret_wmm_get_status() in drivers/net/wireless/marvell/mwifiex/wmm.c allows a remote AP to trigger a heap-based buffer overflow because of an incorrect memcpy, aka CID-3a9b153c5591.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12654", "url": "https://www.suse.com/security/cve/CVE-2020-12654" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-12654", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1171202 for CVE-2020-12654", "url": "https://bugzilla.suse.com/1171202" }, { "category": "external", "summary": "SUSE Bug 1171252 for CVE-2020-12654", "url": "https://bugzilla.suse.com/1171252" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "important" } ], "title": "CVE-2020-12654" }, { "cve": "CVE-2020-12655", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12655" } ], "notes": [ { "category": "general", "text": "An issue was discovered in xfs_agf_verify in fs/xfs/libxfs/xfs_alloc.c in the Linux kernel through 5.6.10. Attackers may trigger a sync of excessive duration via an XFS v5 image with crafted metadata, aka CID-d0c7feaf8767.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12655", "url": "https://www.suse.com/security/cve/CVE-2020-12655" }, { "category": "external", "summary": "SUSE Bug 1171217 for CVE-2020-12655", "url": "https://bugzilla.suse.com/1171217" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "moderate" } ], "title": "CVE-2020-12655" }, { "cve": "CVE-2020-12656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12656" } ], "notes": [ { "category": "general", "text": "gss_mech_free in net/sunrpc/auth_gss/gss_mech_switch.c in the rpcsec_gss_krb5 implementation in the Linux kernel through 5.6.10 lacks certain domain_release calls, leading to a memory leak. Note: This was disputed with the assertion that the issue does not grant any access not already available. It is a problem that on unloading a specific kernel module some memory is leaked, but loading kernel modules is a privileged operation. A user could also write a kernel module to consume any amount of memory they like and load that replicating the effect of this bug", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12656", "url": "https://www.suse.com/security/cve/CVE-2020-12656" }, { "category": "external", "summary": "SUSE Bug 1171219 for CVE-2020-12656", "url": "https://bugzilla.suse.com/1171219" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "low" } ], "title": "CVE-2020-12656" }, { "cve": "CVE-2020-12657", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12657" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.6.5. There is a use-after-free in block/bfq-iosched.c related to bfq_idle_slice_timer_body.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12657", "url": "https://www.suse.com/security/cve/CVE-2020-12657" }, { "category": "external", "summary": "SUSE Bug 1171205 for CVE-2020-12657", "url": "https://bugzilla.suse.com/1171205" }, { "category": "external", "summary": "SUSE Bug 1201585 for CVE-2020-12657", "url": "https://bugzilla.suse.com/1201585" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "important" } ], "title": "CVE-2020-12657" }, { "cve": "CVE-2020-12769", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12769" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.4.17. drivers/spi/spi-dw.c allows attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one, aka CID-19b61392c5a8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12769", "url": "https://www.suse.com/security/cve/CVE-2020-12769" }, { "category": "external", "summary": "SUSE Bug 1171983 for CVE-2020-12769", "url": "https://bugzilla.suse.com/1171983" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "moderate" } ], "title": "CVE-2020-12769" }, { "cve": "CVE-2020-12888", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12888" } ], "notes": [ { "category": "general", "text": "The VFIO PCI driver in the Linux kernel through 5.6.13 mishandles attempts to access disabled memory space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12888", "url": "https://www.suse.com/security/cve/CVE-2020-12888" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1171868 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1171868" }, { "category": "external", "summary": "SUSE Bug 1176979 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1176979" }, { "category": "external", "summary": "SUSE Bug 1179612 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1179612" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "moderate" } ], "title": "CVE-2020-12888" }, { "cve": "CVE-2020-13143", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-13143" } ], "notes": [ { "category": "general", "text": "gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c in the Linux kernel 3.16 through 5.6.13 relies on kstrdup without considering the possibility of an internal \u0027\\0\u0027 value, which allows attackers to trigger an out-of-bounds read, aka CID-15753588bcd4.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-13143", "url": "https://www.suse.com/security/cve/CVE-2020-13143" }, { "category": "external", "summary": "SUSE Bug 1171982 for CVE-2020-13143", "url": "https://bugzilla.suse.com/1171982" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "moderate" } ], "title": "CVE-2020-13143" }, { "cve": "CVE-2020-13974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-13974" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel 4.4 through 5.7.1. drivers/tty/vt/keyboard.c has an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. NOTE: Members in the community argue that the integer overflow does not lead to a security issue in this case.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-13974", "url": "https://www.suse.com/security/cve/CVE-2020-13974" }, { "category": "external", "summary": "SUSE Bug 1172775 for CVE-2020-13974", "url": "https://bugzilla.suse.com/1172775" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "moderate" } ], "title": "CVE-2020-13974" }, { "cve": "CVE-2020-14416", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14416" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.4.16, a race condition in tty-\u003edisc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14416", "url": "https://www.suse.com/security/cve/CVE-2020-14416" }, { "category": "external", "summary": "SUSE Bug 1162002 for CVE-2020-14416", "url": "https://bugzilla.suse.com/1162002" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.23.1.noarch", "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.23.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.23.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-06T18:03:08Z", "details": "moderate" } ], "title": "CVE-2020-14416" } ] }
suse-su-2020:2107-1
Vulnerability from csaf_suse
Published
2020-08-03 14:45
Modified
2020-08-03 14:45
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-15780: A lockdown bypass for loading unsigned modules using ACPI table injection was fixed. (bsc#1173573)
- CVE-2020-15393: Fixed a memory leak in usbtest_disconnect (bnc#1173514).
- CVE-2020-12771: An issue was discovered in btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails (bnc#1171732).
- CVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).
- CVE-2020-10773: Fixed a memory leak on s390/s390x, in the cmm_timeout_hander in file arch/s390/mm/cmm.c (bnc#1172999).
- CVE-2020-14416: Fixed a race condition in tty->disc_data handling in the slip and slcan line discipline could lead to a use-after-free. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).
- CVE-2020-10768: Fixed an issue with the prctl() function, where indirect branch speculation could be enabled even though it was diabled before (bnc#1172783).
- CVE-2020-10766: Fixed an issue which allowed an attacker with a local account to disable SSBD protection (bnc#1172781).
- CVE-2020-10767: Fixed an issue where Indirect Branch Prediction Barrier was disabled in certain circumstances, leaving the system open to a spectre v2 style attack (bnc#1172782).
- CVE-2020-13974: Fixed a integer overflow in drivers/tty/vt/keyboard.c, if k_ascii is called several times in a row (bnc#1172775).
- CVE-2020-0305: Fixed a possible use-after-free due to a race condition incdev_get of char_dev.c. This could lead to local escalation of privilege. User interaction is not needed for exploitation (bnc#1174462).
- CVE-2020-10769: A buffer over-read flaw was found in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm's module, authenc. This flaw allowed a local attacker with user privileges to cause a denial of service (bnc#1173265).
- CVE-2020-10781: Fixed a denial of service issue in the ZRAM implementation (bnc#1173074).
- CVE-2019-20908: Fixed incorrect access permissions for the efivar_ssdt ACPI variable, which could be used by attackers to bypass lockdown or secure boot restrictions (bnc#1173567).
- CVE-2019-20810: Fixed a memory leak in go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c because it did not call snd_card_free for a failure path (bnc#1172458).
- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c, related to invalid length checks for variable elements in a beacon head (bnc#1152107).
The following non-security bugs were fixed:
- ACPI: GED: add support for _Exx / _Lxx handler methods (bsc#1111666).
- ACPI: GED: use correct trigger type field in _Exx / _Lxx handling (bsc#1111666).
- ACPI: NFIT: Fix unlock on error in scrub_show() (bsc#1171753).
- ACPI: PM: Avoid using power resources if there are none for D0 (bsc#1051510).
- ACPI: sysfs: Fix pm_profile_attr type (bsc#1111666).
- ACPI: video: Use native backlight on Acer Aspire 5783z (bsc#1111666).
- ACPI: video: Use native backlight on Acer TravelMate 5735Z (bsc#1111666).
- ALSA: es1688: Add the missed snd_card_free() (bsc#1051510).
- ALSA: hda: Add ElkhartLake HDMI codec vid (bsc#1111666).
- ALSA: hda: add sienna_cichlid audio asic id for sienna_cichlid up (bsc#1111666).
- ALSA: hda/hdmi - enable runtime pm for newer AMD display audio (bsc#1111666).
- ALSA: hda - let hs_mic be picked ahead of hp_mic (bsc#1111666).
- ALSA: hda/realtek - add a pintbl quirk for several Lenovo machines (bsc#1111666).
- ALSA: hda/realtek - Add LED class support for micmute LED (bsc#1111666).
- ALSA: hda/realtek - Enable micmute LED on and HP system (bsc#1111666).
- ALSA: hda/realtek - Enable Speaker for ASUS UX533 and UX534 (bsc#1111666).
- ALSA: hda/realtek - Fix unused variable warning w/o CONFIG_LEDS_TRIGGER_AUDIO (bsc#1111666).
- ALSA: hda/realtek - Introduce polarity for micmute LED GPIO (bsc#1111666).
- ALSA: lx6464es - add support for LX6464ESe pci express variant (bsc#1111666).
- ALSA: opl3: fix infoleak in opl3 (bsc#1111666).
- ALSA: pcm: disallow linking stream to itself (bsc#1111666).
- ALSA: usb-audio: Add duplex sound support for USB devices using implicit feedback (bsc#1111666).
- ALSA: usb-audio: Add Pioneer DJ DJM-900NXS2 support (bsc#1111666).
- ALSA: usb-audio: add quirk for MacroSilicon MS2109 (bsc#1111666).
- ALSA: usb-audio: Add vendor, product and profile name for HP Thunderbolt Dock (bsc#1111666).
- ALSA: usb-audio: Clean up quirk entries with macros (bsc#1111666).
- ALSA: usb-audio: Fix inconsistent card PM state after resume (bsc#1111666).
- ALSA: usb-audio: Fix packet size calculation (bsc#1111666).
- ALSA: usb-audio: Fix racy list management in output queue (bsc#1111666).
- ALSA: usb-audio: Improve frames size computation (bsc#1111666).
- ALSA: usb-audio: Manage auto-pm of all bundled interfaces (bsc#1111666).
- ALSA: usb-audio: Use the new macro for HP Dock rename quirks (bsc#1111666).
- amdgpu: a NULL ->mm does not mean a thread is a kthread (git-fixes).
- arm64: map FDT as RW for early_init_dt_scan() (jsc#SLE-12423).
- ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb (bsc#1111666).
- ath9k: Fix use-after-free Read in ath9k_wmi_ctrl_rx (bsc#1111666).
- ath9k: Fix use-after-free Write in ath9k_htc_rx_msg (bsc#1111666).
- ath9x: Fix stack-out-of-bounds Write in ath9k_hif_usb_rx_cb (bsc#1111666).
- ax25: fix setsockopt(SO_BINDTODEVICE) (networking-stable-20_05_27).
- b43: Fix connection problem with WPA3 (bsc#1111666).
- b43_legacy: Fix connection problem with WPA3 (bsc#1111666).
- bcache: Fix an error code in bch_dump_read() (git fixes (block drivers)).
- be2net: fix link failure after ethtool offline test (git-fixes).
- block: nr_sects_write(): Disable preemption on seqcount write (bsc#1173818).
- block: remove QUEUE_FLAG_STACKABLE (git fixes (block drivers)).
- block: sed-opal: fix sparse warning: convert __be64 data (git fixes (block drivers)).
- Bluetooth: Add SCO fallback for invalid LMP parameters error (bsc#1111666).
- bnxt_en: Fix AER reset logic on 57500 chips (git-fixes).
- bnxt_en: Fix ethtool selftest crash under error conditions (git-fixes).
- bnxt_en: Fix handling FRAG_ERR when NVM_INSTALL_UPDATE cmd fails (git-fixes).
- bnxt_en: Fix ipv6 RFS filter matching logic (git-fixes).
- bnxt_en: fix NULL dereference in case SR-IOV configuration fails (git-fixes).
- bnxt_en: Fix VF anti-spoof filter setup (networking-stable-20_05_12).
- bnxt_en: Fix VLAN acceleration handling in bnxt_fix_features() (networking-stable-20_05_12).
- bnxt_en: Improve AER slot reset (networking-stable-20_05_12).
- brcmfmac: fix wrong location to get firmware feature (bsc#1111666).
- brcmfmac: Transform compatible string for FW loading (bsc#1169771).
- btrfs: add assertions for tree == inode->io_tree to extent IO helpers (bsc#1174438).
- btrfs: add new helper btrfs_lock_and_flush_ordered_range (bsc#1174438).
- btrfs: Always use a cached extent_state in btrfs_lock_and_flush_ordered_range (bsc#1174438).
- btrfs: do not zero f_bavail if we have available space (bsc#1168081).
- btrfs: do not zero f_bavail if we have available space (bsc#1168081).
- btrfs: drop argument tree from btrfs_lock_and_flush_ordered_range (bsc#1174438).
- btrfs: fix extent_state leak in btrfs_lock_and_flush_ordered_range (bsc#1174438).
- btrfs: fix failure of RWF_NOWAIT write into prealloc extent beyond eof (bsc#1174438).
- btrfs: fix hang on snapshot creation after RWF_NOWAIT write (bsc#1174438).
- btrfs: fix RWF_NOWAIT write not failling when we need to cow (bsc#1174438).
- btrfs: fix RWF_NOWAIT writes blocking on extent locks and waiting for IO (bsc#1174438).
- btrfs: qgroup: Fix a bug that prevents qgroup to be re-enabled after disable (bsc#1172247).
- btrfs: Return EAGAIN if we can't start no snpashot write in check_can_nocow (bsc#1174438).
- btrfs: use correct count in btrfs_file_write_iter() (bsc#1174438).
- btrfs: Use newly introduced btrfs_lock_and_flush_ordered_range (bsc#1174438).
- btrfs: volumes: Remove ENOSPC-prone btrfs_can_relocate() (bsc#1171124).
- bus: sunxi-rsb: Return correct data when mixing 16-bit and 8-bit reads (bsc#1111666).
- carl9170: remove P2P_GO support (bsc#1111666).
- CDC-ACM: heed quirk also in error handling (git-fixes).
- ceph: convert mdsc->cap_dirty to a per-session list (bsc#1167104).
- ceph: request expedited service on session's last cap flush (bsc#1167104).
- cgroup, blkcg: Prepare some symbols for module and !CONFIG_CGROUP usages (bsc#1173857).
- char/random: Add a newline at the end of the file (jsc#SLE-12423).
- cifs: get rid of unused parameter in reconn_setup_dfs_targets() (bsc#1144333).
- cifs: handle hostnames that resolve to same ip in failover (bsc#1144333 bsc#1161016).
- cifs: set up next DFS target before generic_ip_connect() (bsc#1144333 bsc#1161016).
- clk: bcm2835: Fix return type of bcm2835_register_gate (bsc#1051510).
- clk: clk-flexgen: fix clock-critical handling (bsc#1051510).
- clk: sunxi: Fix incorrect usage of round_down() (bsc#1051510).
- clocksource: dw_apb_timer: Make CPU-affiliation being optional (bsc#1111666).
- compat_ioctl: block: handle BLKREPORTZONE/BLKRESETZONE (git fixes (block drivers)).
- compat_ioctl: block: handle Persistent Reservations (git fixes (block drivers)).
- copy_{to,from}_user(): consolidate object size checks (git fixes).
- crypto: algboss - do not wait during notifier callback (bsc#1111666).
- crypto: algif_skcipher - Cap recv SG list at ctx->used (bsc#1111666).
- crypto: caam - update xts sector size for large input length (bsc#1111666).
- crypto: cavium/nitrox - Fix 'nitrox_get_first_device()' when ndevlist is fully iterated (bsc#1111666).
- crypto: cavium/nitrox - Fix 'nitrox_get_first_device()' when ndevlist is fully iterated (git-fixes).
- Crypto/chcr: fix for ccm(aes) failed test (bsc#1111666).
- crypto: chelsio/chtls: properly set tp->lsndtime (bsc#1111666).
- crypto: talitos - fix IPsec cipher in length (git-fixes).
- crypto: talitos - reorder code in talitos_edesc_alloc() (git-fixes).
- debugfs: Check module state before warning in {full/open}_proxy_open() (bsc#1173746).
- devinet: fix memleak in inetdev_init() (networking-stable-20_06_07).
- dmaengine: tegra210-adma: Fix an error handling path in 'tegra_adma_probe()' (bsc#1111666).
- dm btree: increase rebalance threshold in __rebalance2() (git fixes (block drivers)).
- dm cache: fix a crash due to incorrect work item cancelling (git fixes (block drivers)).
- dm crypt: fix benbi IV constructor crash if used in authenticated mode (git fixes (block drivers)).
- dm: fix potential for q->make_request_fn NULL pointer (git fixes (block drivers)).
- dm space map common: fix to ensure new block isn't already in use (git fixes (block drivers)).
- dm: various cleanups to md->queue initialization code (git fixes).
- dm verity fec: fix hash block number in verity_fec_decode (git fixes (block drivers)).
- dm verity fec: fix memory leak in verity_fec_dtr (git fixes (block drivers)).
- dpaa_eth: fix usage as DSA master, try 3 (networking-stable-20_05_27).
- driver-core, libnvdimm: Let device subsystems add local lockdep coverage (bsc#1171753).
- Drivers: hv: Change flag to write log level in panic msg to false (bsc#1170617, bsc#1170618).
- drivers: soc: ti: knav_qmss_queue: Make knav_gp_range_ops static (bsc#1051510).
- drm: amd/display: fix Kconfig help text (bsc#1113956) * only fix DEBUG_KERNEL_DC
- drm: bridge: adv7511: Extend list of audio sample rates (bsc#1111666).
- drm/dp_mst: Increase ACT retry timeout to 3s (bsc#1113956) * context changes
- drm: encoder_slave: fix refcouting error for modules (bsc#1111666).
- drm: encoder_slave: fix refcouting error for modules (bsc#1114279)
- drm/i915/icl+: Fix hotplug interrupt disabling after storm detection (bsc#1112178)
- drm/i915: Whitelist context-local timestamp in the gen9 cmdparser (bsc#1111666).
- drm/mediatek: Check plane visibility in atomic_update (bsc#1113956) * context changes
- drm/msm/dpu: fix error return code in dpu_encoder_init (bsc#1111666).
- drm: panel-orientation-quirks: Add quirk for Asus T101HA panel (bsc#1111666).
- drm: panel-orientation-quirks: Use generic orientation-data for Acer S1003 (bsc#1111666).
- drm/qxl: Use correct notify port address when creating cursor ring (bsc#1113956)
- drm/radeon: fix double free (bsc#1113956)
- drm/radeon: fix fb_div check in ni_init_smc_spll_table() (bsc#1113956)
- drm/sun4i: hdmi ddc clk: Fix size of m divider (bsc#1111666).
- drm/tegra: hub: Do not enable orphaned window group (bsc#1111666).
- drm/vkms: Hold gem object while still in-use (bsc#1113956) * context changes
- e1000: Distribute switch variables for initialization (bsc#1111666).
- e1000e: Disable TSO for buffer overrun workaround (bsc#1051510).
- e1000e: Do not wake up the system via WOL if device wakeup is disabled (bsc#1051510).
- e1000e: Relax condition to trigger reset for ME workaround (bsc#1111666).
- EDAC/amd64: Read back the scrub rate PCI register on F15h (bsc#1114279).
- efi/random: Increase size of firmware supplied randomness (jsc#SLE-12423).
- efi/random: Treat EFI_RNG_PROTOCOL output as bootloader randomness (jsc#SLE-12423).
- efi: READ_ONCE rng seed size before munmap (jsc#SLE-12423).
- efi: Reorder pr_notice() with add_device_randomness() call (jsc#SLE-12423).
- evm: Check also if *tfm is an error pointer in init_desc() (bsc#1051510).
- evm: Fix a small race in init_desc() (bsc#1051510).
- ext4: fix a data race at inode->i_blocks (bsc#1171835).
- ext4: fix partial cluster initialization when splitting extent (bsc#1173839).
- ext4: fix race between ext4_sync_parent() and rename() (bsc#1173838).
- ext4, jbd2: ensure panic by fix a race between jbd2 abort and ext4 error handlers (bsc#1173833).
- extcon: adc-jack: Fix an error handling path in 'adc_jack_probe()' (bsc#1051510).
- fanotify: fix ignore mask logic for events on child and on dir (bsc#1172719).
- fdt: add support for rng-seed (jsc#SLE-12423).
- fdt: Update CRC check for rng-seed (jsc#SLE-12423).
- firmware: imx: scu: Fix corruption of header (git-fixes).
- firmware: imx: scu: Fix possible memory leak in imx_scu_probe() (bsc#1111666).
- Fix boot crash with MD (bsc#1174343)
- fix multiplication overflow in copy_fdtable() (bsc#1173825).
- fpga: dfl: afu: Corrected error handling levels (git-fixes).
- fq_codel: fix TCA_FQ_CODEL_DROP_BATCH_SIZE sanity checks (networking-stable-20_05_12).
- gpiolib: Document that GPIO line names are not globally unique (bsc#1051510).
- gpu: host1x: Detach driver on unregister (bsc#1111666).
- gpu: ipu-v3: pre: do not trigger update if buffer address does not change (bsc#1111666).
- HID: magicmouse: do not set up autorepeat (git-fixes).
- HID: sony: Fix for broken buttons on DS3 USB dongles (bsc#1051510).
- hv_netvsc: Fix netvsc_start_xmit's return type (git-fixes).
- hwmon: (acpi_power_meter) Fix potential memory leak in acpi_power_meter_add() (bsc#1111666).
- hwmon: (emc2103) fix unable to change fan pwm1_enable attribute (bsc#1111666).
- hwmon: (max6697) Make sure the OVERT mask is set correctly (bsc#1111666).
- i2c: algo-pca: Add 0x78 as SCL stuck low status for PCA9665 (bsc#1111666).
- i2c: eg20t: Load module automatically if ID matches (bsc#1111666).
- i2c: mlxcpld: check correct size of maximum RECV_LEN packet (bsc#1111666).
- i40e: reduce stack usage in i40e_set_fc (git-fixes).
- IB/hfi1: Do not destroy hfi1_wq when the device is shut down (bsc#1174409).
- IB/hfi1: Do not destroy link_wq when the device is shut down (bsc#1174409).
- ibmveth: Fix max MTU limit (bsc#1173428 ltc#186397).
- ibmvnic: continue to init in CRQ reset returns H_CLOSED (bsc#1173280 ltc#185369).
- ibmvnic: Flush existing work items before device removal (bsc#1065729).
- ibmvnic: Harden device login requests (bsc#1170011 ltc#183538).
- iio: buffer: Do not allow buffers without any channels enabled to be activated (bsc#1051510).
- iio:health:afe4404 Fix timestamp alignment and prevent data leak (bsc#1111666).
- iio:humidity:hdc100x Fix alignment and data leak issues (bsc#1111666).
- iio:magnetometer:ak8974: Fix alignment and data leak issues (bsc#1111666).
- iio: mma8452: Add missed iio_device_unregister() call in mma8452_probe() (bsc#1111666).
- iio: pressure: bmp280: Tolerate IRQ before registering (bsc#1051510).
- iio:pressure:ms5611 Fix buffer element alignment (bsc#1111666).
- iio: pressure: zpa2326: handle pm_runtime_get_sync failure (bsc#1111666).
- ima: Directly assign the ima_default_policy pointer to ima_rules (bsc#1051510).
- ima: Fix ima digest hash table key calculation (bsc#1051510).
- include/asm-generic/topology.h: guard cpumask_of_node() macro argument (bsc#1148868).
- Input: i8042 - add Lenovo XiaoXin Air 12 to i8042 nomux list (bsc#1111666).
- input: i8042 - Remove special PowerPC handling (git-fixes).
- Input: synaptics - add a second working PNP_ID for Lenovo T470s (bsc#1111666).
- intel_idle: Graceful probe failure when MWAIT is disabled (bsc#1174115).
- intel_th: Fix a NULL dereference when hub driver is not loaded (bsc#1111666).
- ipvlan: call dev_change_flags when ipvlan mode is reset (git-fixes).
- ixgbevf: Remove limit of 10 entries for unicast filter list (git-fixes).
- jbd2: avoid leaking transaction credits when unreserving handle (bsc#1173845).
- jbd2: Preserve kABI when adding j_abort_mutex (bsc#1173833).
- kabi: hv: prevent struct device_node to become defined (bsc#1172871).
- kabi: ppc64le: prevent struct dma_map_ops to become defined (jsc#SLE-12423).
- kABI: protect struct mlx5_cmd_work_ent (kabi).
- kABI: reintroduce inet_hashtables.h include to l2tp_ip (kabi).
- kernfs: fix barrier usage in __kernfs_new_node() (bsc#1111666).
- KVM: nVMX: Do not reread VMCS-agnostic state when switching VMCS (bsc#1114279).
- KVM: nVMX: Skip IBPB when switching between vmcs01 and vmcs02 (bsc#1114279).
- KVM: x86: Fix APIC page invalidation race (bsc#1174122).
- kvm: x86: Fix L1TF mitigation for shadow MMU (bsc#1171904).
- KVM: x86/mmu: Set mmio_value to '0' if reserved #PF can't be generated (bsc#1171904).
- KVM: x86: only do L1TF workaround on affected processors (bsc#1171904).
- l2tp: add sk_family checks to l2tp_validate_socket (networking-stable-20_06_07).
- l2tp: do not use inet_hash()/inet_unhash() (networking-stable-20_06_07).
- libceph: do not omit recovery_deletes in target_copy() (bsc#1174113).
- libceph: ignore pool overlay and cache logic on redirects (bsc#1173146).
- libnvdimm/bus: Fix wait_nvdimm_bus_probe_idle() ABBA deadlock (bsc#1171753).
- libnvdimm/bus: Prepare the nd_ioctl() path to be re-entrant (bsc#1171753).
- libnvdimm/bus: Stop holding nvdimm_bus_list_mutex over __nd_ioctl() (bsc#1171753).
- libnvdimm: cover up changes in struct nvdimm_bus (bsc#1171753).
- libnvdimm: cover up nd_pfn_sb changes (bsc#1171759).
- libnvdimm/dax: Pick the right alignment default when creating dax devices (bsc#1171759).
- libnvdimm/label: Remove the dpa align check (bsc#1171759).
- libnvdimm/of_pmem: Provide a unique name for bus provider (bsc#1171739).
- libnvdimm/pfn_dev: Add a build check to make sure we notice when struct page size change (bsc#1171743).
- libnvdimm/pfn_dev: Add page size and struct page size to pfn superblock (bsc#1171759).
- libnvdimm/pfn: Prevent raw mode fallback if pfn-infoblock valid (bsc#1171743).
- libnvdimm/pmem: Advance namespace seed for specific probe errors (bsc#1171743).
- libnvdimm/region: Initialize bad block for volatile namespaces (bnc#1151927 5.3.6).
- libnvdimm/region: Rewrite _probe_success() to _advance_seeds() (bsc#1171743).
- libnvdimm: Use PAGE_SIZE instead of SZ_4K for align check (bsc#1171759).
- livepatch: Apply vmlinux-specific KLP relocations early (bsc#1071995).
- livepatch: Disallow vmlinux.ko (bsc#1071995).
- livepatch: Make klp_apply_object_relocs static (bsc#1071995).
- livepatch: Prevent module-specific KLP rela sections from referencing vmlinux symbols (bsc#1071995).
- livepatch: Remove .klp.arch (bsc#1071995).
- loop: replace kill_bdev with invalidate_bdev (bsc#1173820).
- lpfc_debugfs: get rid of pointless access_ok() (bsc#1172687 bsc#1171530).
- lpfc: Synchronize NVME transport and lpfc driver devloss_tmo (bcs#1173060).
- mac80211: add option for setting control flags (bsc#1111666).
- mac80211: set IEEE80211_TX_CTRL_PORT_CTRL_PROTO for nl80211 TX (bsc#1111666).
- mailbox: imx: Disable the clock on devm_mbox_controller_register() failure (git-fixes).
- md: Avoid namespace collision with bitmap API (git fixes (block drivers)).
- mdraid: fix read/write bytes accounting (bsc#1172537).
- md: use memalloc scope APIs in mddev_suspend()/mddev_resume() (bsc#1166985)).
- media: cec: silence shift wrapping warning in __cec_s_log_addrs() (git-fixes).
- media: si2157: Better check for running tuner in init (bsc#1111666).
- mlxsw: core: Do not use WQ_MEM_RECLAIM for mlxsw ordered workqueue (git-fixes).
- mlxsw: core: Do not use WQ_MEM_RECLAIM for mlxsw workqueue (git-fixes).
- mlxsw: pci: Return error on PCI reset timeout (git-fixes).
- mlxsw: spectrum_acl_tcam: Position vchunk in a vregion list properly (networking-stable-20_05_12).
- mlxsw: spectrum: Disallow prio-tagged packets when PVID is removed (git-fixes).
- mlxsw: spectrum_dpipe: Add missing error path (git-fixes).
- mlxsw: spectrum: Prevent force of 56G (git-fixes).
- mlxsw: spectrum_router: Refresh nexthop neighbour when it becomes dead (git-fixes).
- mlxsw: spectrum_router: Remove inappropriate usage of WARN_ON() (git-fixes).
- mlxsw: spectrum_switchdev: Add MDB entries in prepare phase (git-fixes).
- mlxsw: spectrum_switchdev: Do not treat static FDB entries as sticky (git-fixes).
- mmc: block: Fix request completion in the CQE timeout path (bsc#1111666).
- mmc: block: Fix use-after-free issue for rpmb (bsc#1111666).
- mmc: fix compilation of user API (bsc#1051510).
- mmc: sdhci: do not enable card detect interrupt for gpio cd type (bsc#1111666).
- mmc: sdhci-msm: Set SDHCI_QUIRK_MULTIBLOCK_READ_ACMD12 quirk (bsc#1111666).
- Move upstreamed lpfc patches into sorted section
- mvpp2: remove misleading comment (git-fixes).
- net: be more gentle about silly gso requests coming from user (networking-stable-20_06_07).
- net: check untrusted gso_size at kernel entry (networking-stable-20_06_07).
- net/cxgb4: Check the return from t4_query_params properly (git-fixes).
- net: dsa: loop: Add module soft dependency (networking-stable-20_05_16).
- net: dsa: mt7530: fix roaming from DSA user ports (networking-stable-20_05_27).
- net: ena: add intr_moder_rx_interval to struct ena_com_dev and use it (git-fixes).
- net: ena: add missing ethtool TX timestamping indication (git-fixes).
- net: ena: avoid memory access violation by validating req_id properly (git-fixes).
- net: ena: do not wake up tx queue when down (git-fixes).
- net: ena: ena-com.c: prevent NULL pointer dereference (git-fixes).
- net: ena: ethtool: use correct value for crc32 hash (git-fixes).
- net: ena: fix continuous keep-alive resets (git-fixes).
- net: ena: fix corruption of dev_idx_to_host_tbl (git-fixes).
- net: ena: fix default tx interrupt moderation interval (git-fixes).
- net: ena: fix incorrect default RSS key (git-fixes).
- net: ena: fix incorrectly saving queue numbers when setting RSS indirection table (git-fixes).
- net: ena: fix issues in setting interrupt moderation params in ethtool (git-fixes).
- net: ena: fix potential crash when rxfh key is NULL (git-fixes).
- net: ena: fix retrieval of nonadaptive interrupt moderation intervals (git-fixes).
- net: ena: fix uses of round_jiffies() (git-fixes).
- net: ena: make ena rxfh support ETH_RSS_HASH_NO_CHANGE (git-fixes).
- net: ena: reimplement set/get_coalesce() (git-fixes).
- net: ena: rss: do not allocate key when not supported (git-fixes).
- net: ena: rss: fix failure to get indirection table (git-fixes).
- net: ena: rss: store hash function as values and not bits (git-fixes).
- netfilter: connlabels: prefer static lock initialiser (git-fixes).
- netfilter: ctnetlink: netns exit must wait for callbacks (bsc#1169795).
- netfilter: not mark a spinlock as __read_mostly (git-fixes).
- net: fix a potential recursive NETDEV_FEAT_CHANGE (networking-stable-20_05_16).
- net: inet_csk: Fix so_reuseport bind-address cache in tb->fast* (networking-stable-20_05_27).
- net: ipip: fix wrong address family in init error path (networking-stable-20_05_27).
- net: ipvlan: Fix ipvlan device tso disabled while NETIF_F_IP_CSUM is set (git-fixes).
- net: macsec: preserve ingress frame ordering (networking-stable-20_05_12).
- net/mlx4_core: drop useless LIST_HEAD (git-fixes).
- net/mlx4_core: fix a memory leak bug (git-fixes).
- net/mlx4_core: Fix use of ENOSPC around mlx4_counter_alloc() (networking-stable-20_05_12).
- net/mlx5: Add command entry handling completion (networking-stable-20_05_27).
- net/mlx5: Avoid panic when setting vport rate (git-fixes).
- net/mlx5: Continue driver initialization despite debugfs failure (git-fixes).
- net/mlx5e: ethtool, Fix a typo in WOL function names (git-fixes).
- net/mlx5e: Fix traffic duplication in ethtool steering (git-fixes).
- net/mlx5e: Remove unnecessary clear_bit()s (git-fixes).
- net/mlx5e: Update netdev txq on completions during closure (networking-stable-20_05_27).
- net/mlx5: Fix command entry leak in Internal Error State (networking-stable-20_05_12).
- net/mlx5: Fix crash upon suspend/resume (networking-stable-20_06_07).
- net/mlx5: Fix forced completion access non initialized command entry (networking-stable-20_05_12).
- net: mvmdio: allow up to four clocks to be specified for orion-mdio (git-fixes).
- net: mvpp2: prs: Do not override the sign bit in SRAM parser shift (git-fixes).
- net: phy: fix aneg restart in phy_ethtool_set_eee (networking-stable-20_05_16).
- netprio_cgroup: Fix unlimited memory leak of v2 cgroups (networking-stable-20_05_16).
- net: qede: stop adding events on an already destroyed workqueue (git-fixes).
- net: qed: fix excessive QM ILT lines consumption (git-fixes).
- net: qed: fix NVMe login fails over VFs (git-fixes).
- net: qrtr: Fix passing invalid reference to qrtr_local_enqueue() (networking-stable-20_05_27).
- net: revert 'net: get rid of an signed integer overflow in ip_idents_reserve()' (networking-stable-20_05_27).
- net sched: fix reporting the first-time use timestamp (networking-stable-20_05_27).
- net: stricter validation of untrusted gso packets (networking-stable-20_05_12).
- net/tls: Fix sk_psock refcnt leak in bpf_exec_tx_verdict() (networking-stable-20_05_12).
- net/tls: Fix sk_psock refcnt leak when in tls_data_ready() (networking-stable-20_05_12).
- net: usb: qmi_wwan: add support for DW5816e (networking-stable-20_05_12).
- net: usb: qmi_wwan: add Telit 0x1050 composition (networking-stable-20_06_07).
- net: usb: qmi_wwan: add Telit LE910C1-EUX composition (networking-stable-20_06_07).
- net: vmxnet3: fix possible buffer overflow caused by bad DMA value in vmxnet3_get_rss() (bsc#1172484).
- nfp: bpf: fix code-gen bug on BPF_ALU | BPF_XOR | BPF_K (git-fixes).
- NFS: Fix an RCU lock leak in nfs4_refresh_delegation_stateid() (bsc#1170592).
- NFSv4: Retry CLOSE and DELEGRETURN on NFS4ERR_OLD_STATEID (bsc#1170592).
- nilfs2: fix null pointer dereference at nilfs_segctor_do_construct() (bsc#1173857).
- nl80211: fix NL80211_ATTR_CHANNEL_WIDTH attribute type (bsc#1111666).
- nvdimm: Avoid race between probe and reading device attributes (bsc#1170442).
- nvme: check for NVME_CTRL_LIVE in nvme_report_ns_ids() (bcs#1171558 bsc#1159058).
- nvme: do not update multipath disk information if the controller is down (bcs#1171558 bsc#1159058).
- nvme: fail cancelled commands with NVME_SC_HOST_PATH_ERROR (bsc#1158983 bsc#1172538).
- nvme-fc: Fail transport errors with NVME_SC_HOST_PATH (bsc#1158983 bsc#1172538).
- nvme-tcp: fail command with NVME_SC_HOST_PATH_ERROR send failed (bsc#1158983 bsc#1172538).
- objtool: Clean instruction state before each function validation (bsc#1169514).
- objtool: Ignore empty alternatives (bsc#1169514).
- ocfs2: no need try to truncate file beyond i_size (bsc#1171841).
- overflow: Fix -Wtype-limits compilation warnings (git fixes).
- overflow.h: Add arithmetic shift helper (git fixes).
- p54usb: add AirVasT USB stick device-id (bsc#1051510).
- padata: ensure the reorder timer callback runs on the correct CPU (git-fixes).
- padata: reorder work kABI fixup (git-fixes).
- PCI/AER: Remove HEST/FIRMWARE_FIRST parsing for AER ownership (bsc#1174356).
- PCI/AER: Use only _OSC to determine AER ownership (bsc#1174356).
- PCI: Allow pci_resize_resource() for devices on root bus (bsc#1051510).
- PCI: Fix pci_register_host_bridge() device_register() error handling (bsc#1051510).
- PCI: Generalize multi-function power dependency device links (bsc#1111666).
- PCI: hv: Change pci_protocol_version to per-hbus (bsc#1172871, bsc#1172872).
- PCI: hv: Fix the PCI HyperV probe failure path to release resource properly (bsc#1172871, bsc#1172872).
- PCI: hv: Introduce hv_msi_entry (bsc#1172871, bsc#1172872).
- PCI: hv: Move hypercall related definitions into tlfs header (bsc#1172871, bsc#1172872).
- PCI: hv: Move retarget related structures into tlfs header (bsc#1172871, bsc#1172872).
- PCI: hv: Reorganize the code in preparation of hibernation (bsc#1172871, bsc#1172872).
- PCI: hv: Retry PCI bus D0 entry on invalid device state (bsc#1172871, bsc#1172872).
- PCI: pciehp: Fix indefinite wait on sysfs requests (git-fixes).
- PCI: pciehp: Support interrupts sent from D3hot (git-fixes).
- PCI/PM: Call .bridge_d3() hook only if non-NULL (git-fixes).
- PCI: Program MPS for RCiEP devices (bsc#1051510).
- PCI/PTM: Inherit Switch Downstream Port PTM settings from Upstream Port (bsc#1051510).
- pci: Revive pci_dev __aer_firmware_first* fields for kABI (bsc#1174356).
- pcm_native: result of put_user() needs to be checked (bsc#1111666).
- perf: Allocate context task_ctx_data for child event (git-fixes).
- perf/cgroup: Fix perf cgroup hierarchy support (git-fixes).
- perf: Copy parent's address filter offsets on clone (git-fixes).
- perf/core: Add sanity check to deal with pinned event failure (git-fixes).
- perf/core: Avoid freeing static PMU contexts when PMU is unregistered (git-fixes).
- perf/core: Correct event creation with PERF_FORMAT_GROUP (git-fixes).
- perf/core: Do not WARN() for impossible ring-buffer sizes (git-fixes).
- perf/core: Fix ctx_event_type in ctx_resched() (git-fixes).
- perf/core: Fix error handling in perf_event_alloc() (git-fixes).
- perf/core: Fix exclusive events' grouping (git-fixes).
- perf/core: Fix group scheduling with mixed hw and sw events (git-fixes).
- perf/core: Fix impossible ring-buffer sizes warning (git-fixes).
- perf/core: Fix locking for children siblings group read (git-fixes).
- perf/core: Fix lock inversion between perf,trace,cpuhp (git-fixes (dependent patch for 18736eef1213)).
- perf/core: Fix perf_event_read_value() locking (git-fixes).
- perf/core: Fix perf_pmu_unregister() locking (git-fixes).
- perf/core: Fix __perf_read_group_add() locking (git-fixes (dependent patch)).
- perf/core: Fix perf_sample_regs_user() mm check (git-fixes).
- perf/core: Fix possible Spectre-v1 indexing for ->aux_pages (git-fixes).
- perf/core: Fix race between close() and fork() (git-fixes).
- perf/core: Fix the address filtering fix (git-fixes).
- perf/core: Fix use-after-free in uprobe_perf_close() (git-fixes).
- perf/core: Force USER_DS when recording user stack data (git-fixes).
- perf/core: Restore mmap record type correctly (git-fixes).
- perf: Fix header.size for namespace events (git-fixes).
- perf/ioctl: Add check for the sample_period value (git-fixes).
- perf, pt, coresight: Fix address filters for vmas with non-zero offset (git-fixes).
- perf: Return proper values for user stack errors (git-fixes).
- perf/x86/amd: Constrain Large Increment per Cycle events (git-fixes).
- perf/x86/amd/ibs: Fix reading of the IBS OpData register and thus precise RIP validity (git-fixes).
- perf/x86/amd/ibs: Fix sample bias for dispatched micro-ops (git-fixes).
- perf/x86/amd/ibs: Handle erratum #420 only on the affected CPU family (10h) (git-fixes).
- perf/x86/amd/iommu: Make the 'amd_iommu_attr_groups' symbol static (git-fixes).
- perf/x86/amd/uncore: Do not set 'ThreadMask' and 'SliceMask' for non-L3 PMCs (git-fixes stable).
- perf/x86/amd/uncore: Set the thread mask for F17h L3 PMCs (git-fixes).
- perf/x86/amd/uncore: Set ThreadMask and SliceMask for L3 Cache perf events (git-fixes stable).
- perf/x86: Enable free running PEBS for REGS_USER/INTR (git-fixes).
- perf/x86: Fix incorrect PEBS_REGS (git-fixes).
- perf/x86/intel: Add generic branch tracing check to intel_pmu_has_bts() (git-fixes).
- perf/x86/intel: Add proper condition to run sched_task callbacks (git-fixes).
- perf/x86/intel/bts: Fix the use of page_private() (git-fixes).
- perf/x86/intel: Fix PT PMI handling (git-fixes).
- perf/x86/intel: Move branch tracing setup to the Intel-specific source file (git-fixes).
- perf/x86/intel/uncore: Add Node ID mask (git-fixes).
- perf/x86/intel/uncore: Fix PCI BDF address of M3UPI on SKX (git-fixes).
- perf/x86/intel/uncore: Handle invalid event coding for free-running counter (git-fixes).
- perf/x86/uncore: Fix event group support (git-fixes).
- pid: Improve the comment about waiting in zap_pid_ns_processes (git fixes)).
- pinctrl: freescale: imx: Fix an error handling path in 'imx_pinctrl_probe()' (bsc#1051510).
- pinctrl: imxl: Fix an error handling path in 'imx1_pinctrl_core_probe()' (bsc#1051510).
- pinctrl: samsung: Save/restore eint_mask over suspend for EINT_TYPE GPIOs (bsc#1051510).
- platform/x86: dell-laptop: do not register micmute LED if there is no token (bsc#1111666).
- platform/x86: hp-wmi: Convert simple_strtoul() to kstrtou32() (bsc#1111666).
- PM / Domains: Allow genpd users to specify default active wakeup behavior (git-fixes).
- pnp: Use list_for_each_entry() instead of open coding (git fixes).
- powerpc/64s: Do not let DT CPU features set FSCR_DSCR (bsc#1065729).
- powerpc/64s: Save FSCR to init_task.thread.fscr after feature init (bsc#1065729).
- powerpc/book3s64: Export has_transparent_hugepage() related functions (bsc#1171759).
- powerpc/book3s64/pkeys: Fix pkey_access_permitted() for execute disable pkey (bsc#1065729).
- powerpc/fadump: fix race between pstore write and fadump crash trigger (bsc#1168959 ltc#185010).
- powerpc/xive: Clear the page tables for the ESB IO mapping (bsc#1085030).
- powerpc/xmon: Reset RCU and soft lockup watchdogs (bsc#1065729).
- power: supply: bq24257_charger: Replace depends on REGMAP_I2C with select (bsc#1051510).
- power: supply: lp8788: Fix an error handling path in 'lp8788_charger_probe()' (bsc#1051510).
- power: supply: smb347-charger: IRQSTAT_D is volatile (bsc#1051510).
- power: vexpress: add suppress_bind_attrs to true (bsc#1111666).
- pppoe: only process PADT targeted at local interfaces (networking-stable-20_05_16).
- qed: reduce maximum stack frame size (git-fixes).
- qlcnic: fix missing release in qlcnic_83xx_interrupt_test (git-fixes).
- r8152: support additional Microsoft Surface Ethernet Adapter variant (networking-stable-20_05_27).
- raid5: remove gfp flags from scribble_alloc() (bsc#1166985).
- RDMA/efa: Fix setting of wrong bit in get/set_feature commands (bsc#1111666)
- RDMA/efa: Set maximum pkeys device attribute (bsc#1111666)
- RDMA/efa: Support remote read access in MR registration (bsc#1111666)
- RDMA/efa: Unified getters/setters for device structs bitmask access (bsc#1111666)
- README.BRANCH: Add Takashi Iwai as primary maintainer.
- regmap: debugfs: Do not sleep while atomic for fast_io regmaps (bsc#1111666).
- resolve KABI warning for perf-pt-coresight (git-fixes).
- Revert 'bcache: ignore pending signals when creating gc and allocator thread' (git fixes (block drivers)).
- Revert commit e918e570415c ('tpm_tis: Remove the HID IFX0102') (bsc#1111666).
- Revert 'dm crypt: use WQ_HIGHPRI for the IO and crypt workqueues' (git fixes (block drivers)).
- Revert 'thermal: mediatek: fix register index error' (bsc#1111666).
- Revert 'tools lib traceevent: Remove unneeded qsort and uses memmove'
- s390/bpf: Maintain 8-byte stack alignment (bsc#1169194).
- s390: fix syscall_get_error for compat processes (git-fixes).
- s390/qdio: consistently restore the IRQ handler (git-fixes).
- s390/qdio: lock device while installing IRQ handler (git-fixes).
- s390/qdio: put thinint indicator after early error (git-fixes).
- s390/qdio: tear down thinint indicator after early error (git-fixes).
- s390/qeth: fix error handling for isolation mode cmds (git-fixes).
- sch_choke: avoid potential panic in choke_reset() (networking-stable-20_05_12).
- sch_sfq: validate silly quantum values (networking-stable-20_05_12).
- scsi: aacraid: fix a signedness bug (bsc#1174296).
- scsi: hisi_sas: fix calls to dma_set_mask_and_coherent() (bsc#1174296).
- scsi: ibmvscsi: Do not send host info in adapter info MAD after LPM (bsc#1172759 ltc#184814).
- scsi: lpfc: Add an internal trace log buffer (bsc#1172687 bsc#1171530).
- scsi: lpfc: Add blk_io_poll support for latency improvment (bsc#1172687 bsc#1171530).
- scsi: lpfc: Add support to display if adapter dumps are available (bsc#1172687 bsc#1171530).
- scsi: lpfc: Allow applications to issue Common Set Features mailbox command (bsc#1172687 bsc#1171530).
- scsi: lpfc: Avoid another null dereference in lpfc_sli4_hba_unset() (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix inconsistent indenting (bsc#1158983).
- scsi: lpfc: Fix interrupt assignments when multiple vectors are supported on same CPU (bsc#1158983).
- scsi: lpfc: Fix kdump hang on PPC (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix language in 0373 message to reflect non-error message (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix less-than-zero comparison of unsigned value (bsc#1158983).
- scsi: lpfc: Fix missing MDS functionality (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix NVMe rport deregister and registration during ADISC (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix oops due to overrun when reading SLI3 data (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix shost refcount mismatch when deleting vport (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix stack trace seen while setting rrq active (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix unused assignment in lpfc_sli4_bsg_link_diag_test (bsc#1172687 bsc#1171530).
- scsi: lpfc: Update lpfc version to 12.8.0.2 (bsc#1158983).
- scsi: megaraid_sas: Fix a compilation warning (bsc#1174296).
- scsi: mpt3sas: Fix double free in attach error handling (bsc#1174296).
- scsi: qedf: Add port_id getter (bsc#1150660).
- scsi: qla2xxx: Fix a condition in qla2x00_find_all_fabric_devs() (bsc#1174296).
- scsi: qla2xxx: Set NVMe status code for failed NVMe FCP request (bsc#1158983).
- sctp: Do not add the shutdown timer if its already been added (networking-stable-20_05_27).
- sctp: Start shutdown on association restart if in SHUTDOWN-SENT state and socket is closed (networking-stable-20_05_27).
- spi: dw: use 'smp_mb()' to avoid sending spi data error (bsc#1051510).
- spi: fix initial SPI_SR value in spi-fsl-dspi (bsc#1111666).
- spi: pxa2xx: Apply CS clk quirk to BXT (bsc#1111666).
- spi: spidev: fix a race between spidev_release and spidev_remove (bsc#1111666).
- spi: spi-mem: Fix Dual/Quad modes on Octal-capable devices (bsc#1111666).
- spi: spi-sun6i: sun6i_spi_transfer_one(): fix setting of clock rate (bsc#1111666).
- staging: comedi: verify array index is correct before using it (bsc#1111666).
- staging: rtl8712: Fix IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK (bsc#1051510).
- staging: sm750fb: add missing case while setting FB_VISUAL (bsc#1051510).
- SUNRPC: The TCP back channel mustn't disappear while requests are outstanding (bsc#1152624).
- tg3: driver sleeps indefinitely when EEH errors exceed eeh_max_freezes (bsc#1173284).
- timers: Add a function to start/reduce a timer (networking-stable-20_05_27).
- tpm_tis: extra chip->ops check on error path in tpm_tis_core_init (bsc#1111666).
- tpm_tis: Remove the HID IFX0102 (bsc#1111666).
- tracing: Fix event trigger to accept redundant spaces (git-fixes).
- tty: n_gsm: Fix bogus i++ in gsm_data_kick (bsc#1051510).
- tty: n_gsm: Fix SOF skipping (bsc#1051510).
- tty: n_gsm: Fix waking up upper tty layer when room available (bsc#1051510).
- tunnel: Propagate ECT(1) when decapsulating as recommended by RFC6040 (networking-stable-20_05_12).
- ubifs: remove broken lazytime support (bsc#1173826).
- usb: add USB_QUIRK_DELAY_INIT for Logitech C922 (git-fixes).
- USB: c67x00: fix use after free in c67x00_giveback_urb (bsc#1111666).
- usb: chipidea: core: add wakeup support for extcon (bsc#1111666).
- usb: dwc2: Fix shutdown callback in platform (bsc#1111666).
- usb: dwc2: gadget: move gadget resume after the core is in L0 state (bsc#1051510).
- usb: dwc3: gadget: introduce cancelled_list (git-fixes).
- usb: dwc3: gadget: never call ->complete() from ->ep_queue() (git-fixes).
- usb: dwc3: gadget: Properly handle ClearFeature(halt) (git-fixes).
- usb: dwc3: gadget: Properly handle failed kick_transfer (git-fixes).
- USB: ehci: reopen solution for Synopsys HC bug (git-fixes).
- usb: gadget: fix potential double-free in m66592_probe (bsc#1111666).
- usb: gadget: lpc32xx_udc: do not dereference ep pointer before null check (bsc#1051510).
- usb: gadget: udc: atmel: fix uninitialized read in debug printk (bsc#1111666).
- usb: gadget: udc: atmel: remove outdated comment in usba_ep_disable() (bsc#1111666).
- usb: gadget: udc: Potential Oops in error handling code (bsc#1111666).
- USB: gadget: udc: s3c2410_udc: Remove pointless NULL check in s3c2410_udc_nuke (bsc#1051510).
- usb: host: ehci-exynos: Fix error check in exynos_ehci_probe() (bsc#1111666).
- USB: host: ehci-mxc: Add error handling in ehci_mxc_drv_probe() (bsc#1051510).
- usb: musb: Fix runtime PM imbalance on error (bsc#1051510).
- usb: musb: start session in resume for host port (bsc#1051510).
- usbnet: smsc95xx: Fix use-after-free after removal (bsc#1111666).
- USB: ohci-sm501: Add missed iounmap() in remove (bsc#1111666).
- USB: serial: ch341: add new Product ID for CH340 (bsc#1111666).
- USB: serial: cypress_m8: enable Simply Automated UPB PIM (bsc#1111666).
- USB: serial: iuu_phoenix: fix memory corruption (bsc#1111666).
- USB: serial: option: add GosunCn GM500 series (bsc#1111666).
- USB: serial: option: add Quectel EG95 LTE modem (bsc#1111666).
- USB: serial: option: add Telit LE910C1-EUX compositions (bsc#1051510).
- USB: serial: qcserial: add DW5816e QDL support (bsc#1051510).
- USB: serial: usb_wwan: do not resubmit rx urb on fatal errors (bsc#1051510).
- USB: serial: usb_wwan: do not resubmit rx urb on fatal errors (git-fixes).
- vfio/pci: Fix SR-IOV VF handling with MMIO blocking (bsc#1174123).
- vfs: Fix EOVERFLOW testing in put_compat_statfs64 (bnc#1151927 5.3.6).
- virtio-blk: handle block_device_operations callbacks after hot unplug (git fixes (block drivers)).
- vmxnet3: add geneve and vxlan tunnel offload support (bsc#1172484).
- vmxnet3: add support to get/set rx flow hash (bsc#1172484).
- vmxnet3: allow rx flow hash ops only when rss is enabled (bsc#1172484).
- vmxnet3: avoid format strint overflow warning (bsc#1172484).
- vmxnet3: prepare for version 4 changes (bsc#1172484).
- vmxnet3: Remove always false conditional statement (bsc#1172484).
- vmxnet3: remove redundant initialization of pointer 'rq' (bsc#1172484).
- vmxnet3: remove unused flag 'rxcsum' from struct vmxnet3_adapter (bsc#1172484).
- vmxnet3: Replace msleep(1) with usleep_range() (bsc#1172484).
- vmxnet3: update to version 4 (bsc#1172484).
- vmxnet3: use correct hdr reference when packet is encapsulated (bsc#1172484).
- vsock: fix timeout in vsock_accept() (networking-stable-20_06_07).
- vxlan: Avoid infinite loop when suppressing NS messages with invalid options (git-fixes).
- w1: omap-hdq: cleanup to add missing newline for some dev_dbg (bsc#1051510).
- watchdog: sp805: fix restart handler (bsc#1111666).
- wil6210: add general initialization/size checks (bsc#1111666).
- wil6210: check rx_buff_mgmt before accessing it (bsc#1111666).
- wil6210: ignore HALP ICR if already handled (bsc#1111666).
- wil6210: make sure Rx ring sizes are correlated (git-fixes).
- work around mvfs bug (bsc#1162063).
- x86/apic: Install an empty physflat_init_apic_ldr (bsc#1163309).
- x86/cpu/amd: Make erratum #1054 a legacy erratum (bsc#1114279).
- x86/events/intel/ds: Add PERF_SAMPLE_PERIOD into PEBS_FREERUNNING_FLAGS (git-fixes).
- x86: Fix early boot crash on gcc-10, third try (bsc#1114279).
- x86/{mce,mm}: Unmap the entire page if the whole page is affected and poisoned (bsc#1172257).
- x86/reboot/quirks: Add MacBook6,1 reboot quirk (bsc#1114279).
- xfrm: fix error in comment (git fixes).
- xhci: Fix incorrect EP_STATE_MASK (git-fixes).
Patchnames
SUSE-2020-2107,SUSE-SLE-Module-Basesystem-15-SP1-2020-2107,SUSE-SLE-Module-Development-Tools-15-SP1-2020-2107,SUSE-SLE-Module-Legacy-15-SP1-2020-2107,SUSE-SLE-Module-Live-Patching-15-SP1-2020-2107,SUSE-SLE-Product-HA-15-SP1-2020-2107,SUSE-SLE-Product-WE-15-SP1-2020-2107
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n\n- CVE-2020-15780: A lockdown bypass for loading unsigned modules using ACPI table injection was fixed. (bsc#1173573)\n- CVE-2020-15393: Fixed a memory leak in usbtest_disconnect (bnc#1173514).\n- CVE-2020-12771: An issue was discovered in btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails (bnc#1171732).\n- CVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).\n- CVE-2020-10773: Fixed a memory leak on s390/s390x, in the cmm_timeout_hander in file arch/s390/mm/cmm.c (bnc#1172999).\n- CVE-2020-14416: Fixed a race condition in tty-\u003edisc_data handling in the slip and slcan line discipline could lead to a use-after-free. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).\n- CVE-2020-10768: Fixed an issue with the prctl() function, where indirect branch speculation could be enabled even though it was diabled before (bnc#1172783).\n- CVE-2020-10766: Fixed an issue which allowed an attacker with a local account to disable SSBD protection (bnc#1172781).\n- CVE-2020-10767: Fixed an issue where Indirect Branch Prediction Barrier was disabled in certain circumstances, leaving the system open to a spectre v2 style attack (bnc#1172782).\n- CVE-2020-13974: Fixed a integer overflow in drivers/tty/vt/keyboard.c, if k_ascii is called several times in a row (bnc#1172775).\n- CVE-2020-0305: Fixed a possible use-after-free due to a race condition incdev_get of char_dev.c. This could lead to local escalation of privilege. User interaction is not needed for exploitation (bnc#1174462).\n- CVE-2020-10769: A buffer over-read flaw was found in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm\u0027s module, authenc. This flaw allowed a local attacker with user privileges to cause a denial of service (bnc#1173265).\n- CVE-2020-10781: Fixed a denial of service issue in the ZRAM implementation (bnc#1173074).\n- CVE-2019-20908: Fixed incorrect access permissions for the efivar_ssdt ACPI variable, which could be used by attackers to bypass lockdown or secure boot restrictions (bnc#1173567).\n- CVE-2019-20810: Fixed a memory leak in go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c because it did not call snd_card_free for a failure path (bnc#1172458).\n- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c, related to invalid length checks for variable elements in a beacon head (bnc#1152107).\n\nThe following non-security bugs were fixed:\n\n- ACPI: GED: add support for _Exx / _Lxx handler methods (bsc#1111666).\n- ACPI: GED: use correct trigger type field in _Exx / _Lxx handling (bsc#1111666).\n- ACPI: NFIT: Fix unlock on error in scrub_show() (bsc#1171753).\n- ACPI: PM: Avoid using power resources if there are none for D0 (bsc#1051510).\n- ACPI: sysfs: Fix pm_profile_attr type (bsc#1111666).\n- ACPI: video: Use native backlight on Acer Aspire 5783z (bsc#1111666).\n- ACPI: video: Use native backlight on Acer TravelMate 5735Z (bsc#1111666).\n- ALSA: es1688: Add the missed snd_card_free() (bsc#1051510).\n- ALSA: hda: Add ElkhartLake HDMI codec vid (bsc#1111666).\n- ALSA: hda: add sienna_cichlid audio asic id for sienna_cichlid up (bsc#1111666).\n- ALSA: hda/hdmi - enable runtime pm for newer AMD display audio (bsc#1111666).\n- ALSA: hda - let hs_mic be picked ahead of hp_mic (bsc#1111666).\n- ALSA: hda/realtek - add a pintbl quirk for several Lenovo machines (bsc#1111666).\n- ALSA: hda/realtek - Add LED class support for micmute LED (bsc#1111666).\n- ALSA: hda/realtek - Enable micmute LED on and HP system (bsc#1111666).\n- ALSA: hda/realtek - Enable Speaker for ASUS UX533 and UX534 (bsc#1111666).\n- ALSA: hda/realtek - Fix unused variable warning w/o CONFIG_LEDS_TRIGGER_AUDIO (bsc#1111666).\n- ALSA: hda/realtek - Introduce polarity for micmute LED GPIO (bsc#1111666).\n- ALSA: lx6464es - add support for LX6464ESe pci express variant (bsc#1111666).\n- ALSA: opl3: fix infoleak in opl3 (bsc#1111666).\n- ALSA: pcm: disallow linking stream to itself (bsc#1111666).\n- ALSA: usb-audio: Add duplex sound support for USB devices using implicit feedback (bsc#1111666).\n- ALSA: usb-audio: Add Pioneer DJ DJM-900NXS2 support (bsc#1111666).\n- ALSA: usb-audio: add quirk for MacroSilicon MS2109 (bsc#1111666).\n- ALSA: usb-audio: Add vendor, product and profile name for HP Thunderbolt Dock (bsc#1111666).\n- ALSA: usb-audio: Clean up quirk entries with macros (bsc#1111666).\n- ALSA: usb-audio: Fix inconsistent card PM state after resume (bsc#1111666).\n- ALSA: usb-audio: Fix packet size calculation (bsc#1111666).\n- ALSA: usb-audio: Fix racy list management in output queue (bsc#1111666).\n- ALSA: usb-audio: Improve frames size computation (bsc#1111666).\n- ALSA: usb-audio: Manage auto-pm of all bundled interfaces (bsc#1111666).\n- ALSA: usb-audio: Use the new macro for HP Dock rename quirks (bsc#1111666).\n- amdgpu: a NULL -\u003emm does not mean a thread is a kthread (git-fixes).\n- arm64: map FDT as RW for early_init_dt_scan() (jsc#SLE-12423).\n- ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb (bsc#1111666).\n- ath9k: Fix use-after-free Read in ath9k_wmi_ctrl_rx (bsc#1111666).\n- ath9k: Fix use-after-free Write in ath9k_htc_rx_msg (bsc#1111666).\n- ath9x: Fix stack-out-of-bounds Write in ath9k_hif_usb_rx_cb (bsc#1111666).\n- ax25: fix setsockopt(SO_BINDTODEVICE) (networking-stable-20_05_27).\n- b43: Fix connection problem with WPA3 (bsc#1111666).\n- b43_legacy: Fix connection problem with WPA3 (bsc#1111666).\n- bcache: Fix an error code in bch_dump_read() (git fixes (block drivers)).\n- be2net: fix link failure after ethtool offline test (git-fixes).\n- block: nr_sects_write(): Disable preemption on seqcount write (bsc#1173818).\n- block: remove QUEUE_FLAG_STACKABLE (git fixes (block drivers)).\n- block: sed-opal: fix sparse warning: convert __be64 data (git fixes (block drivers)).\n- Bluetooth: Add SCO fallback for invalid LMP parameters error (bsc#1111666).\n- bnxt_en: Fix AER reset logic on 57500 chips (git-fixes).\n- bnxt_en: Fix ethtool selftest crash under error conditions (git-fixes).\n- bnxt_en: Fix handling FRAG_ERR when NVM_INSTALL_UPDATE cmd fails (git-fixes).\n- bnxt_en: Fix ipv6 RFS filter matching logic (git-fixes).\n- bnxt_en: fix NULL dereference in case SR-IOV configuration fails (git-fixes).\n- bnxt_en: Fix VF anti-spoof filter setup (networking-stable-20_05_12).\n- bnxt_en: Fix VLAN acceleration handling in bnxt_fix_features() (networking-stable-20_05_12).\n- bnxt_en: Improve AER slot reset (networking-stable-20_05_12).\n- brcmfmac: fix wrong location to get firmware feature (bsc#1111666).\n- brcmfmac: Transform compatible string for FW loading (bsc#1169771).\n- btrfs: add assertions for tree == inode-\u003eio_tree to extent IO helpers (bsc#1174438).\n- btrfs: add new helper btrfs_lock_and_flush_ordered_range (bsc#1174438).\n- btrfs: Always use a cached extent_state in btrfs_lock_and_flush_ordered_range (bsc#1174438).\n- btrfs: do not zero f_bavail if we have available space (bsc#1168081).\n- btrfs: do not zero f_bavail if we have available space (bsc#1168081).\n- btrfs: drop argument tree from btrfs_lock_and_flush_ordered_range (bsc#1174438).\n- btrfs: fix extent_state leak in btrfs_lock_and_flush_ordered_range (bsc#1174438).\n- btrfs: fix failure of RWF_NOWAIT write into prealloc extent beyond eof (bsc#1174438).\n- btrfs: fix hang on snapshot creation after RWF_NOWAIT write (bsc#1174438).\n- btrfs: fix RWF_NOWAIT write not failling when we need to cow (bsc#1174438).\n- btrfs: fix RWF_NOWAIT writes blocking on extent locks and waiting for IO (bsc#1174438).\n- btrfs: qgroup: Fix a bug that prevents qgroup to be re-enabled after disable (bsc#1172247).\n- btrfs: Return EAGAIN if we can\u0027t start no snpashot write in check_can_nocow (bsc#1174438).\n- btrfs: use correct count in btrfs_file_write_iter() (bsc#1174438).\n- btrfs: Use newly introduced btrfs_lock_and_flush_ordered_range (bsc#1174438).\n- btrfs: volumes: Remove ENOSPC-prone btrfs_can_relocate() (bsc#1171124).\n- bus: sunxi-rsb: Return correct data when mixing 16-bit and 8-bit reads (bsc#1111666).\n- carl9170: remove P2P_GO support (bsc#1111666).\n- CDC-ACM: heed quirk also in error handling (git-fixes).\n- ceph: convert mdsc-\u003ecap_dirty to a per-session list (bsc#1167104).\n- ceph: request expedited service on session\u0027s last cap flush (bsc#1167104).\n- cgroup, blkcg: Prepare some symbols for module and !CONFIG_CGROUP usages (bsc#1173857).\n- char/random: Add a newline at the end of the file (jsc#SLE-12423).\n- cifs: get rid of unused parameter in reconn_setup_dfs_targets() (bsc#1144333).\n- cifs: handle hostnames that resolve to same ip in failover (bsc#1144333 bsc#1161016).\n- cifs: set up next DFS target before generic_ip_connect() (bsc#1144333 bsc#1161016).\n- clk: bcm2835: Fix return type of bcm2835_register_gate (bsc#1051510).\n- clk: clk-flexgen: fix clock-critical handling (bsc#1051510).\n- clk: sunxi: Fix incorrect usage of round_down() (bsc#1051510).\n- clocksource: dw_apb_timer: Make CPU-affiliation being optional (bsc#1111666).\n- compat_ioctl: block: handle BLKREPORTZONE/BLKRESETZONE (git fixes (block drivers)).\n- compat_ioctl: block: handle Persistent Reservations (git fixes (block drivers)).\n- copy_{to,from}_user(): consolidate object size checks (git fixes).\n- crypto: algboss - do not wait during notifier callback (bsc#1111666).\n- crypto: algif_skcipher - Cap recv SG list at ctx-\u003eused (bsc#1111666).\n- crypto: caam - update xts sector size for large input length (bsc#1111666).\n- crypto: cavium/nitrox - Fix \u0027nitrox_get_first_device()\u0027 when ndevlist is fully iterated (bsc#1111666).\n- crypto: cavium/nitrox - Fix \u0027nitrox_get_first_device()\u0027 when ndevlist is fully iterated (git-fixes).\n- Crypto/chcr: fix for ccm(aes) failed test (bsc#1111666).\n- crypto: chelsio/chtls: properly set tp-\u003elsndtime (bsc#1111666).\n- crypto: talitos - fix IPsec cipher in length (git-fixes).\n- crypto: talitos - reorder code in talitos_edesc_alloc() (git-fixes).\n- debugfs: Check module state before warning in {full/open}_proxy_open() (bsc#1173746).\n- devinet: fix memleak in inetdev_init() (networking-stable-20_06_07).\n- dmaengine: tegra210-adma: Fix an error handling path in \u0027tegra_adma_probe()\u0027 (bsc#1111666).\n- dm btree: increase rebalance threshold in __rebalance2() (git fixes (block drivers)).\n- dm cache: fix a crash due to incorrect work item cancelling (git fixes (block drivers)).\n- dm crypt: fix benbi IV constructor crash if used in authenticated mode (git fixes (block drivers)).\n- dm: fix potential for q-\u003emake_request_fn NULL pointer (git fixes (block drivers)).\n- dm space map common: fix to ensure new block isn\u0027t already in use (git fixes (block drivers)).\n- dm: various cleanups to md-\u003equeue initialization code (git fixes).\n- dm verity fec: fix hash block number in verity_fec_decode (git fixes (block drivers)).\n- dm verity fec: fix memory leak in verity_fec_dtr (git fixes (block drivers)).\n- dpaa_eth: fix usage as DSA master, try 3 (networking-stable-20_05_27).\n- driver-core, libnvdimm: Let device subsystems add local lockdep coverage (bsc#1171753).\n- Drivers: hv: Change flag to write log level in panic msg to false (bsc#1170617, bsc#1170618).\n- drivers: soc: ti: knav_qmss_queue: Make knav_gp_range_ops static (bsc#1051510).\n- drm: amd/display: fix Kconfig help text (bsc#1113956) \t* only fix DEBUG_KERNEL_DC\n- drm: bridge: adv7511: Extend list of audio sample rates (bsc#1111666).\n- drm/dp_mst: Increase ACT retry timeout to 3s (bsc#1113956) * context changes\n- drm: encoder_slave: fix refcouting error for modules (bsc#1111666).\n- drm: encoder_slave: fix refcouting error for modules (bsc#1114279)\n- drm/i915/icl+: Fix hotplug interrupt disabling after storm detection (bsc#1112178)\n- drm/i915: Whitelist context-local timestamp in the gen9 cmdparser (bsc#1111666).\n- drm/mediatek: Check plane visibility in atomic_update (bsc#1113956) * context changes\n- drm/msm/dpu: fix error return code in dpu_encoder_init (bsc#1111666).\n- drm: panel-orientation-quirks: Add quirk for Asus T101HA panel (bsc#1111666).\n- drm: panel-orientation-quirks: Use generic orientation-data for Acer S1003 (bsc#1111666).\n- drm/qxl: Use correct notify port address when creating cursor ring (bsc#1113956)\n- drm/radeon: fix double free (bsc#1113956)\n- drm/radeon: fix fb_div check in ni_init_smc_spll_table() (bsc#1113956)\n- drm/sun4i: hdmi ddc clk: Fix size of m divider (bsc#1111666).\n- drm/tegra: hub: Do not enable orphaned window group (bsc#1111666).\n- drm/vkms: Hold gem object while still in-use (bsc#1113956) * context changes\n- e1000: Distribute switch variables for initialization (bsc#1111666).\n- e1000e: Disable TSO for buffer overrun workaround (bsc#1051510).\n- e1000e: Do not wake up the system via WOL if device wakeup is disabled (bsc#1051510).\n- e1000e: Relax condition to trigger reset for ME workaround (bsc#1111666).\n- EDAC/amd64: Read back the scrub rate PCI register on F15h (bsc#1114279).\n- efi/random: Increase size of firmware supplied randomness (jsc#SLE-12423).\n- efi/random: Treat EFI_RNG_PROTOCOL output as bootloader randomness (jsc#SLE-12423).\n- efi: READ_ONCE rng seed size before munmap (jsc#SLE-12423).\n- efi: Reorder pr_notice() with add_device_randomness() call (jsc#SLE-12423).\n- evm: Check also if *tfm is an error pointer in init_desc() (bsc#1051510).\n- evm: Fix a small race in init_desc() (bsc#1051510).\n- ext4: fix a data race at inode-\u003ei_blocks (bsc#1171835).\n- ext4: fix partial cluster initialization when splitting extent (bsc#1173839).\n- ext4: fix race between ext4_sync_parent() and rename() (bsc#1173838).\n- ext4, jbd2: ensure panic by fix a race between jbd2 abort and ext4 error handlers (bsc#1173833).\n- extcon: adc-jack: Fix an error handling path in \u0027adc_jack_probe()\u0027 (bsc#1051510).\n- fanotify: fix ignore mask logic for events on child and on dir (bsc#1172719).\n- fdt: add support for rng-seed (jsc#SLE-12423).\n- fdt: Update CRC check for rng-seed (jsc#SLE-12423).\n- firmware: imx: scu: Fix corruption of header (git-fixes).\n- firmware: imx: scu: Fix possible memory leak in imx_scu_probe() (bsc#1111666).\n- Fix boot crash with MD (bsc#1174343)\n- fix multiplication overflow in copy_fdtable() (bsc#1173825).\n- fpga: dfl: afu: Corrected error handling levels (git-fixes).\n- fq_codel: fix TCA_FQ_CODEL_DROP_BATCH_SIZE sanity checks (networking-stable-20_05_12).\n- gpiolib: Document that GPIO line names are not globally unique (bsc#1051510).\n- gpu: host1x: Detach driver on unregister (bsc#1111666).\n- gpu: ipu-v3: pre: do not trigger update if buffer address does not change (bsc#1111666).\n- HID: magicmouse: do not set up autorepeat (git-fixes).\n- HID: sony: Fix for broken buttons on DS3 USB dongles (bsc#1051510).\n- hv_netvsc: Fix netvsc_start_xmit\u0027s return type (git-fixes).\n- hwmon: (acpi_power_meter) Fix potential memory leak in acpi_power_meter_add() (bsc#1111666).\n- hwmon: (emc2103) fix unable to change fan pwm1_enable attribute (bsc#1111666).\n- hwmon: (max6697) Make sure the OVERT mask is set correctly (bsc#1111666).\n- i2c: algo-pca: Add 0x78 as SCL stuck low status for PCA9665 (bsc#1111666).\n- i2c: eg20t: Load module automatically if ID matches (bsc#1111666).\n- i2c: mlxcpld: check correct size of maximum RECV_LEN packet (bsc#1111666).\n- i40e: reduce stack usage in i40e_set_fc (git-fixes).\n- IB/hfi1: Do not destroy hfi1_wq when the device is shut down (bsc#1174409).\n- IB/hfi1: Do not destroy link_wq when the device is shut down (bsc#1174409).\n- ibmveth: Fix max MTU limit (bsc#1173428 ltc#186397).\n- ibmvnic: continue to init in CRQ reset returns H_CLOSED (bsc#1173280 ltc#185369).\n- ibmvnic: Flush existing work items before device removal (bsc#1065729).\n- ibmvnic: Harden device login requests (bsc#1170011 ltc#183538).\n- iio: buffer: Do not allow buffers without any channels enabled to be activated (bsc#1051510).\n- iio:health:afe4404 Fix timestamp alignment and prevent data leak (bsc#1111666).\n- iio:humidity:hdc100x Fix alignment and data leak issues (bsc#1111666).\n- iio:magnetometer:ak8974: Fix alignment and data leak issues (bsc#1111666).\n- iio: mma8452: Add missed iio_device_unregister() call in mma8452_probe() (bsc#1111666).\n- iio: pressure: bmp280: Tolerate IRQ before registering (bsc#1051510).\n- iio:pressure:ms5611 Fix buffer element alignment (bsc#1111666).\n- iio: pressure: zpa2326: handle pm_runtime_get_sync failure (bsc#1111666).\n- ima: Directly assign the ima_default_policy pointer to ima_rules (bsc#1051510).\n- ima: Fix ima digest hash table key calculation (bsc#1051510).\n- include/asm-generic/topology.h: guard cpumask_of_node() macro argument (bsc#1148868).\n- Input: i8042 - add Lenovo XiaoXin Air 12 to i8042 nomux list (bsc#1111666).\n- input: i8042 - Remove special PowerPC handling (git-fixes).\n- Input: synaptics - add a second working PNP_ID for Lenovo T470s (bsc#1111666).\n- intel_idle: Graceful probe failure when MWAIT is disabled (bsc#1174115).\n- intel_th: Fix a NULL dereference when hub driver is not loaded (bsc#1111666).\n- ipvlan: call dev_change_flags when ipvlan mode is reset (git-fixes).\n- ixgbevf: Remove limit of 10 entries for unicast filter list (git-fixes).\n- jbd2: avoid leaking transaction credits when unreserving handle (bsc#1173845).\n- jbd2: Preserve kABI when adding j_abort_mutex (bsc#1173833).\n- kabi: hv: prevent struct device_node to become defined (bsc#1172871).\n- kabi: ppc64le: prevent struct dma_map_ops to become defined (jsc#SLE-12423).\n- kABI: protect struct mlx5_cmd_work_ent (kabi).\n- kABI: reintroduce inet_hashtables.h include to l2tp_ip (kabi).\n- kernfs: fix barrier usage in __kernfs_new_node() (bsc#1111666).\n- KVM: nVMX: Do not reread VMCS-agnostic state when switching VMCS (bsc#1114279).\n- KVM: nVMX: Skip IBPB when switching between vmcs01 and vmcs02 (bsc#1114279).\n- KVM: x86: Fix APIC page invalidation race (bsc#1174122).\n- kvm: x86: Fix L1TF mitigation for shadow MMU (bsc#1171904).\n- KVM: x86/mmu: Set mmio_value to \u00270\u0027 if reserved #PF can\u0027t be generated (bsc#1171904).\n- KVM: x86: only do L1TF workaround on affected processors (bsc#1171904).\n- l2tp: add sk_family checks to l2tp_validate_socket (networking-stable-20_06_07).\n- l2tp: do not use inet_hash()/inet_unhash() (networking-stable-20_06_07).\n- libceph: do not omit recovery_deletes in target_copy() (bsc#1174113).\n- libceph: ignore pool overlay and cache logic on redirects (bsc#1173146).\n- libnvdimm/bus: Fix wait_nvdimm_bus_probe_idle() ABBA deadlock (bsc#1171753).\n- libnvdimm/bus: Prepare the nd_ioctl() path to be re-entrant (bsc#1171753).\n- libnvdimm/bus: Stop holding nvdimm_bus_list_mutex over __nd_ioctl() (bsc#1171753).\n- libnvdimm: cover up changes in struct nvdimm_bus (bsc#1171753).\n- libnvdimm: cover up nd_pfn_sb changes (bsc#1171759).\n- libnvdimm/dax: Pick the right alignment default when creating dax devices (bsc#1171759).\n- libnvdimm/label: Remove the dpa align check (bsc#1171759).\n- libnvdimm/of_pmem: Provide a unique name for bus provider (bsc#1171739).\n- libnvdimm/pfn_dev: Add a build check to make sure we notice when struct page size change (bsc#1171743).\n- libnvdimm/pfn_dev: Add page size and struct page size to pfn superblock (bsc#1171759).\n- libnvdimm/pfn: Prevent raw mode fallback if pfn-infoblock valid (bsc#1171743).\n- libnvdimm/pmem: Advance namespace seed for specific probe errors (bsc#1171743).\n- libnvdimm/region: Initialize bad block for volatile namespaces (bnc#1151927 5.3.6).\n- libnvdimm/region: Rewrite _probe_success() to _advance_seeds() (bsc#1171743).\n- libnvdimm: Use PAGE_SIZE instead of SZ_4K for align check (bsc#1171759).\n- livepatch: Apply vmlinux-specific KLP relocations early (bsc#1071995).\n- livepatch: Disallow vmlinux.ko (bsc#1071995).\n- livepatch: Make klp_apply_object_relocs static (bsc#1071995).\n- livepatch: Prevent module-specific KLP rela sections from referencing vmlinux symbols (bsc#1071995).\n- livepatch: Remove .klp.arch (bsc#1071995).\n- loop: replace kill_bdev with invalidate_bdev (bsc#1173820).\n- lpfc_debugfs: get rid of pointless access_ok() (bsc#1172687 bsc#1171530).\n- lpfc: Synchronize NVME transport and lpfc driver devloss_tmo (bcs#1173060).\n- mac80211: add option for setting control flags (bsc#1111666).\n- mac80211: set IEEE80211_TX_CTRL_PORT_CTRL_PROTO for nl80211 TX (bsc#1111666).\n- mailbox: imx: Disable the clock on devm_mbox_controller_register() failure (git-fixes).\n- md: Avoid namespace collision with bitmap API (git fixes (block drivers)).\n- mdraid: fix read/write bytes accounting (bsc#1172537).\n- md: use memalloc scope APIs in mddev_suspend()/mddev_resume() (bsc#1166985)).\n- media: cec: silence shift wrapping warning in __cec_s_log_addrs() (git-fixes).\n- media: si2157: Better check for running tuner in init (bsc#1111666).\n- mlxsw: core: Do not use WQ_MEM_RECLAIM for mlxsw ordered workqueue (git-fixes).\n- mlxsw: core: Do not use WQ_MEM_RECLAIM for mlxsw workqueue (git-fixes).\n- mlxsw: pci: Return error on PCI reset timeout (git-fixes).\n- mlxsw: spectrum_acl_tcam: Position vchunk in a vregion list properly (networking-stable-20_05_12).\n- mlxsw: spectrum: Disallow prio-tagged packets when PVID is removed (git-fixes).\n- mlxsw: spectrum_dpipe: Add missing error path (git-fixes).\n- mlxsw: spectrum: Prevent force of 56G (git-fixes).\n- mlxsw: spectrum_router: Refresh nexthop neighbour when it becomes dead (git-fixes).\n- mlxsw: spectrum_router: Remove inappropriate usage of WARN_ON() (git-fixes).\n- mlxsw: spectrum_switchdev: Add MDB entries in prepare phase (git-fixes).\n- mlxsw: spectrum_switchdev: Do not treat static FDB entries as sticky (git-fixes).\n- mmc: block: Fix request completion in the CQE timeout path (bsc#1111666).\n- mmc: block: Fix use-after-free issue for rpmb (bsc#1111666).\n- mmc: fix compilation of user API (bsc#1051510).\n- mmc: sdhci: do not enable card detect interrupt for gpio cd type (bsc#1111666).\n- mmc: sdhci-msm: Set SDHCI_QUIRK_MULTIBLOCK_READ_ACMD12 quirk (bsc#1111666).\n- Move upstreamed lpfc patches into sorted section\n- mvpp2: remove misleading comment (git-fixes).\n- net: be more gentle about silly gso requests coming from user (networking-stable-20_06_07).\n- net: check untrusted gso_size at kernel entry (networking-stable-20_06_07).\n- net/cxgb4: Check the return from t4_query_params properly (git-fixes).\n- net: dsa: loop: Add module soft dependency (networking-stable-20_05_16).\n- net: dsa: mt7530: fix roaming from DSA user ports (networking-stable-20_05_27).\n- net: ena: add intr_moder_rx_interval to struct ena_com_dev and use it (git-fixes).\n- net: ena: add missing ethtool TX timestamping indication (git-fixes).\n- net: ena: avoid memory access violation by validating req_id properly (git-fixes).\n- net: ena: do not wake up tx queue when down (git-fixes).\n- net: ena: ena-com.c: prevent NULL pointer dereference (git-fixes).\n- net: ena: ethtool: use correct value for crc32 hash (git-fixes).\n- net: ena: fix continuous keep-alive resets (git-fixes).\n- net: ena: fix corruption of dev_idx_to_host_tbl (git-fixes).\n- net: ena: fix default tx interrupt moderation interval (git-fixes).\n- net: ena: fix incorrect default RSS key (git-fixes).\n- net: ena: fix incorrectly saving queue numbers when setting RSS indirection table (git-fixes).\n- net: ena: fix issues in setting interrupt moderation params in ethtool (git-fixes).\n- net: ena: fix potential crash when rxfh key is NULL (git-fixes).\n- net: ena: fix retrieval of nonadaptive interrupt moderation intervals (git-fixes).\n- net: ena: fix uses of round_jiffies() (git-fixes).\n- net: ena: make ena rxfh support ETH_RSS_HASH_NO_CHANGE (git-fixes).\n- net: ena: reimplement set/get_coalesce() (git-fixes).\n- net: ena: rss: do not allocate key when not supported (git-fixes).\n- net: ena: rss: fix failure to get indirection table (git-fixes).\n- net: ena: rss: store hash function as values and not bits (git-fixes).\n- netfilter: connlabels: prefer static lock initialiser (git-fixes).\n- netfilter: ctnetlink: netns exit must wait for callbacks (bsc#1169795).\n- netfilter: not mark a spinlock as __read_mostly (git-fixes).\n- net: fix a potential recursive NETDEV_FEAT_CHANGE (networking-stable-20_05_16).\n- net: inet_csk: Fix so_reuseport bind-address cache in tb-\u003efast* (networking-stable-20_05_27).\n- net: ipip: fix wrong address family in init error path (networking-stable-20_05_27).\n- net: ipvlan: Fix ipvlan device tso disabled while NETIF_F_IP_CSUM is set (git-fixes).\n- net: macsec: preserve ingress frame ordering (networking-stable-20_05_12).\n- net/mlx4_core: drop useless LIST_HEAD (git-fixes).\n- net/mlx4_core: fix a memory leak bug (git-fixes).\n- net/mlx4_core: Fix use of ENOSPC around mlx4_counter_alloc() (networking-stable-20_05_12).\n- net/mlx5: Add command entry handling completion (networking-stable-20_05_27).\n- net/mlx5: Avoid panic when setting vport rate (git-fixes).\n- net/mlx5: Continue driver initialization despite debugfs failure (git-fixes).\n- net/mlx5e: ethtool, Fix a typo in WOL function names (git-fixes).\n- net/mlx5e: Fix traffic duplication in ethtool steering (git-fixes).\n- net/mlx5e: Remove unnecessary clear_bit()s (git-fixes).\n- net/mlx5e: Update netdev txq on completions during closure (networking-stable-20_05_27).\n- net/mlx5: Fix command entry leak in Internal Error State (networking-stable-20_05_12).\n- net/mlx5: Fix crash upon suspend/resume (networking-stable-20_06_07).\n- net/mlx5: Fix forced completion access non initialized command entry (networking-stable-20_05_12).\n- net: mvmdio: allow up to four clocks to be specified for orion-mdio (git-fixes).\n- net: mvpp2: prs: Do not override the sign bit in SRAM parser shift (git-fixes).\n- net: phy: fix aneg restart in phy_ethtool_set_eee (networking-stable-20_05_16).\n- netprio_cgroup: Fix unlimited memory leak of v2 cgroups (networking-stable-20_05_16).\n- net: qede: stop adding events on an already destroyed workqueue (git-fixes).\n- net: qed: fix excessive QM ILT lines consumption (git-fixes).\n- net: qed: fix NVMe login fails over VFs (git-fixes).\n- net: qrtr: Fix passing invalid reference to qrtr_local_enqueue() (networking-stable-20_05_27).\n- net: revert \u0027net: get rid of an signed integer overflow in ip_idents_reserve()\u0027 (networking-stable-20_05_27).\n- net sched: fix reporting the first-time use timestamp (networking-stable-20_05_27).\n- net: stricter validation of untrusted gso packets (networking-stable-20_05_12).\n- net/tls: Fix sk_psock refcnt leak in bpf_exec_tx_verdict() (networking-stable-20_05_12).\n- net/tls: Fix sk_psock refcnt leak when in tls_data_ready() (networking-stable-20_05_12).\n- net: usb: qmi_wwan: add support for DW5816e (networking-stable-20_05_12).\n- net: usb: qmi_wwan: add Telit 0x1050 composition (networking-stable-20_06_07).\n- net: usb: qmi_wwan: add Telit LE910C1-EUX composition (networking-stable-20_06_07).\n- net: vmxnet3: fix possible buffer overflow caused by bad DMA value in vmxnet3_get_rss() (bsc#1172484).\n- nfp: bpf: fix code-gen bug on BPF_ALU | BPF_XOR | BPF_K (git-fixes).\n- NFS: Fix an RCU lock leak in nfs4_refresh_delegation_stateid() (bsc#1170592).\n- NFSv4: Retry CLOSE and DELEGRETURN on NFS4ERR_OLD_STATEID (bsc#1170592).\n- nilfs2: fix null pointer dereference at nilfs_segctor_do_construct() (bsc#1173857).\n- nl80211: fix NL80211_ATTR_CHANNEL_WIDTH attribute type (bsc#1111666).\n- nvdimm: Avoid race between probe and reading device attributes (bsc#1170442).\n- nvme: check for NVME_CTRL_LIVE in nvme_report_ns_ids() (bcs#1171558 bsc#1159058).\n- nvme: do not update multipath disk information if the controller is down (bcs#1171558 bsc#1159058).\n- nvme: fail cancelled commands with NVME_SC_HOST_PATH_ERROR (bsc#1158983 bsc#1172538).\n- nvme-fc: Fail transport errors with NVME_SC_HOST_PATH (bsc#1158983 bsc#1172538).\n- nvme-tcp: fail command with NVME_SC_HOST_PATH_ERROR send failed (bsc#1158983 bsc#1172538).\n- objtool: Clean instruction state before each function validation (bsc#1169514).\n- objtool: Ignore empty alternatives (bsc#1169514).\n- ocfs2: no need try to truncate file beyond i_size (bsc#1171841).\n- overflow: Fix -Wtype-limits compilation warnings (git fixes).\n- overflow.h: Add arithmetic shift helper (git fixes).\n- p54usb: add AirVasT USB stick device-id (bsc#1051510).\n- padata: ensure the reorder timer callback runs on the correct CPU (git-fixes).\n- padata: reorder work kABI fixup (git-fixes).\n- PCI/AER: Remove HEST/FIRMWARE_FIRST parsing for AER ownership (bsc#1174356).\n- PCI/AER: Use only _OSC to determine AER ownership (bsc#1174356).\n- PCI: Allow pci_resize_resource() for devices on root bus (bsc#1051510).\n- PCI: Fix pci_register_host_bridge() device_register() error handling (bsc#1051510).\n- PCI: Generalize multi-function power dependency device links (bsc#1111666).\n- PCI: hv: Change pci_protocol_version to per-hbus (bsc#1172871, bsc#1172872).\n- PCI: hv: Fix the PCI HyperV probe failure path to release resource properly (bsc#1172871, bsc#1172872).\n- PCI: hv: Introduce hv_msi_entry (bsc#1172871, bsc#1172872).\n- PCI: hv: Move hypercall related definitions into tlfs header (bsc#1172871, bsc#1172872).\n- PCI: hv: Move retarget related structures into tlfs header (bsc#1172871, bsc#1172872).\n- PCI: hv: Reorganize the code in preparation of hibernation (bsc#1172871, bsc#1172872).\n- PCI: hv: Retry PCI bus D0 entry on invalid device state (bsc#1172871, bsc#1172872).\n- PCI: pciehp: Fix indefinite wait on sysfs requests (git-fixes).\n- PCI: pciehp: Support interrupts sent from D3hot (git-fixes).\n- PCI/PM: Call .bridge_d3() hook only if non-NULL (git-fixes).\n- PCI: Program MPS for RCiEP devices (bsc#1051510).\n- PCI/PTM: Inherit Switch Downstream Port PTM settings from Upstream Port (bsc#1051510).\n- pci: Revive pci_dev __aer_firmware_first* fields for kABI (bsc#1174356).\n- pcm_native: result of put_user() needs to be checked (bsc#1111666).\n- perf: Allocate context task_ctx_data for child event (git-fixes).\n- perf/cgroup: Fix perf cgroup hierarchy support (git-fixes).\n- perf: Copy parent\u0027s address filter offsets on clone (git-fixes).\n- perf/core: Add sanity check to deal with pinned event failure (git-fixes).\n- perf/core: Avoid freeing static PMU contexts when PMU is unregistered (git-fixes).\n- perf/core: Correct event creation with PERF_FORMAT_GROUP (git-fixes).\n- perf/core: Do not WARN() for impossible ring-buffer sizes (git-fixes).\n- perf/core: Fix ctx_event_type in ctx_resched() (git-fixes).\n- perf/core: Fix error handling in perf_event_alloc() (git-fixes).\n- perf/core: Fix exclusive events\u0027 grouping (git-fixes).\n- perf/core: Fix group scheduling with mixed hw and sw events (git-fixes).\n- perf/core: Fix impossible ring-buffer sizes warning (git-fixes).\n- perf/core: Fix locking for children siblings group read (git-fixes).\n- perf/core: Fix lock inversion between perf,trace,cpuhp (git-fixes (dependent patch for 18736eef1213)).\n- perf/core: Fix perf_event_read_value() locking (git-fixes).\n- perf/core: Fix perf_pmu_unregister() locking (git-fixes).\n- perf/core: Fix __perf_read_group_add() locking (git-fixes (dependent patch)).\n- perf/core: Fix perf_sample_regs_user() mm check (git-fixes).\n- perf/core: Fix possible Spectre-v1 indexing for -\u003eaux_pages (git-fixes).\n- perf/core: Fix race between close() and fork() (git-fixes).\n- perf/core: Fix the address filtering fix (git-fixes).\n- perf/core: Fix use-after-free in uprobe_perf_close() (git-fixes).\n- perf/core: Force USER_DS when recording user stack data (git-fixes).\n- perf/core: Restore mmap record type correctly (git-fixes).\n- perf: Fix header.size for namespace events (git-fixes).\n- perf/ioctl: Add check for the sample_period value (git-fixes).\n- perf, pt, coresight: Fix address filters for vmas with non-zero offset (git-fixes).\n- perf: Return proper values for user stack errors (git-fixes).\n- perf/x86/amd: Constrain Large Increment per Cycle events (git-fixes).\n- perf/x86/amd/ibs: Fix reading of the IBS OpData register and thus precise RIP validity (git-fixes).\n- perf/x86/amd/ibs: Fix sample bias for dispatched micro-ops (git-fixes).\n- perf/x86/amd/ibs: Handle erratum #420 only on the affected CPU family (10h) (git-fixes).\n- perf/x86/amd/iommu: Make the \u0027amd_iommu_attr_groups\u0027 symbol static (git-fixes).\n- perf/x86/amd/uncore: Do not set \u0027ThreadMask\u0027 and \u0027SliceMask\u0027 for non-L3 PMCs (git-fixes stable).\n- perf/x86/amd/uncore: Set the thread mask for F17h L3 PMCs (git-fixes).\n- perf/x86/amd/uncore: Set ThreadMask and SliceMask for L3 Cache perf events (git-fixes stable).\n- perf/x86: Enable free running PEBS for REGS_USER/INTR (git-fixes).\n- perf/x86: Fix incorrect PEBS_REGS (git-fixes).\n- perf/x86/intel: Add generic branch tracing check to intel_pmu_has_bts() (git-fixes).\n- perf/x86/intel: Add proper condition to run sched_task callbacks (git-fixes).\n- perf/x86/intel/bts: Fix the use of page_private() (git-fixes).\n- perf/x86/intel: Fix PT PMI handling (git-fixes).\n- perf/x86/intel: Move branch tracing setup to the Intel-specific source file (git-fixes).\n- perf/x86/intel/uncore: Add Node ID mask (git-fixes).\n- perf/x86/intel/uncore: Fix PCI BDF address of M3UPI on SKX (git-fixes).\n- perf/x86/intel/uncore: Handle invalid event coding for free-running counter (git-fixes).\n- perf/x86/uncore: Fix event group support (git-fixes).\n- pid: Improve the comment about waiting in zap_pid_ns_processes (git fixes)).\n- pinctrl: freescale: imx: Fix an error handling path in \u0027imx_pinctrl_probe()\u0027 (bsc#1051510).\n- pinctrl: imxl: Fix an error handling path in \u0027imx1_pinctrl_core_probe()\u0027 (bsc#1051510).\n- pinctrl: samsung: Save/restore eint_mask over suspend for EINT_TYPE GPIOs (bsc#1051510).\n- platform/x86: dell-laptop: do not register micmute LED if there is no token (bsc#1111666).\n- platform/x86: hp-wmi: Convert simple_strtoul() to kstrtou32() (bsc#1111666).\n- PM / Domains: Allow genpd users to specify default active wakeup behavior (git-fixes).\n- pnp: Use list_for_each_entry() instead of open coding (git fixes).\n- powerpc/64s: Do not let DT CPU features set FSCR_DSCR (bsc#1065729).\n- powerpc/64s: Save FSCR to init_task.thread.fscr after feature init (bsc#1065729).\n- powerpc/book3s64: Export has_transparent_hugepage() related functions (bsc#1171759).\n- powerpc/book3s64/pkeys: Fix pkey_access_permitted() for execute disable pkey (bsc#1065729).\n- powerpc/fadump: fix race between pstore write and fadump crash trigger (bsc#1168959 ltc#185010).\n- powerpc/xive: Clear the page tables for the ESB IO mapping (bsc#1085030).\n- powerpc/xmon: Reset RCU and soft lockup watchdogs (bsc#1065729).\n- power: supply: bq24257_charger: Replace depends on REGMAP_I2C with select (bsc#1051510).\n- power: supply: lp8788: Fix an error handling path in \u0027lp8788_charger_probe()\u0027 (bsc#1051510).\n- power: supply: smb347-charger: IRQSTAT_D is volatile (bsc#1051510).\n- power: vexpress: add suppress_bind_attrs to true (bsc#1111666).\n- pppoe: only process PADT targeted at local interfaces (networking-stable-20_05_16).\n- qed: reduce maximum stack frame size (git-fixes).\n- qlcnic: fix missing release in qlcnic_83xx_interrupt_test (git-fixes).\n- r8152: support additional Microsoft Surface Ethernet Adapter variant (networking-stable-20_05_27).\n- raid5: remove gfp flags from scribble_alloc() (bsc#1166985).\n- RDMA/efa: Fix setting of wrong bit in get/set_feature commands (bsc#1111666)\n- RDMA/efa: Set maximum pkeys device attribute (bsc#1111666)\n- RDMA/efa: Support remote read access in MR registration (bsc#1111666)\n- RDMA/efa: Unified getters/setters for device structs bitmask access (bsc#1111666)\n- README.BRANCH: Add Takashi Iwai as primary maintainer.\n- regmap: debugfs: Do not sleep while atomic for fast_io regmaps (bsc#1111666).\n- resolve KABI warning for perf-pt-coresight (git-fixes).\n- Revert \u0027bcache: ignore pending signals when creating gc and allocator thread\u0027 (git fixes (block drivers)).\n- Revert commit e918e570415c (\u0027tpm_tis: Remove the HID IFX0102\u0027) (bsc#1111666).\n- Revert \u0027dm crypt: use WQ_HIGHPRI for the IO and crypt workqueues\u0027 (git fixes (block drivers)).\n- Revert \u0027thermal: mediatek: fix register index error\u0027 (bsc#1111666).\n- Revert \u0027tools lib traceevent: Remove unneeded qsort and uses memmove\u0027\n- s390/bpf: Maintain 8-byte stack alignment (bsc#1169194).\n- s390: fix syscall_get_error for compat processes (git-fixes).\n- s390/qdio: consistently restore the IRQ handler (git-fixes).\n- s390/qdio: lock device while installing IRQ handler (git-fixes).\n- s390/qdio: put thinint indicator after early error (git-fixes).\n- s390/qdio: tear down thinint indicator after early error (git-fixes).\n- s390/qeth: fix error handling for isolation mode cmds (git-fixes).\n- sch_choke: avoid potential panic in choke_reset() (networking-stable-20_05_12).\n- sch_sfq: validate silly quantum values (networking-stable-20_05_12).\n- scsi: aacraid: fix a signedness bug (bsc#1174296).\n- scsi: hisi_sas: fix calls to dma_set_mask_and_coherent() (bsc#1174296).\n- scsi: ibmvscsi: Do not send host info in adapter info MAD after LPM (bsc#1172759 ltc#184814).\n- scsi: lpfc: Add an internal trace log buffer (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Add blk_io_poll support for latency improvment (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Add support to display if adapter dumps are available (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Allow applications to issue Common Set Features mailbox command (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Avoid another null dereference in lpfc_sli4_hba_unset() (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix inconsistent indenting (bsc#1158983).\n- scsi: lpfc: Fix interrupt assignments when multiple vectors are supported on same CPU (bsc#1158983).\n- scsi: lpfc: Fix kdump hang on PPC (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix language in 0373 message to reflect non-error message (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix less-than-zero comparison of unsigned value (bsc#1158983).\n- scsi: lpfc: Fix missing MDS functionality (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix NVMe rport deregister and registration during ADISC (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix oops due to overrun when reading SLI3 data (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix shost refcount mismatch when deleting vport (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix stack trace seen while setting rrq active (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix unused assignment in lpfc_sli4_bsg_link_diag_test (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Update lpfc version to 12.8.0.2 (bsc#1158983).\n- scsi: megaraid_sas: Fix a compilation warning (bsc#1174296).\n- scsi: mpt3sas: Fix double free in attach error handling (bsc#1174296).\n- scsi: qedf: Add port_id getter (bsc#1150660).\n- scsi: qla2xxx: Fix a condition in qla2x00_find_all_fabric_devs() (bsc#1174296).\n- scsi: qla2xxx: Set NVMe status code for failed NVMe FCP request (bsc#1158983).\n- sctp: Do not add the shutdown timer if its already been added (networking-stable-20_05_27).\n- sctp: Start shutdown on association restart if in SHUTDOWN-SENT state and socket is closed (networking-stable-20_05_27).\n- spi: dw: use \u0027smp_mb()\u0027 to avoid sending spi data error (bsc#1051510).\n- spi: fix initial SPI_SR value in spi-fsl-dspi (bsc#1111666).\n- spi: pxa2xx: Apply CS clk quirk to BXT (bsc#1111666).\n- spi: spidev: fix a race between spidev_release and spidev_remove (bsc#1111666).\n- spi: spi-mem: Fix Dual/Quad modes on Octal-capable devices (bsc#1111666).\n- spi: spi-sun6i: sun6i_spi_transfer_one(): fix setting of clock rate (bsc#1111666).\n- staging: comedi: verify array index is correct before using it (bsc#1111666).\n- staging: rtl8712: Fix IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK (bsc#1051510).\n- staging: sm750fb: add missing case while setting FB_VISUAL (bsc#1051510).\n- SUNRPC: The TCP back channel mustn\u0027t disappear while requests are outstanding (bsc#1152624).\n- tg3: driver sleeps indefinitely when EEH errors exceed eeh_max_freezes (bsc#1173284).\n- timers: Add a function to start/reduce a timer (networking-stable-20_05_27).\n- tpm_tis: extra chip-\u003eops check on error path in tpm_tis_core_init (bsc#1111666).\n- tpm_tis: Remove the HID IFX0102 (bsc#1111666).\n- tracing: Fix event trigger to accept redundant spaces (git-fixes).\n- tty: n_gsm: Fix bogus i++ in gsm_data_kick (bsc#1051510).\n- tty: n_gsm: Fix SOF skipping (bsc#1051510).\n- tty: n_gsm: Fix waking up upper tty layer when room available (bsc#1051510).\n- tunnel: Propagate ECT(1) when decapsulating as recommended by RFC6040 (networking-stable-20_05_12).\n- ubifs: remove broken lazytime support (bsc#1173826).\n- usb: add USB_QUIRK_DELAY_INIT for Logitech C922 (git-fixes).\n- USB: c67x00: fix use after free in c67x00_giveback_urb (bsc#1111666).\n- usb: chipidea: core: add wakeup support for extcon (bsc#1111666).\n- usb: dwc2: Fix shutdown callback in platform (bsc#1111666).\n- usb: dwc2: gadget: move gadget resume after the core is in L0 state (bsc#1051510).\n- usb: dwc3: gadget: introduce cancelled_list (git-fixes).\n- usb: dwc3: gadget: never call -\u003ecomplete() from -\u003eep_queue() (git-fixes).\n- usb: dwc3: gadget: Properly handle ClearFeature(halt) (git-fixes).\n- usb: dwc3: gadget: Properly handle failed kick_transfer (git-fixes).\n- USB: ehci: reopen solution for Synopsys HC bug (git-fixes).\n- usb: gadget: fix potential double-free in m66592_probe (bsc#1111666).\n- usb: gadget: lpc32xx_udc: do not dereference ep pointer before null check (bsc#1051510).\n- usb: gadget: udc: atmel: fix uninitialized read in debug printk (bsc#1111666).\n- usb: gadget: udc: atmel: remove outdated comment in usba_ep_disable() (bsc#1111666).\n- usb: gadget: udc: Potential Oops in error handling code (bsc#1111666).\n- USB: gadget: udc: s3c2410_udc: Remove pointless NULL check in s3c2410_udc_nuke (bsc#1051510).\n- usb: host: ehci-exynos: Fix error check in exynos_ehci_probe() (bsc#1111666).\n- USB: host: ehci-mxc: Add error handling in ehci_mxc_drv_probe() (bsc#1051510).\n- usb: musb: Fix runtime PM imbalance on error (bsc#1051510).\n- usb: musb: start session in resume for host port (bsc#1051510).\n- usbnet: smsc95xx: Fix use-after-free after removal (bsc#1111666).\n- USB: ohci-sm501: Add missed iounmap() in remove (bsc#1111666).\n- USB: serial: ch341: add new Product ID for CH340 (bsc#1111666).\n- USB: serial: cypress_m8: enable Simply Automated UPB PIM (bsc#1111666).\n- USB: serial: iuu_phoenix: fix memory corruption (bsc#1111666).\n- USB: serial: option: add GosunCn GM500 series (bsc#1111666).\n- USB: serial: option: add Quectel EG95 LTE modem (bsc#1111666).\n- USB: serial: option: add Telit LE910C1-EUX compositions (bsc#1051510).\n- USB: serial: qcserial: add DW5816e QDL support (bsc#1051510).\n- USB: serial: usb_wwan: do not resubmit rx urb on fatal errors (bsc#1051510).\n- USB: serial: usb_wwan: do not resubmit rx urb on fatal errors (git-fixes).\n- vfio/pci: Fix SR-IOV VF handling with MMIO blocking (bsc#1174123).\n- vfs: Fix EOVERFLOW testing in put_compat_statfs64 (bnc#1151927 5.3.6).\n- virtio-blk: handle block_device_operations callbacks after hot unplug (git fixes (block drivers)).\n- vmxnet3: add geneve and vxlan tunnel offload support (bsc#1172484).\n- vmxnet3: add support to get/set rx flow hash (bsc#1172484).\n- vmxnet3: allow rx flow hash ops only when rss is enabled (bsc#1172484).\n- vmxnet3: avoid format strint overflow warning (bsc#1172484).\n- vmxnet3: prepare for version 4 changes (bsc#1172484).\n- vmxnet3: Remove always false conditional statement (bsc#1172484).\n- vmxnet3: remove redundant initialization of pointer \u0027rq\u0027 (bsc#1172484).\n- vmxnet3: remove unused flag \u0027rxcsum\u0027 from struct vmxnet3_adapter (bsc#1172484).\n- vmxnet3: Replace msleep(1) with usleep_range() (bsc#1172484).\n- vmxnet3: update to version 4 (bsc#1172484).\n- vmxnet3: use correct hdr reference when packet is encapsulated (bsc#1172484).\n- vsock: fix timeout in vsock_accept() (networking-stable-20_06_07).\n- vxlan: Avoid infinite loop when suppressing NS messages with invalid options (git-fixes).\n- w1: omap-hdq: cleanup to add missing newline for some dev_dbg (bsc#1051510).\n- watchdog: sp805: fix restart handler (bsc#1111666).\n- wil6210: add general initialization/size checks (bsc#1111666).\n- wil6210: check rx_buff_mgmt before accessing it (bsc#1111666).\n- wil6210: ignore HALP ICR if already handled (bsc#1111666).\n- wil6210: make sure Rx ring sizes are correlated (git-fixes).\n- work around mvfs bug (bsc#1162063).\n- x86/apic: Install an empty physflat_init_apic_ldr (bsc#1163309).\n- x86/cpu/amd: Make erratum #1054 a legacy erratum (bsc#1114279).\n- x86/events/intel/ds: Add PERF_SAMPLE_PERIOD into PEBS_FREERUNNING_FLAGS (git-fixes).\n- x86: Fix early boot crash on gcc-10, third try (bsc#1114279).\n- x86/{mce,mm}: Unmap the entire page if the whole page is affected and poisoned (bsc#1172257).\n- x86/reboot/quirks: Add MacBook6,1 reboot quirk (bsc#1114279).\n- xfrm: fix error in comment (git fixes).\n- xhci: Fix incorrect EP_STATE_MASK (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-2107,SUSE-SLE-Module-Basesystem-15-SP1-2020-2107,SUSE-SLE-Module-Development-Tools-15-SP1-2020-2107,SUSE-SLE-Module-Legacy-15-SP1-2020-2107,SUSE-SLE-Module-Live-Patching-15-SP1-2020-2107,SUSE-SLE-Product-HA-15-SP1-2020-2107,SUSE-SLE-Product-WE-15-SP1-2020-2107", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2107-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:2107-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20202107-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:2107-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-August/007212.html" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1085030", "url": "https://bugzilla.suse.com/1085030" }, { "category": "self", "summary": "SUSE Bug 1111666", "url": "https://bugzilla.suse.com/1111666" }, { "category": "self", "summary": "SUSE Bug 1112178", "url": "https://bugzilla.suse.com/1112178" }, { "category": "self", "summary": "SUSE Bug 1113956", "url": "https://bugzilla.suse.com/1113956" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1144333", "url": "https://bugzilla.suse.com/1144333" }, { "category": "self", "summary": "SUSE Bug 1148868", "url": "https://bugzilla.suse.com/1148868" }, { "category": "self", "summary": "SUSE Bug 1150660", "url": "https://bugzilla.suse.com/1150660" }, { "category": "self", "summary": "SUSE Bug 1151927", "url": "https://bugzilla.suse.com/1151927" }, { "category": "self", "summary": "SUSE Bug 1152107", "url": "https://bugzilla.suse.com/1152107" }, { "category": "self", "summary": "SUSE Bug 1152624", "url": "https://bugzilla.suse.com/1152624" }, { "category": "self", "summary": "SUSE Bug 1158983", "url": "https://bugzilla.suse.com/1158983" }, { "category": "self", "summary": "SUSE Bug 1159058", "url": "https://bugzilla.suse.com/1159058" }, { "category": "self", "summary": "SUSE Bug 1161016", "url": "https://bugzilla.suse.com/1161016" }, { "category": "self", "summary": "SUSE Bug 1162002", "url": "https://bugzilla.suse.com/1162002" }, { "category": "self", "summary": "SUSE Bug 1162063", "url": "https://bugzilla.suse.com/1162063" }, { "category": "self", "summary": "SUSE Bug 1163309", "url": "https://bugzilla.suse.com/1163309" }, { "category": "self", "summary": "SUSE Bug 1166985", "url": "https://bugzilla.suse.com/1166985" }, { "category": "self", "summary": "SUSE Bug 1167104", "url": "https://bugzilla.suse.com/1167104" }, { "category": "self", "summary": "SUSE Bug 1168081", "url": "https://bugzilla.suse.com/1168081" }, { "category": "self", "summary": "SUSE Bug 1168959", "url": "https://bugzilla.suse.com/1168959" }, { "category": "self", "summary": "SUSE Bug 1169194", "url": "https://bugzilla.suse.com/1169194" }, { "category": "self", "summary": "SUSE Bug 1169514", "url": "https://bugzilla.suse.com/1169514" }, { "category": "self", "summary": "SUSE Bug 1169771", "url": "https://bugzilla.suse.com/1169771" }, { "category": "self", "summary": "SUSE Bug 1169795", "url": "https://bugzilla.suse.com/1169795" }, { "category": "self", "summary": "SUSE Bug 1170011", "url": "https://bugzilla.suse.com/1170011" }, { "category": "self", "summary": "SUSE Bug 1170442", "url": "https://bugzilla.suse.com/1170442" }, { "category": "self", "summary": "SUSE Bug 1170592", "url": "https://bugzilla.suse.com/1170592" }, { "category": "self", "summary": "SUSE Bug 1170617", "url": "https://bugzilla.suse.com/1170617" }, { "category": "self", "summary": "SUSE Bug 1170618", "url": "https://bugzilla.suse.com/1170618" }, { "category": "self", "summary": "SUSE Bug 1171124", "url": "https://bugzilla.suse.com/1171124" }, { "category": "self", "summary": "SUSE Bug 1171424", "url": "https://bugzilla.suse.com/1171424" }, { "category": "self", "summary": "SUSE Bug 1171529", "url": "https://bugzilla.suse.com/1171529" }, { "category": "self", "summary": "SUSE Bug 1171530", "url": "https://bugzilla.suse.com/1171530" }, { "category": "self", "summary": "SUSE Bug 1171558", "url": "https://bugzilla.suse.com/1171558" }, { "category": "self", "summary": "SUSE Bug 1171732", "url": "https://bugzilla.suse.com/1171732" }, { "category": "self", "summary": "SUSE Bug 1171739", "url": "https://bugzilla.suse.com/1171739" }, { "category": "self", "summary": "SUSE Bug 1171743", "url": "https://bugzilla.suse.com/1171743" }, { "category": "self", "summary": "SUSE Bug 1171753", "url": "https://bugzilla.suse.com/1171753" }, { "category": "self", "summary": "SUSE Bug 1171759", "url": "https://bugzilla.suse.com/1171759" }, { "category": "self", "summary": "SUSE Bug 1171835", "url": "https://bugzilla.suse.com/1171835" }, { "category": "self", "summary": "SUSE Bug 1171841", "url": "https://bugzilla.suse.com/1171841" }, { "category": "self", "summary": "SUSE Bug 1171868", "url": "https://bugzilla.suse.com/1171868" }, { "category": "self", "summary": "SUSE Bug 1171904", "url": "https://bugzilla.suse.com/1171904" }, { "category": "self", "summary": "SUSE Bug 1172247", "url": "https://bugzilla.suse.com/1172247" }, { "category": "self", "summary": "SUSE Bug 1172257", "url": "https://bugzilla.suse.com/1172257" }, { "category": "self", "summary": "SUSE Bug 1172344", "url": "https://bugzilla.suse.com/1172344" }, { "category": "self", "summary": "SUSE Bug 1172458", "url": "https://bugzilla.suse.com/1172458" }, { "category": "self", "summary": "SUSE Bug 1172484", "url": "https://bugzilla.suse.com/1172484" }, { "category": "self", "summary": "SUSE Bug 1172537", "url": "https://bugzilla.suse.com/1172537" }, { "category": "self", "summary": "SUSE Bug 1172538", "url": "https://bugzilla.suse.com/1172538" }, { "category": "self", "summary": "SUSE Bug 1172687", "url": "https://bugzilla.suse.com/1172687" }, { "category": "self", "summary": "SUSE Bug 1172719", "url": "https://bugzilla.suse.com/1172719" }, { "category": "self", "summary": "SUSE Bug 1172759", "url": "https://bugzilla.suse.com/1172759" }, { "category": "self", "summary": "SUSE Bug 1172775", "url": "https://bugzilla.suse.com/1172775" }, { "category": "self", "summary": "SUSE Bug 1172781", "url": "https://bugzilla.suse.com/1172781" }, { "category": "self", "summary": "SUSE Bug 1172782", "url": "https://bugzilla.suse.com/1172782" }, { "category": "self", "summary": "SUSE Bug 1172783", "url": "https://bugzilla.suse.com/1172783" }, { "category": "self", "summary": "SUSE Bug 1172871", "url": "https://bugzilla.suse.com/1172871" }, { "category": "self", "summary": "SUSE Bug 1172872", "url": "https://bugzilla.suse.com/1172872" }, { "category": "self", "summary": "SUSE Bug 1172999", "url": "https://bugzilla.suse.com/1172999" }, { "category": "self", "summary": "SUSE Bug 1173060", "url": "https://bugzilla.suse.com/1173060" }, { "category": "self", "summary": "SUSE Bug 1173074", "url": "https://bugzilla.suse.com/1173074" }, { "category": "self", "summary": "SUSE Bug 1173146", "url": "https://bugzilla.suse.com/1173146" }, { "category": "self", "summary": "SUSE Bug 1173265", "url": "https://bugzilla.suse.com/1173265" }, { "category": "self", "summary": "SUSE Bug 1173280", "url": "https://bugzilla.suse.com/1173280" }, { "category": "self", "summary": "SUSE Bug 1173284", "url": "https://bugzilla.suse.com/1173284" }, { "category": "self", "summary": "SUSE Bug 1173428", "url": "https://bugzilla.suse.com/1173428" }, { "category": "self", "summary": "SUSE Bug 1173514", "url": "https://bugzilla.suse.com/1173514" }, { "category": "self", "summary": "SUSE Bug 1173567", "url": "https://bugzilla.suse.com/1173567" }, { "category": "self", "summary": "SUSE Bug 1173573", "url": "https://bugzilla.suse.com/1173573" }, { "category": "self", "summary": "SUSE Bug 1173659", "url": "https://bugzilla.suse.com/1173659" }, { "category": "self", "summary": "SUSE Bug 1173746", "url": "https://bugzilla.suse.com/1173746" }, { "category": "self", "summary": "SUSE Bug 1173818", "url": "https://bugzilla.suse.com/1173818" }, { "category": "self", "summary": "SUSE Bug 1173820", "url": "https://bugzilla.suse.com/1173820" }, { "category": "self", "summary": "SUSE Bug 1173825", "url": "https://bugzilla.suse.com/1173825" }, { "category": "self", "summary": "SUSE Bug 1173826", "url": "https://bugzilla.suse.com/1173826" }, { "category": "self", "summary": "SUSE Bug 1173833", "url": "https://bugzilla.suse.com/1173833" }, { "category": "self", "summary": "SUSE Bug 1173838", "url": "https://bugzilla.suse.com/1173838" }, { "category": "self", "summary": "SUSE Bug 1173839", "url": "https://bugzilla.suse.com/1173839" }, { "category": "self", "summary": "SUSE Bug 1173845", "url": "https://bugzilla.suse.com/1173845" }, { "category": "self", "summary": "SUSE Bug 1173857", "url": "https://bugzilla.suse.com/1173857" }, { "category": "self", "summary": "SUSE Bug 1174113", "url": "https://bugzilla.suse.com/1174113" }, { "category": "self", "summary": "SUSE Bug 1174115", "url": "https://bugzilla.suse.com/1174115" }, { "category": "self", "summary": "SUSE Bug 1174122", "url": "https://bugzilla.suse.com/1174122" }, { "category": "self", "summary": "SUSE Bug 1174123", "url": "https://bugzilla.suse.com/1174123" }, { "category": "self", "summary": "SUSE Bug 1174186", "url": "https://bugzilla.suse.com/1174186" }, { "category": "self", "summary": "SUSE Bug 1174187", "url": "https://bugzilla.suse.com/1174187" }, { "category": "self", "summary": "SUSE Bug 1174296", "url": "https://bugzilla.suse.com/1174296" }, { "category": "self", "summary": "SUSE Bug 1174343", "url": "https://bugzilla.suse.com/1174343" }, { "category": "self", "summary": "SUSE Bug 1174356", "url": "https://bugzilla.suse.com/1174356" }, { "category": "self", "summary": "SUSE Bug 1174409", "url": "https://bugzilla.suse.com/1174409" }, { "category": "self", "summary": "SUSE Bug 1174438", "url": "https://bugzilla.suse.com/1174438" }, { "category": "self", "summary": "SUSE Bug 1174462", "url": "https://bugzilla.suse.com/1174462" }, { "category": "self", "summary": "SUSE Bug 1174543", "url": "https://bugzilla.suse.com/1174543" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16746 page", "url": "https://www.suse.com/security/cve/CVE-2019-16746/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20810 page", "url": "https://www.suse.com/security/cve/CVE-2019-20810/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20908 page", "url": "https://www.suse.com/security/cve/CVE-2019-20908/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0305 page", "url": "https://www.suse.com/security/cve/CVE-2020-0305/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10766 page", "url": "https://www.suse.com/security/cve/CVE-2020-10766/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10767 page", "url": "https://www.suse.com/security/cve/CVE-2020-10767/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10768 page", "url": "https://www.suse.com/security/cve/CVE-2020-10768/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10769 page", "url": "https://www.suse.com/security/cve/CVE-2020-10769/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10773 page", "url": "https://www.suse.com/security/cve/CVE-2020-10773/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10781 page", "url": "https://www.suse.com/security/cve/CVE-2020-10781/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12771 page", "url": "https://www.suse.com/security/cve/CVE-2020-12771/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12888 page", "url": "https://www.suse.com/security/cve/CVE-2020-12888/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-13974 page", "url": "https://www.suse.com/security/cve/CVE-2020-13974/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14416 page", "url": "https://www.suse.com/security/cve/CVE-2020-14416/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15393 page", "url": "https://www.suse.com/security/cve/CVE-2020-15393/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15780 page", "url": "https://www.suse.com/security/cve/CVE-2020-15780/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-08-03T14:45:27Z", "generator": { "date": "2020-08-03T14:45:27Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:2107-1", "initial_release_date": "2020-08-03T14:45:27Z", "revision_history": [ { "date": "2020-08-03T14:45:27Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-197.48.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.12.14-197.48.1.aarch64", "product_id": "cluster-md-kmp-default-4.12.14-197.48.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-197.48.1.aarch64", "product": { "name": "dlm-kmp-default-4.12.14-197.48.1.aarch64", "product_id": "dlm-kmp-default-4.12.14-197.48.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-197.48.1.aarch64", "product": { "name": "gfs2-kmp-default-4.12.14-197.48.1.aarch64", "product_id": "gfs2-kmp-default-4.12.14-197.48.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-197.48.1.aarch64", "product": { "name": "kernel-default-4.12.14-197.48.1.aarch64", "product_id": "kernel-default-4.12.14-197.48.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-197.48.1.aarch64", "product": { "name": "kernel-default-base-4.12.14-197.48.1.aarch64", "product_id": "kernel-default-base-4.12.14-197.48.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-197.48.1.aarch64", "product": { "name": "kernel-default-devel-4.12.14-197.48.1.aarch64", "product_id": "kernel-default-devel-4.12.14-197.48.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-197.48.1.aarch64", "product": { "name": "kernel-default-extra-4.12.14-197.48.1.aarch64", "product_id": "kernel-default-extra-4.12.14-197.48.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-197.48.1.aarch64", "product": { "name": "kernel-default-livepatch-4.12.14-197.48.1.aarch64", "product_id": "kernel-default-livepatch-4.12.14-197.48.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-197.48.1.aarch64", "product": { "name": "kernel-default-livepatch-devel-4.12.14-197.48.1.aarch64", "product_id": "kernel-default-livepatch-devel-4.12.14-197.48.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-197.48.1.aarch64", "product": { "name": "kernel-obs-build-4.12.14-197.48.1.aarch64", "product_id": "kernel-obs-build-4.12.14-197.48.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-197.48.1.aarch64", "product": { "name": "kernel-obs-qa-4.12.14-197.48.1.aarch64", "product_id": "kernel-obs-qa-4.12.14-197.48.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-197.48.1.aarch64", "product": { "name": "kernel-syms-4.12.14-197.48.1.aarch64", "product_id": "kernel-syms-4.12.14-197.48.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-197.48.1.aarch64", "product": { "name": "kernel-vanilla-4.12.14-197.48.1.aarch64", "product_id": "kernel-vanilla-4.12.14-197.48.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-197.48.1.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-197.48.1.aarch64", "product_id": "kernel-vanilla-base-4.12.14-197.48.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-197.48.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.12.14-197.48.1.aarch64", "product_id": "kernel-vanilla-devel-4.12.14-197.48.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-197.48.1.aarch64", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-197.48.1.aarch64", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.48.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-197.48.1.aarch64", "product": { "name": "kselftests-kmp-default-4.12.14-197.48.1.aarch64", "product_id": "kselftests-kmp-default-4.12.14-197.48.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-197.48.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.12.14-197.48.1.aarch64", "product_id": "ocfs2-kmp-default-4.12.14-197.48.1.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-197.48.1.aarch64", "product": { "name": "reiserfs-kmp-default-4.12.14-197.48.1.aarch64", "product_id": "reiserfs-kmp-default-4.12.14-197.48.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-197.48.1.noarch", "product": { "name": "kernel-devel-4.12.14-197.48.1.noarch", "product_id": "kernel-devel-4.12.14-197.48.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-197.48.1.noarch", "product": { "name": "kernel-docs-4.12.14-197.48.1.noarch", "product_id": "kernel-docs-4.12.14-197.48.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-197.48.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-197.48.1.noarch", "product_id": "kernel-docs-html-4.12.14-197.48.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-197.48.1.noarch", "product": { "name": "kernel-macros-4.12.14-197.48.1.noarch", "product_id": "kernel-macros-4.12.14-197.48.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-197.48.1.noarch", "product": { "name": "kernel-source-4.12.14-197.48.1.noarch", "product_id": "kernel-source-4.12.14-197.48.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-197.48.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-197.48.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-197.48.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-197.48.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.12.14-197.48.1.ppc64le", "product_id": "cluster-md-kmp-default-4.12.14-197.48.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-197.48.1.ppc64le", "product": { "name": "dlm-kmp-default-4.12.14-197.48.1.ppc64le", "product_id": "dlm-kmp-default-4.12.14-197.48.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-197.48.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.12.14-197.48.1.ppc64le", "product_id": "gfs2-kmp-default-4.12.14-197.48.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-197.48.1.ppc64le", "product": { "name": "kernel-debug-4.12.14-197.48.1.ppc64le", "product_id": "kernel-debug-4.12.14-197.48.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-197.48.1.ppc64le", "product": { "name": "kernel-debug-base-4.12.14-197.48.1.ppc64le", "product_id": "kernel-debug-base-4.12.14-197.48.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-197.48.1.ppc64le", "product": { "name": "kernel-debug-devel-4.12.14-197.48.1.ppc64le", "product_id": "kernel-debug-devel-4.12.14-197.48.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-4.12.14-197.48.1.ppc64le", "product": { "name": "kernel-debug-livepatch-devel-4.12.14-197.48.1.ppc64le", "product_id": "kernel-debug-livepatch-devel-4.12.14-197.48.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.12.14-197.48.1.ppc64le", "product": { "name": "kernel-default-4.12.14-197.48.1.ppc64le", "product_id": "kernel-default-4.12.14-197.48.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-197.48.1.ppc64le", "product": { "name": "kernel-default-base-4.12.14-197.48.1.ppc64le", "product_id": "kernel-default-base-4.12.14-197.48.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-197.48.1.ppc64le", "product": { "name": "kernel-default-devel-4.12.14-197.48.1.ppc64le", "product_id": "kernel-default-devel-4.12.14-197.48.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-197.48.1.ppc64le", "product": { "name": "kernel-default-extra-4.12.14-197.48.1.ppc64le", "product_id": "kernel-default-extra-4.12.14-197.48.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-197.48.1.ppc64le", "product": { "name": "kernel-default-livepatch-4.12.14-197.48.1.ppc64le", "product_id": "kernel-default-livepatch-4.12.14-197.48.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-197.48.1.ppc64le", "product": { "name": "kernel-default-livepatch-devel-4.12.14-197.48.1.ppc64le", "product_id": "kernel-default-livepatch-devel-4.12.14-197.48.1.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_48-default-1-3.3.1.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-197_48-default-1-3.3.1.ppc64le", "product_id": "kernel-livepatch-4_12_14-197_48-default-1-3.3.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-197.48.1.ppc64le", "product": { "name": "kernel-obs-build-4.12.14-197.48.1.ppc64le", "product_id": "kernel-obs-build-4.12.14-197.48.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-197.48.1.ppc64le", "product": { "name": "kernel-obs-qa-4.12.14-197.48.1.ppc64le", "product_id": "kernel-obs-qa-4.12.14-197.48.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-197.48.1.ppc64le", "product": { "name": "kernel-syms-4.12.14-197.48.1.ppc64le", "product_id": "kernel-syms-4.12.14-197.48.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-197.48.1.ppc64le", "product": { "name": "kernel-vanilla-4.12.14-197.48.1.ppc64le", "product_id": "kernel-vanilla-4.12.14-197.48.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-197.48.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-197.48.1.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-197.48.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-197.48.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.12.14-197.48.1.ppc64le", "product_id": "kernel-vanilla-devel-4.12.14-197.48.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-197.48.1.ppc64le", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-197.48.1.ppc64le", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.48.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-197.48.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.12.14-197.48.1.ppc64le", "product_id": "kselftests-kmp-default-4.12.14-197.48.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-197.48.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.12.14-197.48.1.ppc64le", "product_id": "ocfs2-kmp-default-4.12.14-197.48.1.ppc64le" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-197.48.1.ppc64le", "product": { "name": "reiserfs-kmp-default-4.12.14-197.48.1.ppc64le", "product_id": "reiserfs-kmp-default-4.12.14-197.48.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-197.48.1.s390x", "product": { "name": "cluster-md-kmp-default-4.12.14-197.48.1.s390x", "product_id": "cluster-md-kmp-default-4.12.14-197.48.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-197.48.1.s390x", "product": { "name": "dlm-kmp-default-4.12.14-197.48.1.s390x", "product_id": "dlm-kmp-default-4.12.14-197.48.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-197.48.1.s390x", "product": { "name": "gfs2-kmp-default-4.12.14-197.48.1.s390x", "product_id": "gfs2-kmp-default-4.12.14-197.48.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.12.14-197.48.1.s390x", "product": { "name": "kernel-default-4.12.14-197.48.1.s390x", "product_id": "kernel-default-4.12.14-197.48.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-197.48.1.s390x", "product": { "name": "kernel-default-base-4.12.14-197.48.1.s390x", "product_id": "kernel-default-base-4.12.14-197.48.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-197.48.1.s390x", "product": { "name": "kernel-default-devel-4.12.14-197.48.1.s390x", "product_id": "kernel-default-devel-4.12.14-197.48.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-197.48.1.s390x", "product": { "name": "kernel-default-extra-4.12.14-197.48.1.s390x", "product_id": "kernel-default-extra-4.12.14-197.48.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-197.48.1.s390x", "product": { "name": "kernel-default-livepatch-4.12.14-197.48.1.s390x", "product_id": "kernel-default-livepatch-4.12.14-197.48.1.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-197.48.1.s390x", "product": { "name": "kernel-default-livepatch-devel-4.12.14-197.48.1.s390x", "product_id": "kernel-default-livepatch-devel-4.12.14-197.48.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.12.14-197.48.1.s390x", "product": { "name": "kernel-default-man-4.12.14-197.48.1.s390x", "product_id": "kernel-default-man-4.12.14-197.48.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-197.48.1.s390x", "product": { "name": "kernel-obs-build-4.12.14-197.48.1.s390x", "product_id": "kernel-obs-build-4.12.14-197.48.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-197.48.1.s390x", "product": { "name": "kernel-obs-qa-4.12.14-197.48.1.s390x", "product_id": "kernel-obs-qa-4.12.14-197.48.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-197.48.1.s390x", "product": { "name": "kernel-syms-4.12.14-197.48.1.s390x", "product_id": "kernel-syms-4.12.14-197.48.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-197.48.1.s390x", "product": { "name": "kernel-vanilla-4.12.14-197.48.1.s390x", "product_id": "kernel-vanilla-4.12.14-197.48.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-197.48.1.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-197.48.1.s390x", "product_id": "kernel-vanilla-base-4.12.14-197.48.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-197.48.1.s390x", "product": { "name": "kernel-vanilla-devel-4.12.14-197.48.1.s390x", "product_id": "kernel-vanilla-devel-4.12.14-197.48.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-197.48.1.s390x", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-197.48.1.s390x", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.48.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.12.14-197.48.1.s390x", "product": { "name": "kernel-zfcpdump-4.12.14-197.48.1.s390x", "product_id": "kernel-zfcpdump-4.12.14-197.48.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-man-4.12.14-197.48.1.s390x", "product": { "name": "kernel-zfcpdump-man-4.12.14-197.48.1.s390x", "product_id": "kernel-zfcpdump-man-4.12.14-197.48.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-197.48.1.s390x", "product": { "name": "kselftests-kmp-default-4.12.14-197.48.1.s390x", "product_id": "kselftests-kmp-default-4.12.14-197.48.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-197.48.1.s390x", "product": { "name": "ocfs2-kmp-default-4.12.14-197.48.1.s390x", "product_id": "ocfs2-kmp-default-4.12.14-197.48.1.s390x" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-197.48.1.s390x", "product": { "name": "reiserfs-kmp-default-4.12.14-197.48.1.s390x", "product_id": "reiserfs-kmp-default-4.12.14-197.48.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-197.48.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.12.14-197.48.1.x86_64", "product_id": "cluster-md-kmp-default-4.12.14-197.48.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-197.48.1.x86_64", "product": { "name": "dlm-kmp-default-4.12.14-197.48.1.x86_64", "product_id": "dlm-kmp-default-4.12.14-197.48.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-197.48.1.x86_64", "product": { "name": "gfs2-kmp-default-4.12.14-197.48.1.x86_64", "product_id": "gfs2-kmp-default-4.12.14-197.48.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-197.48.1.x86_64", "product": { "name": "kernel-debug-4.12.14-197.48.1.x86_64", "product_id": "kernel-debug-4.12.14-197.48.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-197.48.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-197.48.1.x86_64", "product_id": "kernel-debug-base-4.12.14-197.48.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-197.48.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-197.48.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-197.48.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-livepatch-devel-4.12.14-197.48.1.x86_64", "product": { "name": "kernel-debug-livepatch-devel-4.12.14-197.48.1.x86_64", "product_id": "kernel-debug-livepatch-devel-4.12.14-197.48.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-197.48.1.x86_64", "product": { "name": "kernel-default-4.12.14-197.48.1.x86_64", "product_id": "kernel-default-4.12.14-197.48.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-197.48.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-197.48.1.x86_64", "product_id": "kernel-default-base-4.12.14-197.48.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-197.48.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-197.48.1.x86_64", "product_id": "kernel-default-devel-4.12.14-197.48.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-197.48.1.x86_64", "product": { "name": "kernel-default-extra-4.12.14-197.48.1.x86_64", "product_id": "kernel-default-extra-4.12.14-197.48.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-197.48.1.x86_64", "product": { "name": "kernel-default-livepatch-4.12.14-197.48.1.x86_64", "product_id": "kernel-default-livepatch-4.12.14-197.48.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-devel-4.12.14-197.48.1.x86_64", "product": { "name": "kernel-default-livepatch-devel-4.12.14-197.48.1.x86_64", "product_id": "kernel-default-livepatch-devel-4.12.14-197.48.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-197.48.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-197.48.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-197.48.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-197.48.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-197.48.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-197.48.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-197.48.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-197.48.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-197.48.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-livepatch-devel-4.12.14-197.48.1.x86_64", "product": { "name": "kernel-kvmsmall-livepatch-devel-4.12.14-197.48.1.x86_64", "product_id": "kernel-kvmsmall-livepatch-devel-4.12.14-197.48.1.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-197_48-default-1-3.3.1.x86_64", "product": { "name": "kernel-livepatch-4_12_14-197_48-default-1-3.3.1.x86_64", "product_id": "kernel-livepatch-4_12_14-197_48-default-1-3.3.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-197.48.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-197.48.1.x86_64", "product_id": "kernel-obs-build-4.12.14-197.48.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-197.48.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-197.48.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-197.48.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-197.48.1.x86_64", "product": { "name": "kernel-syms-4.12.14-197.48.1.x86_64", "product_id": "kernel-syms-4.12.14-197.48.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-197.48.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-197.48.1.x86_64", "product_id": "kernel-vanilla-4.12.14-197.48.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-197.48.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-197.48.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-197.48.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-197.48.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-197.48.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-197.48.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-livepatch-devel-4.12.14-197.48.1.x86_64", "product": { "name": "kernel-vanilla-livepatch-devel-4.12.14-197.48.1.x86_64", "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.48.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-197.48.1.x86_64", "product": { "name": "kselftests-kmp-default-4.12.14-197.48.1.x86_64", "product_id": "kselftests-kmp-default-4.12.14-197.48.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-197.48.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.12.14-197.48.1.x86_64", "product_id": "ocfs2-kmp-default-4.12.14-197.48.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-197.48.1.x86_64", "product": { "name": "reiserfs-kmp-default-4.12.14-197.48.1.x86_64", "product_id": "reiserfs-kmp-default-4.12.14-197.48.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP1", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Development Tools 15 SP1", "product": { "name": "SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-development-tools:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Legacy 15 SP1", "product": { "name": "SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-legacy:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product": { "name": "SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 15 SP1", "product": { "name": "SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:15:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 15 SP1", "product": { "name": "SUSE Linux Enterprise Workstation Extension 15 SP1", "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:15:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.48.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.aarch64" }, "product_reference": "kernel-default-4.12.14-197.48.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.48.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-197.48.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.48.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.s390x" }, "product_reference": "kernel-default-4.12.14-197.48.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-197.48.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.x86_64" }, "product_reference": "kernel-default-4.12.14-197.48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.48.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-197.48.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.48.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-197.48.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.48.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-197.48.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-197.48.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-197.48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.48.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-197.48.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.48.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-197.48.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.48.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-197.48.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-197.48.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-197.48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-197.48.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.48.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-197.48.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-197.48.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.48.1.noarch" }, "product_reference": "kernel-devel-4.12.14-197.48.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-197.48.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.48.1.noarch" }, "product_reference": "kernel-macros-4.12.14-197.48.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-197.48.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.48.1.noarch" }, "product_reference": "kernel-docs-4.12.14-197.48.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.48.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-197.48.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.48.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-197.48.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.48.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.s390x" }, "product_reference": "kernel-obs-build-4.12.14-197.48.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-197.48.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-197.48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-197.48.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.48.1.noarch" }, "product_reference": "kernel-source-4.12.14-197.48.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.48.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-197.48.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.48.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-197.48.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.48.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.s390x" }, "product_reference": "kernel-syms-4.12.14-197.48.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-197.48.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-197.48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.48.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.aarch64" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.48.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.48.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.ppc64le" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.48.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.48.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.s390x" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.48.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-197.48.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP1", "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.x86_64" }, "product_reference": "reiserfs-kmp-default-4.12.14-197.48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-197.48.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.ppc64le" }, "product_reference": "kernel-default-livepatch-4.12.14-197.48.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-197.48.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.x86_64" }, "product_reference": "kernel-default-livepatch-4.12.14-197.48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-4.12.14-197.48.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.ppc64le" }, "product_reference": "kernel-default-livepatch-devel-4.12.14-197.48.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-devel-4.12.14-197.48.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.x86_64" }, "product_reference": "kernel-default-livepatch-devel-4.12.14-197.48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_48-default-1-3.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-197_48-default-1-3.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-197_48-default-1-3.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-197_48-default-1-3.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-197.48.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.aarch64" }, "product_reference": "cluster-md-kmp-default-4.12.14-197.48.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-197.48.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.12.14-197.48.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-197.48.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.12.14-197.48.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-197.48.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-197.48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-197.48.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.aarch64" }, "product_reference": "dlm-kmp-default-4.12.14-197.48.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-197.48.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.12.14-197.48.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-197.48.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.s390x" }, "product_reference": "dlm-kmp-default-4.12.14-197.48.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-197.48.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-197.48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-197.48.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.aarch64" }, "product_reference": "gfs2-kmp-default-4.12.14-197.48.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-197.48.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.12.14-197.48.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-197.48.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.s390x" }, "product_reference": "gfs2-kmp-default-4.12.14-197.48.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-197.48.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-197.48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-197.48.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.aarch64" }, "product_reference": "ocfs2-kmp-default-4.12.14-197.48.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-197.48.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.12.14-197.48.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-197.48.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.12.14-197.48.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-197.48.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-197.48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-4.12.14-197.48.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP1", "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.48.1.x86_64" }, "product_reference": "kernel-default-extra-4.12.14-197.48.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-16746", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16746" } ], "notes": [ { "category": "general", "text": "An issue was discovered in net/wireless/nl80211.c in the Linux kernel through 5.2.17. It does not check the length of variable elements in a beacon head, leading to a buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.48.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16746", "url": "https://www.suse.com/security/cve/CVE-2019-16746" }, { "category": "external", "summary": "SUSE Bug 1152107 for CVE-2019-16746", "url": "https://bugzilla.suse.com/1152107" }, { "category": "external", "summary": "SUSE Bug 1173659 for CVE-2019-16746", "url": "https://bugzilla.suse.com/1173659" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.48.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.48.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T14:45:27Z", "details": "moderate" } ], "title": "CVE-2019-16746" }, { "cve": "CVE-2019-20810", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20810" } ], "notes": [ { "category": "general", "text": "go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel before 5.6 does not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.48.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20810", "url": "https://www.suse.com/security/cve/CVE-2019-20810" }, { "category": "external", "summary": "SUSE Bug 1172458 for CVE-2019-20810", "url": "https://bugzilla.suse.com/1172458" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.48.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.48.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T14:45:27Z", "details": "low" } ], "title": "CVE-2019-20810" }, { "cve": "CVE-2019-20908", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20908" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/firmware/efi/efi.c in the Linux kernel before 5.4. Incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.48.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20908", "url": "https://www.suse.com/security/cve/CVE-2019-20908" }, { "category": "external", "summary": "SUSE Bug 1173567 for CVE-2019-20908", "url": "https://bugzilla.suse.com/1173567" }, { "category": "external", "summary": "SUSE Bug 1174187 for CVE-2019-20908", "url": "https://bugzilla.suse.com/1174187" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.48.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.48.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T14:45:27Z", "details": "important" } ], "title": "CVE-2019-20908" }, { "cve": "CVE-2020-0305", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0305" } ], "notes": [ { "category": "general", "text": "In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-153467744", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.48.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0305", "url": "https://www.suse.com/security/cve/CVE-2020-0305" }, { "category": "external", "summary": "SUSE Bug 1174462 for CVE-2020-0305", "url": "https://bugzilla.suse.com/1174462" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.48.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.48.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T14:45:27Z", "details": "moderate" } ], "title": "CVE-2020-0305" }, { "cve": "CVE-2020-10766", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10766" } ], "notes": [ { "category": "general", "text": "A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.48.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10766", "url": "https://www.suse.com/security/cve/CVE-2020-10766" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172781 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1172781" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.48.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.48.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T14:45:27Z", "details": "moderate" } ], "title": "CVE-2020-10766" }, { "cve": "CVE-2020-10767", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10767" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.48.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10767", "url": "https://www.suse.com/security/cve/CVE-2020-10767" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172782 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1172782" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.48.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.48.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T14:45:27Z", "details": "moderate" } ], "title": "CVE-2020-10767" }, { "cve": "CVE-2020-10768", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10768" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.48.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10768", "url": "https://www.suse.com/security/cve/CVE-2020-10768" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172783 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1172783" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.48.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.48.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T14:45:27Z", "details": "moderate" } ], "title": "CVE-2020-10768" }, { "cve": "CVE-2020-10769", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10769" } ], "notes": [ { "category": "general", "text": "A buffer over-read flaw was found in RH kernel versions before 5.0 in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm\u0027s module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash. This flaw allows a local attacker with user privileges to cause a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.48.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10769", "url": "https://www.suse.com/security/cve/CVE-2020-10769" }, { "category": "external", "summary": "SUSE Bug 1173265 for CVE-2020-10769", "url": "https://bugzilla.suse.com/1173265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.48.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.48.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T14:45:27Z", "details": "moderate" } ], "title": "CVE-2020-10769" }, { "cve": "CVE-2020-10773", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10773" } ], "notes": [ { "category": "general", "text": "A stack information leak flaw was found in s390/s390x in the Linux kernel\u0027s memory manager functionality, where it incorrectly writes to the /proc/sys/vm/cmm_timeout file. This flaw allows a local user to see the kernel data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.48.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10773", "url": "https://www.suse.com/security/cve/CVE-2020-10773" }, { "category": "external", "summary": "SUSE Bug 1172999 for CVE-2020-10773", "url": "https://bugzilla.suse.com/1172999" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.48.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.48.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T14:45:27Z", "details": "low" } ], "title": "CVE-2020-10773" }, { "cve": "CVE-2020-10781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10781" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel before 5.8-rc6 in the ZRAM kernel module, where a user with a local account and the ability to read the /sys/class/zram-control/hot_add file can create ZRAM device nodes in the /dev/ directory. This read allocates kernel memory and is not accounted for a user that triggers the creation of that ZRAM device. With this vulnerability, continually reading the device may consume a large amount of system memory and cause the Out-of-Memory (OOM) killer to activate and terminate random userspace processes, possibly making the system inoperable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.48.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10781", "url": "https://www.suse.com/security/cve/CVE-2020-10781" }, { "category": "external", "summary": "SUSE Bug 1173074 for CVE-2020-10781", "url": "https://bugzilla.suse.com/1173074" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.48.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.48.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T14:45:27Z", "details": "moderate" } ], "title": "CVE-2020-10781" }, { "cve": "CVE-2020-12771", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12771" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.6.11. btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.48.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12771", "url": "https://www.suse.com/security/cve/CVE-2020-12771" }, { "category": "external", "summary": "SUSE Bug 1171732 for CVE-2020-12771", "url": "https://bugzilla.suse.com/1171732" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.48.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.48.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T14:45:27Z", "details": "moderate" } ], "title": "CVE-2020-12771" }, { "cve": "CVE-2020-12888", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12888" } ], "notes": [ { "category": "general", "text": "The VFIO PCI driver in the Linux kernel through 5.6.13 mishandles attempts to access disabled memory space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.48.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12888", "url": "https://www.suse.com/security/cve/CVE-2020-12888" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1171868 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1171868" }, { "category": "external", "summary": "SUSE Bug 1176979 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1176979" }, { "category": "external", "summary": "SUSE Bug 1179612 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1179612" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.48.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.48.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T14:45:27Z", "details": "moderate" } ], "title": "CVE-2020-12888" }, { "cve": "CVE-2020-13974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-13974" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel 4.4 through 5.7.1. drivers/tty/vt/keyboard.c has an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. NOTE: Members in the community argue that the integer overflow does not lead to a security issue in this case.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.48.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-13974", "url": "https://www.suse.com/security/cve/CVE-2020-13974" }, { "category": "external", "summary": "SUSE Bug 1172775 for CVE-2020-13974", "url": "https://bugzilla.suse.com/1172775" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.48.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.48.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T14:45:27Z", "details": "moderate" } ], "title": "CVE-2020-13974" }, { "cve": "CVE-2020-14416", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14416" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.4.16, a race condition in tty-\u003edisc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.48.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14416", "url": "https://www.suse.com/security/cve/CVE-2020-14416" }, { "category": "external", "summary": "SUSE Bug 1162002 for CVE-2020-14416", "url": "https://bugzilla.suse.com/1162002" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.48.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.48.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T14:45:27Z", "details": "moderate" } ], "title": "CVE-2020-14416" }, { "cve": "CVE-2020-15393", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15393" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.4 through 5.7.6, usbtest_disconnect in drivers/usb/misc/usbtest.c has a memory leak, aka CID-28ebeb8db770.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.48.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15393", "url": "https://www.suse.com/security/cve/CVE-2020-15393" }, { "category": "external", "summary": "SUSE Bug 1173514 for CVE-2020-15393", "url": "https://bugzilla.suse.com/1173514" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.48.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.48.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T14:45:27Z", "details": "moderate" } ], "title": "CVE-2020-15393" }, { "cve": "CVE-2020-15780", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15780" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.48.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15780", "url": "https://www.suse.com/security/cve/CVE-2020-15780" }, { "category": "external", "summary": "SUSE Bug 1173573 for CVE-2020-15780", "url": "https://bugzilla.suse.com/1173573" }, { "category": "external", "summary": "SUSE Bug 1174186 for CVE-2020-15780", "url": "https://bugzilla.suse.com/1174186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.48.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_48-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.48.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.48.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.48.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T14:45:27Z", "details": "important" } ], "title": "CVE-2020-15780" } ] }
suse-su-2020:1713-1
Vulnerability from csaf_suse
Published
2020-06-23 09:16
Modified
2020-06-23 09:16
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-10768: Fixed an issue with the prctl() function which could have allowed indirect branch speculation even after it has been disabled (bsc#1172783).
- CVE-2020-10767: Fixed an issue where the Indirect Branch Prediction Barrier (IBPB) would have been disabled when STIBP is unavailable or enhanced IBRS is available making the system vulnerable to spectre v2 (bsc#1172782).
- CVE-2020-10766: Fixed an issue with Linux scheduler which could have allowed an attacker to turn off the SSBD protection (bsc#1172781).
- xfs: Fix tail rounding in xfs_alloc_file_space() (bsc#1172049).
Patchnames
HPE-Helion-OpenStack-8-2020-1713,SUSE-2020-1713,SUSE-OpenStack-Cloud-8-2020-1713,SUSE-OpenStack-Cloud-Crowbar-8-2020-1713,SUSE-SLE-HA-12-SP3-2020-1713,SUSE-SLE-SAP-12-SP3-2020-1713,SUSE-SLE-SERVER-12-SP3-2020-1713,SUSE-SLE-SERVER-12-SP3-BCL-2020-1713,SUSE-Storage-5-2020-1713
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2020-10768: Fixed an issue with the prctl() function which could have allowed indirect branch speculation even after it has been disabled (bsc#1172783).\n- CVE-2020-10767: Fixed an issue where the Indirect Branch Prediction Barrier (IBPB) would have been disabled when STIBP is unavailable or enhanced IBRS is available making the system vulnerable to spectre v2 (bsc#1172782).\n- CVE-2020-10766: Fixed an issue with Linux scheduler which could have allowed an attacker to turn off the SSBD protection (bsc#1172781).\n\n- xfs: Fix tail rounding in xfs_alloc_file_space() (bsc#1172049).\n", "title": "Description of the patch" }, { "category": "details", "text": "HPE-Helion-OpenStack-8-2020-1713,SUSE-2020-1713,SUSE-OpenStack-Cloud-8-2020-1713,SUSE-OpenStack-Cloud-Crowbar-8-2020-1713,SUSE-SLE-HA-12-SP3-2020-1713,SUSE-SLE-SAP-12-SP3-2020-1713,SUSE-SLE-SERVER-12-SP3-2020-1713,SUSE-SLE-SERVER-12-SP3-BCL-2020-1713,SUSE-Storage-5-2020-1713", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_1713-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:1713-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20201713-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:1713-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-June/007008.html" }, { "category": "self", "summary": "SUSE Bug 1172049", "url": "https://bugzilla.suse.com/1172049" }, { "category": "self", "summary": "SUSE Bug 1172781", "url": "https://bugzilla.suse.com/1172781" }, { "category": "self", "summary": "SUSE Bug 1172782", "url": "https://bugzilla.suse.com/1172782" }, { "category": "self", "summary": "SUSE Bug 1172783", "url": "https://bugzilla.suse.com/1172783" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10766 page", "url": "https://www.suse.com/security/cve/CVE-2020-10766/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10767 page", "url": "https://www.suse.com/security/cve/CVE-2020-10767/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10768 page", "url": "https://www.suse.com/security/cve/CVE-2020-10768/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-06-23T09:16:06Z", "generator": { "date": "2020-06-23T09:16:06Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:1713-1", "initial_release_date": "2020-06-23T09:16:06Z", "revision_history": [ { "date": "2020-06-23T09:16:06Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.180-94.124.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.4.180-94.124.1.aarch64", "product_id": "cluster-md-kmp-default-4.4.180-94.124.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.180-94.124.1.aarch64", "product": { "name": "dlm-kmp-default-4.4.180-94.124.1.aarch64", "product_id": "dlm-kmp-default-4.4.180-94.124.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.180-94.124.1.aarch64", "product": { "name": "gfs2-kmp-default-4.4.180-94.124.1.aarch64", "product_id": "gfs2-kmp-default-4.4.180-94.124.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.4.180-94.124.1.aarch64", "product": { "name": "kernel-default-4.4.180-94.124.1.aarch64", "product_id": "kernel-default-4.4.180-94.124.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.180-94.124.1.aarch64", "product": { "name": "kernel-default-base-4.4.180-94.124.1.aarch64", "product_id": "kernel-default-base-4.4.180-94.124.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.180-94.124.1.aarch64", "product": { "name": "kernel-default-devel-4.4.180-94.124.1.aarch64", "product_id": "kernel-default-devel-4.4.180-94.124.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.180-94.124.1.aarch64", "product": { "name": "kernel-default-extra-4.4.180-94.124.1.aarch64", "product_id": "kernel-default-extra-4.4.180-94.124.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.180-94.124.1.aarch64", "product": { "name": "kernel-default-kgraft-4.4.180-94.124.1.aarch64", "product_id": "kernel-default-kgraft-4.4.180-94.124.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.180-94.124.1.aarch64", "product": { "name": "kernel-obs-build-4.4.180-94.124.1.aarch64", "product_id": "kernel-obs-build-4.4.180-94.124.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.180-94.124.1.aarch64", "product": { "name": "kernel-obs-qa-4.4.180-94.124.1.aarch64", "product_id": "kernel-obs-qa-4.4.180-94.124.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.4.180-94.124.1.aarch64", "product": { "name": "kernel-syms-4.4.180-94.124.1.aarch64", "product_id": "kernel-syms-4.4.180-94.124.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.180-94.124.1.aarch64", "product": { "name": "kernel-vanilla-4.4.180-94.124.1.aarch64", "product_id": "kernel-vanilla-4.4.180-94.124.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.180-94.124.1.aarch64", "product": { "name": "kernel-vanilla-base-4.4.180-94.124.1.aarch64", "product_id": "kernel-vanilla-base-4.4.180-94.124.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.180-94.124.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.4.180-94.124.1.aarch64", "product_id": "kernel-vanilla-devel-4.4.180-94.124.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.4.180-94.124.1.aarch64", "product": { "name": "kselftests-kmp-default-4.4.180-94.124.1.aarch64", "product_id": "kselftests-kmp-default-4.4.180-94.124.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.180-94.124.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.4.180-94.124.1.aarch64", "product_id": "ocfs2-kmp-default-4.4.180-94.124.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.4.180-94.124.1.noarch", "product": { "name": "kernel-devel-4.4.180-94.124.1.noarch", "product_id": "kernel-devel-4.4.180-94.124.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.4.180-94.124.1.noarch", "product": { "name": "kernel-macros-4.4.180-94.124.1.noarch", "product_id": "kernel-macros-4.4.180-94.124.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.4.180-94.124.1.noarch", "product": { "name": "kernel-source-4.4.180-94.124.1.noarch", "product_id": "kernel-source-4.4.180-94.124.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.4.180-94.124.1.noarch", "product": { "name": "kernel-docs-4.4.180-94.124.1.noarch", "product_id": "kernel-docs-4.4.180-94.124.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.4.180-94.124.1.noarch", "product": { "name": "kernel-docs-html-4.4.180-94.124.1.noarch", "product_id": "kernel-docs-html-4.4.180-94.124.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-pdf-4.4.180-94.124.1.noarch", "product": { "name": "kernel-docs-pdf-4.4.180-94.124.1.noarch", "product_id": "kernel-docs-pdf-4.4.180-94.124.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.4.180-94.124.1.noarch", "product": { "name": "kernel-source-vanilla-4.4.180-94.124.1.noarch", "product_id": "kernel-source-vanilla-4.4.180-94.124.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-debug-4.4.180-94.124.1.ppc64le", "product": { "name": "cluster-md-kmp-debug-4.4.180-94.124.1.ppc64le", "product_id": "cluster-md-kmp-debug-4.4.180-94.124.1.ppc64le" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.180-94.124.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.4.180-94.124.1.ppc64le", "product_id": "cluster-md-kmp-default-4.4.180-94.124.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.4.180-94.124.1.ppc64le", "product": { "name": "dlm-kmp-debug-4.4.180-94.124.1.ppc64le", "product_id": "dlm-kmp-debug-4.4.180-94.124.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.180-94.124.1.ppc64le", "product": { "name": "dlm-kmp-default-4.4.180-94.124.1.ppc64le", "product_id": "dlm-kmp-default-4.4.180-94.124.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.4.180-94.124.1.ppc64le", "product": { "name": "gfs2-kmp-debug-4.4.180-94.124.1.ppc64le", "product_id": "gfs2-kmp-debug-4.4.180-94.124.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.180-94.124.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.4.180-94.124.1.ppc64le", "product_id": "gfs2-kmp-default-4.4.180-94.124.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.4.180-94.124.1.ppc64le", "product": { "name": "kernel-debug-4.4.180-94.124.1.ppc64le", "product_id": "kernel-debug-4.4.180-94.124.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.4.180-94.124.1.ppc64le", "product": { "name": "kernel-debug-base-4.4.180-94.124.1.ppc64le", "product_id": "kernel-debug-base-4.4.180-94.124.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.4.180-94.124.1.ppc64le", "product": { "name": "kernel-debug-devel-4.4.180-94.124.1.ppc64le", "product_id": "kernel-debug-devel-4.4.180-94.124.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-extra-4.4.180-94.124.1.ppc64le", "product": { "name": "kernel-debug-extra-4.4.180-94.124.1.ppc64le", "product_id": "kernel-debug-extra-4.4.180-94.124.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-kgraft-4.4.180-94.124.1.ppc64le", "product": { "name": "kernel-debug-kgraft-4.4.180-94.124.1.ppc64le", "product_id": "kernel-debug-kgraft-4.4.180-94.124.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.4.180-94.124.1.ppc64le", "product": { "name": "kernel-default-4.4.180-94.124.1.ppc64le", "product_id": "kernel-default-4.4.180-94.124.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.4.180-94.124.1.ppc64le", "product": { "name": "kernel-default-base-4.4.180-94.124.1.ppc64le", "product_id": "kernel-default-base-4.4.180-94.124.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.180-94.124.1.ppc64le", "product": { "name": "kernel-default-devel-4.4.180-94.124.1.ppc64le", "product_id": "kernel-default-devel-4.4.180-94.124.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.180-94.124.1.ppc64le", "product": { "name": "kernel-default-extra-4.4.180-94.124.1.ppc64le", "product_id": "kernel-default-extra-4.4.180-94.124.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.180-94.124.1.ppc64le", "product": { "name": "kernel-default-kgraft-4.4.180-94.124.1.ppc64le", "product_id": "kernel-default-kgraft-4.4.180-94.124.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.180-94.124.1.ppc64le", "product": { "name": "kernel-obs-build-4.4.180-94.124.1.ppc64le", "product_id": "kernel-obs-build-4.4.180-94.124.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.180-94.124.1.ppc64le", "product": { "name": "kernel-obs-qa-4.4.180-94.124.1.ppc64le", "product_id": "kernel-obs-qa-4.4.180-94.124.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.4.180-94.124.1.ppc64le", "product": { "name": "kernel-syms-4.4.180-94.124.1.ppc64le", "product_id": "kernel-syms-4.4.180-94.124.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.180-94.124.1.ppc64le", "product": { "name": "kernel-vanilla-4.4.180-94.124.1.ppc64le", "product_id": "kernel-vanilla-4.4.180-94.124.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.180-94.124.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.4.180-94.124.1.ppc64le", "product_id": "kernel-vanilla-base-4.4.180-94.124.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.180-94.124.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.4.180-94.124.1.ppc64le", "product_id": "kernel-vanilla-devel-4.4.180-94.124.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_4_180-94_124-default-1-4.3.1.ppc64le", "product": { "name": "kgraft-patch-4_4_180-94_124-default-1-4.3.1.ppc64le", "product_id": "kgraft-patch-4_4_180-94_124-default-1-4.3.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-debug-4.4.180-94.124.1.ppc64le", "product": { "name": "kselftests-kmp-debug-4.4.180-94.124.1.ppc64le", "product_id": "kselftests-kmp-debug-4.4.180-94.124.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.4.180-94.124.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.4.180-94.124.1.ppc64le", "product_id": "kselftests-kmp-default-4.4.180-94.124.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.4.180-94.124.1.ppc64le", "product": { "name": "ocfs2-kmp-debug-4.4.180-94.124.1.ppc64le", "product_id": "ocfs2-kmp-debug-4.4.180-94.124.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.180-94.124.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.4.180-94.124.1.ppc64le", "product_id": "ocfs2-kmp-default-4.4.180-94.124.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.180-94.124.1.s390x", "product": { "name": "cluster-md-kmp-default-4.4.180-94.124.1.s390x", "product_id": "cluster-md-kmp-default-4.4.180-94.124.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.180-94.124.1.s390x", "product": { "name": "dlm-kmp-default-4.4.180-94.124.1.s390x", "product_id": "dlm-kmp-default-4.4.180-94.124.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.180-94.124.1.s390x", "product": { "name": "gfs2-kmp-default-4.4.180-94.124.1.s390x", "product_id": "gfs2-kmp-default-4.4.180-94.124.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.4.180-94.124.1.s390x", "product": { "name": "kernel-default-4.4.180-94.124.1.s390x", "product_id": "kernel-default-4.4.180-94.124.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.4.180-94.124.1.s390x", "product": { "name": "kernel-default-base-4.4.180-94.124.1.s390x", "product_id": "kernel-default-base-4.4.180-94.124.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.180-94.124.1.s390x", "product": { "name": "kernel-default-devel-4.4.180-94.124.1.s390x", "product_id": "kernel-default-devel-4.4.180-94.124.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.180-94.124.1.s390x", "product": { "name": "kernel-default-extra-4.4.180-94.124.1.s390x", "product_id": "kernel-default-extra-4.4.180-94.124.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.180-94.124.1.s390x", "product": { "name": "kernel-default-kgraft-4.4.180-94.124.1.s390x", "product_id": "kernel-default-kgraft-4.4.180-94.124.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.4.180-94.124.1.s390x", "product": { "name": "kernel-default-man-4.4.180-94.124.1.s390x", "product_id": "kernel-default-man-4.4.180-94.124.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.180-94.124.1.s390x", "product": { "name": "kernel-obs-build-4.4.180-94.124.1.s390x", "product_id": "kernel-obs-build-4.4.180-94.124.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.180-94.124.1.s390x", "product": { "name": "kernel-obs-qa-4.4.180-94.124.1.s390x", "product_id": "kernel-obs-qa-4.4.180-94.124.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.4.180-94.124.1.s390x", "product": { "name": "kernel-syms-4.4.180-94.124.1.s390x", "product_id": "kernel-syms-4.4.180-94.124.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.180-94.124.1.s390x", "product": { "name": "kernel-vanilla-4.4.180-94.124.1.s390x", "product_id": "kernel-vanilla-4.4.180-94.124.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.180-94.124.1.s390x", "product": { "name": "kernel-vanilla-base-4.4.180-94.124.1.s390x", "product_id": "kernel-vanilla-base-4.4.180-94.124.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.180-94.124.1.s390x", "product": { "name": "kernel-vanilla-devel-4.4.180-94.124.1.s390x", "product_id": "kernel-vanilla-devel-4.4.180-94.124.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.4.180-94.124.1.s390x", "product": { "name": "kernel-zfcpdump-4.4.180-94.124.1.s390x", "product_id": "kernel-zfcpdump-4.4.180-94.124.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.4.180-94.124.1.s390x", "product": { "name": "kselftests-kmp-default-4.4.180-94.124.1.s390x", "product_id": "kselftests-kmp-default-4.4.180-94.124.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.180-94.124.1.s390x", "product": { "name": "ocfs2-kmp-default-4.4.180-94.124.1.s390x", "product_id": "ocfs2-kmp-default-4.4.180-94.124.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-4.4.180-94.124.1.x86_64", "product": { "name": "kernel-default-4.4.180-94.124.1.x86_64", "product_id": "kernel-default-4.4.180-94.124.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.180-94.124.1.x86_64", "product": { "name": "kernel-default-base-4.4.180-94.124.1.x86_64", "product_id": "kernel-default-base-4.4.180-94.124.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.180-94.124.1.x86_64", "product": { "name": "kernel-default-devel-4.4.180-94.124.1.x86_64", "product_id": "kernel-default-devel-4.4.180-94.124.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.180-94.124.1.x86_64", "product": { "name": "kernel-default-kgraft-4.4.180-94.124.1.x86_64", "product_id": "kernel-default-kgraft-4.4.180-94.124.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.4.180-94.124.1.x86_64", "product": { "name": "kernel-syms-4.4.180-94.124.1.x86_64", "product_id": "kernel-syms-4.4.180-94.124.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64", "product": { "name": "kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64", "product_id": "kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-debug-4.4.180-94.124.1.x86_64", "product": { "name": "cluster-md-kmp-debug-4.4.180-94.124.1.x86_64", "product_id": "cluster-md-kmp-debug-4.4.180-94.124.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.180-94.124.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.4.180-94.124.1.x86_64", "product_id": "cluster-md-kmp-default-4.4.180-94.124.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.4.180-94.124.1.x86_64", "product": { "name": "dlm-kmp-debug-4.4.180-94.124.1.x86_64", "product_id": "dlm-kmp-debug-4.4.180-94.124.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.180-94.124.1.x86_64", "product": { "name": "dlm-kmp-default-4.4.180-94.124.1.x86_64", "product_id": "dlm-kmp-default-4.4.180-94.124.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.4.180-94.124.1.x86_64", "product": { "name": "gfs2-kmp-debug-4.4.180-94.124.1.x86_64", "product_id": "gfs2-kmp-debug-4.4.180-94.124.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.180-94.124.1.x86_64", "product": { "name": "gfs2-kmp-default-4.4.180-94.124.1.x86_64", "product_id": "gfs2-kmp-default-4.4.180-94.124.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.4.180-94.124.1.x86_64", "product": { "name": "kernel-debug-4.4.180-94.124.1.x86_64", "product_id": "kernel-debug-4.4.180-94.124.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.4.180-94.124.1.x86_64", "product": { "name": "kernel-debug-base-4.4.180-94.124.1.x86_64", "product_id": "kernel-debug-base-4.4.180-94.124.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.4.180-94.124.1.x86_64", "product": { "name": "kernel-debug-devel-4.4.180-94.124.1.x86_64", "product_id": "kernel-debug-devel-4.4.180-94.124.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-extra-4.4.180-94.124.1.x86_64", "product": { "name": "kernel-debug-extra-4.4.180-94.124.1.x86_64", "product_id": "kernel-debug-extra-4.4.180-94.124.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-kgraft-4.4.180-94.124.1.x86_64", "product": { "name": "kernel-debug-kgraft-4.4.180-94.124.1.x86_64", "product_id": "kernel-debug-kgraft-4.4.180-94.124.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.180-94.124.1.x86_64", "product": { "name": "kernel-default-extra-4.4.180-94.124.1.x86_64", "product_id": "kernel-default-extra-4.4.180-94.124.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.180-94.124.1.x86_64", "product": { "name": "kernel-obs-build-4.4.180-94.124.1.x86_64", "product_id": "kernel-obs-build-4.4.180-94.124.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.180-94.124.1.x86_64", "product": { "name": "kernel-obs-qa-4.4.180-94.124.1.x86_64", "product_id": "kernel-obs-qa-4.4.180-94.124.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.180-94.124.1.x86_64", "product": { "name": "kernel-vanilla-4.4.180-94.124.1.x86_64", "product_id": "kernel-vanilla-4.4.180-94.124.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.180-94.124.1.x86_64", "product": { "name": "kernel-vanilla-base-4.4.180-94.124.1.x86_64", "product_id": "kernel-vanilla-base-4.4.180-94.124.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.180-94.124.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.4.180-94.124.1.x86_64", "product_id": "kernel-vanilla-devel-4.4.180-94.124.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-debug-4.4.180-94.124.1.x86_64", "product": { "name": "kselftests-kmp-debug-4.4.180-94.124.1.x86_64", "product_id": "kselftests-kmp-debug-4.4.180-94.124.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.4.180-94.124.1.x86_64", "product": { "name": "kselftests-kmp-default-4.4.180-94.124.1.x86_64", "product_id": "kselftests-kmp-default-4.4.180-94.124.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.4.180-94.124.1.x86_64", "product": { "name": "ocfs2-kmp-debug-4.4.180-94.124.1.x86_64", "product_id": "ocfs2-kmp-debug-4.4.180-94.124.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.180-94.124.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.4.180-94.124.1.x86_64", "product_id": "ocfs2-kmp-default-4.4.180-94.124.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "HPE Helion OpenStack 8", "product": { "name": "HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8", "product_identification_helper": { "cpe": "cpe:/o:suse:hpe-helion-openstack:8" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud 8", "product": { "name": "SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:8" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud Crowbar 8", "product": { "name": "SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:8" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 12 SP3", "product": { "name": "SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp3" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 5", "product": { "name": "SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.124.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-default-4.4.180-94.124.1.x86_64" }, "product_reference": "kernel-default-4.4.180-94.124.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.124.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.124.1.x86_64" }, "product_reference": "kernel-default-base-4.4.180-94.124.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.124.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.124.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.180-94.124.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.4.180-94.124.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.124.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.4.180-94.124.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.180-94.124.1.noarch as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.124.1.noarch" }, "product_reference": "kernel-devel-4.4.180-94.124.1.noarch", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.180-94.124.1.noarch as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.124.1.noarch" }, "product_reference": "kernel-macros-4.4.180-94.124.1.noarch", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.180-94.124.1.noarch as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-source-4.4.180-94.124.1.noarch" }, "product_reference": "kernel-source-4.4.180-94.124.1.noarch", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.124.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.124.1.x86_64" }, "product_reference": "kernel-syms-4.4.180-94.124.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64 as component of HPE Helion OpenStack 8", "product_id": "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64", "relates_to_product_reference": "HPE Helion OpenStack 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.124.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.124.1.x86_64" }, "product_reference": "kernel-default-4.4.180-94.124.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.124.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.124.1.x86_64" }, "product_reference": "kernel-default-base-4.4.180-94.124.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.124.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.124.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.180-94.124.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.4.180-94.124.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.124.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.4.180-94.124.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.180-94.124.1.noarch as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.124.1.noarch" }, "product_reference": "kernel-devel-4.4.180-94.124.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.180-94.124.1.noarch as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.124.1.noarch" }, "product_reference": "kernel-macros-4.4.180-94.124.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.180-94.124.1.noarch as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.124.1.noarch" }, "product_reference": "kernel-source-4.4.180-94.124.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.124.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.124.1.x86_64" }, "product_reference": "kernel-syms-4.4.180-94.124.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64 as component of SUSE OpenStack Cloud 8", "product_id": "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.124.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.124.1.x86_64" }, "product_reference": "kernel-default-4.4.180-94.124.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.124.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.124.1.x86_64" }, "product_reference": "kernel-default-base-4.4.180-94.124.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.124.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.124.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.180-94.124.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.4.180-94.124.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.124.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.4.180-94.124.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.180-94.124.1.noarch as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.124.1.noarch" }, "product_reference": "kernel-devel-4.4.180-94.124.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.180-94.124.1.noarch as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.124.1.noarch" }, "product_reference": "kernel-macros-4.4.180-94.124.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.180-94.124.1.noarch as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.124.1.noarch" }, "product_reference": "kernel-source-4.4.180-94.124.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.124.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.124.1.x86_64" }, "product_reference": "kernel-syms-4.4.180-94.124.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", "product_id": "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.180-94.124.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.124.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.4.180-94.124.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.180-94.124.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.124.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.4.180-94.124.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.180-94.124.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.124.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.4.180-94.124.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.180-94.124.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.124.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.4.180-94.124.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.180-94.124.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.124.1.s390x" }, "product_reference": "dlm-kmp-default-4.4.180-94.124.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.180-94.124.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.124.1.x86_64" }, "product_reference": "dlm-kmp-default-4.4.180-94.124.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.180-94.124.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.124.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.4.180-94.124.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.180-94.124.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.124.1.s390x" }, "product_reference": "gfs2-kmp-default-4.4.180-94.124.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.180-94.124.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.124.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.4.180-94.124.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.180-94.124.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.124.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.4.180-94.124.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.180-94.124.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.124.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.4.180-94.124.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.180-94.124.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.124.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.4.180-94.124.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.124.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.124.1.ppc64le" }, "product_reference": "kernel-default-4.4.180-94.124.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.124.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.124.1.x86_64" }, "product_reference": "kernel-default-4.4.180-94.124.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.124.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.124.1.ppc64le" }, "product_reference": "kernel-default-base-4.4.180-94.124.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.124.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.124.1.x86_64" }, "product_reference": "kernel-default-base-4.4.180-94.124.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.124.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.124.1.ppc64le" }, "product_reference": "kernel-default-devel-4.4.180-94.124.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.124.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.124.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.180-94.124.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.4.180-94.124.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.124.1.ppc64le" }, "product_reference": "kernel-default-kgraft-4.4.180-94.124.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.4.180-94.124.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.124.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.4.180-94.124.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.180-94.124.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.124.1.noarch" }, "product_reference": "kernel-devel-4.4.180-94.124.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.180-94.124.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.124.1.noarch" }, "product_reference": "kernel-macros-4.4.180-94.124.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.180-94.124.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.124.1.noarch" }, "product_reference": "kernel-source-4.4.180-94.124.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.124.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.124.1.ppc64le" }, "product_reference": "kernel-syms-4.4.180-94.124.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.124.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.124.1.x86_64" }, "product_reference": "kernel-syms-4.4.180-94.124.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_124-default-1-4.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-1-4.3.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_180-94_124-default-1-4.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.124.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.124.1.aarch64" }, "product_reference": "kernel-default-4.4.180-94.124.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.124.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.124.1.ppc64le" }, "product_reference": "kernel-default-4.4.180-94.124.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.124.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.124.1.s390x" }, "product_reference": "kernel-default-4.4.180-94.124.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.124.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.124.1.x86_64" }, "product_reference": "kernel-default-4.4.180-94.124.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.124.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.124.1.aarch64" }, "product_reference": "kernel-default-base-4.4.180-94.124.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.124.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.124.1.ppc64le" }, "product_reference": "kernel-default-base-4.4.180-94.124.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.124.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.124.1.s390x" }, "product_reference": "kernel-default-base-4.4.180-94.124.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.124.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.124.1.x86_64" }, "product_reference": "kernel-default-base-4.4.180-94.124.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.124.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.124.1.aarch64" }, "product_reference": "kernel-default-devel-4.4.180-94.124.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.124.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.124.1.ppc64le" }, "product_reference": "kernel-default-devel-4.4.180-94.124.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.124.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.124.1.s390x" }, "product_reference": "kernel-default-devel-4.4.180-94.124.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.124.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.124.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.180-94.124.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.4.180-94.124.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.124.1.ppc64le" }, "product_reference": "kernel-default-kgraft-4.4.180-94.124.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.4.180-94.124.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.124.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.4.180-94.124.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.4.180-94.124.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.124.1.s390x" }, "product_reference": "kernel-default-man-4.4.180-94.124.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.180-94.124.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.124.1.noarch" }, "product_reference": "kernel-devel-4.4.180-94.124.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.180-94.124.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.124.1.noarch" }, "product_reference": "kernel-macros-4.4.180-94.124.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.180-94.124.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.124.1.noarch" }, "product_reference": "kernel-source-4.4.180-94.124.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.124.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.124.1.aarch64" }, "product_reference": "kernel-syms-4.4.180-94.124.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.124.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.124.1.ppc64le" }, "product_reference": "kernel-syms-4.4.180-94.124.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.124.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.124.1.s390x" }, "product_reference": "kernel-syms-4.4.180-94.124.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.124.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.124.1.x86_64" }, "product_reference": "kernel-syms-4.4.180-94.124.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_124-default-1-4.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-1-4.3.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_180-94_124-default-1-4.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.124.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.124.1.x86_64" }, "product_reference": "kernel-default-4.4.180-94.124.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.124.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.124.1.x86_64" }, "product_reference": "kernel-default-base-4.4.180-94.124.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.124.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.124.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.180-94.124.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.180-94.124.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.124.1.noarch" }, "product_reference": "kernel-devel-4.4.180-94.124.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.180-94.124.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.124.1.noarch" }, "product_reference": "kernel-macros-4.4.180-94.124.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.180-94.124.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.124.1.noarch" }, "product_reference": "kernel-source-4.4.180-94.124.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.124.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.124.1.x86_64" }, "product_reference": "kernel-syms-4.4.180-94.124.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.124.1.aarch64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.124.1.aarch64" }, "product_reference": "kernel-default-4.4.180-94.124.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.180-94.124.1.x86_64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.124.1.x86_64" }, "product_reference": "kernel-default-4.4.180-94.124.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.124.1.aarch64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.124.1.aarch64" }, "product_reference": "kernel-default-base-4.4.180-94.124.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.180-94.124.1.x86_64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.124.1.x86_64" }, "product_reference": "kernel-default-base-4.4.180-94.124.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.124.1.aarch64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.124.1.aarch64" }, "product_reference": "kernel-default-devel-4.4.180-94.124.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.180-94.124.1.x86_64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.124.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.180-94.124.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.4.180-94.124.1.x86_64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.124.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.4.180-94.124.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.180-94.124.1.noarch as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.124.1.noarch" }, "product_reference": "kernel-devel-4.4.180-94.124.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.180-94.124.1.noarch as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.124.1.noarch" }, "product_reference": "kernel-macros-4.4.180-94.124.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.180-94.124.1.noarch as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.124.1.noarch" }, "product_reference": "kernel-source-4.4.180-94.124.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.124.1.aarch64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.124.1.aarch64" }, "product_reference": "kernel-syms-4.4.180-94.124.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.180-94.124.1.x86_64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.124.1.x86_64" }, "product_reference": "kernel-syms-4.4.180-94.124.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64 as component of SUSE Enterprise Storage 5", "product_id": "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 5" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-10766", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10766" } ], "notes": [ { "category": "general", "text": "A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.124.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.124.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.124.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.124.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.124.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.124.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.124.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.124.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.124.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.124.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.124.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.124.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.124.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.124.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.124.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.124.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.124.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.124.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.124.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.124.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.124.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.124.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.124.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.124.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.124.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.124.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.124.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.124.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.124.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.124.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10766", "url": "https://www.suse.com/security/cve/CVE-2020-10766" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172781 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1172781" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.124.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.124.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.124.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.124.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.124.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.124.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.124.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.124.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.124.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.124.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.124.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.124.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.124.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.124.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.124.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.124.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.124.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.124.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.124.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.124.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.124.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.124.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.124.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.124.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.124.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.124.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.124.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.124.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.124.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.124.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.124.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.124.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.124.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.124.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.124.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.124.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.124.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.124.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.124.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.124.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.124.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.124.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.124.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.124.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.124.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.124.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.124.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.124.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.124.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.124.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.124.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.124.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.124.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.124.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.124.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.124.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.124.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.124.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.124.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.124.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-23T09:16:06Z", "details": "moderate" } ], "title": "CVE-2020-10766" }, { "cve": "CVE-2020-10767", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10767" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.124.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.124.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.124.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.124.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.124.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.124.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.124.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.124.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.124.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.124.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.124.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.124.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.124.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.124.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.124.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.124.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.124.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.124.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.124.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.124.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.124.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.124.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.124.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.124.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.124.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.124.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.124.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.124.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.124.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.124.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10767", "url": "https://www.suse.com/security/cve/CVE-2020-10767" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172782 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1172782" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.124.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.124.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.124.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.124.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.124.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.124.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.124.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.124.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.124.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.124.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.124.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.124.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.124.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.124.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.124.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.124.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.124.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.124.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.124.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.124.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.124.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.124.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.124.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.124.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.124.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.124.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.124.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.124.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.124.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.124.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.124.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.124.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.124.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.124.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.124.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.124.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.124.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.124.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.124.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.124.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.124.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.124.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.124.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.124.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.124.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.124.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.124.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.124.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.124.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.124.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.124.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.124.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.124.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.124.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.124.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.124.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.124.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.124.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.124.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.124.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-23T09:16:06Z", "details": "moderate" } ], "title": "CVE-2020-10767" }, { "cve": "CVE-2020-10768", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10768" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.124.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.124.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.124.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.124.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.124.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.124.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.124.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.124.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.124.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.124.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.124.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.124.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.124.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.124.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.124.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.124.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.124.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.124.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.124.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.124.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.124.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.124.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.124.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.124.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.124.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.124.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.124.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.124.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.124.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.124.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10768", "url": "https://www.suse.com/security/cve/CVE-2020-10768" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172783 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1172783" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.124.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.124.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.124.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.124.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.124.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.124.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.124.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.124.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.124.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.124.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.124.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.124.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.124.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.124.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.124.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.124.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.124.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.124.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.124.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.124.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.124.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.124.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.124.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.124.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.124.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.124.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.124.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.124.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.124.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.124.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.124.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.124.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.124.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.124.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.124.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.124.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.124.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.124.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.124.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.124.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.124.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.124.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.124.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.124.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.124.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.124.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.124.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.124.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.124.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.124.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.124.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.124.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.124.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.124.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.124.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.124.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.124.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.124.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.124.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.124.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.124.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.124.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.124.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.124.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.124.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_124-default-1-4.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-23T09:16:06Z", "details": "moderate" } ], "title": "CVE-2020-10768" } ] }
suse-su-2020:1699-1
Vulnerability from csaf_suse
Published
2020-06-22 07:52
Modified
2020-06-22 07:52
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-10768: The prctl() function could be used to enable indirect branch speculation even after it has been disabled. (bnc#1172783)
- CVE-2020-10766: A bug in the logic handling could allow an attacker with a local account to disable SSBD protection. (bnc#1172781)
- CVE-2020-10767: A IBPB would be disabled when STIBP was not available or when Enhanced Indirect Branch Restricted Speculation (IBRS) was available. This is unexpected behaviour could leave the system open to a spectre v2 style attack (bnc#1172782)
- CVE-2020-13974: drivers/tty/vt/keyboard.c had an integer overflow if k_ascii was called several times in a row (bnc#1172775)
- CVE-2019-20810: go7007_snd_init did not call snd_card_free for a failure path, which caused a memory leak (bnc#1172458)
The following non-security bugs were fixed:
- ACPI: PM: Avoid using power resources if there are none for D0 (bsc#1051510).
- ALSA: es1688: Add the missed snd_card_free() (bsc#1051510).
- ALSA: hda/hdmi - enable runtime pm for newer AMD display audio (bsc#1111666).
- ALSA: hda/realtek - Add LED class support for micmute LED (bsc#1111666).
- ALSA: hda/realtek - Enable micmute LED on and HP system (bsc#1111666).
- ALSA: hda/realtek - Fix unused variable warning w/o CONFIG_LEDS_TRIGGER_AUDIO (bsc#1111666).
- ALSA: hda/realtek - Introduce polarity for micmute LED GPIO (bsc#1111666).
- ALSA: hda/realtek - add a pintbl quirk for several Lenovo machines (bsc#1111666).
- ALSA: hda: Add ElkhartLake HDMI codec vid (bsc#1111666).
- ALSA: hda: add sienna_cichlid audio asic id for sienna_cichlid up (bsc#1111666).
- ALSA: pcm: disallow linking stream to itself (bsc#1111666).
- ALSA: usb-audio: Add Pioneer DJ DJM-900NXS2 support (bsc#1111666).
- ALSA: usb-audio: Add duplex sound support for USB devices using implicit feedback (bsc#1111666).
- ALSA: usb-audio: Add vendor, product and profile name for HP Thunderbolt Dock (bsc#1111666).
- ALSA: usb-audio: Clean up quirk entries with macros (bsc#1111666).
- ALSA: usb-audio: Fix inconsistent card PM state after resume (bsc#1111666).
- ALSA: usb-audio: Fix racy list management in output queue (bsc#1111666).
- ALSA: usb-audio: Manage auto-pm of all bundled interfaces (bsc#1111666).
- ALSA: usb-audio: Use the new macro for HP Dock rename quirks (bsc#1111666).
- CDC-ACM: heed quirk also in error handling (git-fixes).
- HID: sony: Fix for broken buttons on DS3 USB dongles (bsc#1051510).
- KVM: x86/mmu: Set mmio_value to '0' if reserved #PF can't be generated (bsc#1171904).
- KVM: x86: only do L1TF workaround on affected processors (bsc#1171904).
- NFS: Fix an RCU lock leak in nfs4_refresh_delegation_stateid() (bsc#1170592).
- NFSv4: Retry CLOSE and DELEGRETURN on NFS4ERR_OLD_STATEID (bsc#1170592).
- PCI/PM: Call .bridge_d3() hook only if non-NULL (git-fixes).
- PCI/PTM: Inherit Switch Downstream Port PTM settings from Upstream Port (bsc#1051510).
- PCI: Allow pci_resize_resource() for devices on root bus (bsc#1051510).
- PCI: Fix pci_register_host_bridge() device_register() error handling (bsc#1051510).
- PCI: Program MPS for RCiEP devices (bsc#1051510).
- RDMA/efa: Fix setting of wrong bit in get/set_feature commands (bsc#1111666)
- RDMA/efa: Support remote read access in MR registration (bsc#1111666)
- RDMA/efa: Unified getters/setters for device structs bitmask access (bsc#1111666)
- USB: gadget: udc: s3c2410_udc: Remove pointless NULL check in s3c2410_udc_nuke (bsc#1051510).
- USB: host: ehci-mxc: Add error handling in ehci_mxc_drv_probe() (bsc#1051510).
- USB: serial: option: add Telit LE910C1-EUX compositions (bsc#1051510).
- USB: serial: qcserial: add DW5816e QDL support (bsc#1051510).
- USB: serial: usb_wwan: do not resubmit rx urb on fatal errors (bsc#1051510).
- USB: serial: usb_wwan: do not resubmit rx urb on fatal errors (git-fixes).
- arm64: map FDT as RW for early_init_dt_scan() (jsc#SLE-12423).
- bcache: Fix an error code in bch_dump_read() (git fixes (block drivers)).
- block: remove QUEUE_FLAG_STACKABLE (git fixes (block drivers)).
- block: sed-opal: fix sparse warning: convert __be64 data (git fixes (block drivers)).
- brcmfmac: fix wrong location to get firmware feature (bsc#1111666).
- btrfs: do not zero f_bavail if we have available space (bsc#1168081).
- btrfs: do not zero f_bavail if we have available space (bsc#1168081).
- char/random: Add a newline at the end of the file (jsc#SLE-12423).
- cifs: get rid of unused parameter in reconn_setup_dfs_targets() (bsc#1144333).
- cifs: handle hostnames that resolve to same ip in failover (bsc#1144333 bsc#1161016).
- cifs: set up next DFS target before generic_ip_connect() (bsc#1144333 bsc#1161016).
- clk: bcm2835: Fix return type of bcm2835_register_gate (bsc#1051510).
- clk: clk-flexgen: fix clock-critical handling (bsc#1051510).
- clk: sunxi: Fix incorrect usage of round_down() (bsc#1051510).
- compat_ioctl: block: handle BLKREPORTZONE/BLKRESETZONE (git fixes (block drivers)).
- compat_ioctl: block: handle Persistent Reservations (git fixes (block drivers)).
- copy_{to,from}_user(): consolidate object size checks (git fixes).
- crypto: caam - update xts sector size for large input length (bsc#1111666).
- crypto: chelsio/chtls: properly set tp->lsndtime (bsc#1111666).
- dm btree: increase rebalance threshold in __rebalance2() (git fixes (block drivers)).
- dm cache: fix a crash due to incorrect work item cancelling (git fixes (block drivers)).
- dm crypt: fix benbi IV constructor crash if used in authenticated mode (git fixes (block drivers)).
- dm space map common: fix to ensure new block isn't already in use (git fixes (block drivers)).
- dm verity fec: fix hash block number in verity_fec_decode (git fixes (block drivers)).
- dm verity fec: fix memory leak in verity_fec_dtr (git fixes (block drivers)).
- dm: fix potential for q->make_request_fn NULL pointer (git fixes (block drivers)).
- dm: various cleanups to md->queue initialization code (git fixes).
- dmaengine: tegra210-adma: Fix an error handling path in 'tegra_adma_probe()' (bsc#1111666).
- drivers: soc: ti: knav_qmss_queue: Make knav_gp_range_ops static (bsc#1051510).
- drm/i915: Whitelist context-local timestamp in the gen9 cmdparser (bsc#1111666).
- drm: amd/display: fix Kconfig help text (bsc#1113956)
- efi/random: Increase size of firmware supplied randomness (jsc#SLE-12423).
- efi/random: Treat EFI_RNG_PROTOCOL output as bootloader randomness (jsc#SLE-12423).
- efi: READ_ONCE rng seed size before munmap (jsc#SLE-12423).
- efi: Reorder pr_notice() with add_device_randomness() call (jsc#SLE-12423).
- evm: Check also if *tfm is an error pointer in init_desc() (bsc#1051510).
- evm: Fix a small race in init_desc() (bsc#1051510).
- extcon: adc-jack: Fix an error handling path in 'adc_jack_probe()' (bsc#1051510).
- fdt: Update CRC check for rng-seed (jsc#SLE-12423).
- fdt: add support for rng-seed (jsc#SLE-12423).
- firmware: imx: scu: Fix corruption of header (git-fixes).
- firmware: imx: scu: Fix possible memory leak in imx_scu_probe() (bsc#1111666).
- fpga: dfl: afu: Corrected error handling levels (git-fixes).
- fs/reiserfs: Reenabled reiserfs (bsc#1172884)
- gpiolib: Document that GPIO line names are not globally unique (bsc#1051510).
- gpu: ipu-v3: pre: do not trigger update if buffer address does not change (bsc#1111666).
- iio: buffer: Do not allow buffers without any channels enabled to be activated (bsc#1051510).
- iio: pressure: bmp280: Tolerate IRQ before registering (bsc#1051510).
- ima: Directly assign the ima_default_policy pointer to ima_rules (bsc#1051510).
- ima: Fix ima digest hash table key calculation (bsc#1051510).
- include/asm-generic/topology.h: guard cpumask_of_node() macro argument (bsc#1148868).
- kabi: ppc64le: prevent struct dma_map_ops to become defined (jsc#SLE-12423).
- kvm: x86: Fix L1TF mitigation for shadow MMU (bsc#1171904).
- livepatch: Apply vmlinux-specific KLP relocations early (bsc#1071995).
- livepatch: Disallow vmlinux.ko (bsc#1071995).
- livepatch: Make klp_apply_object_relocs static (bsc#1071995).
- livepatch: Prevent module-specific KLP rela sections from referencing vmlinux symbols (bsc#1071995).
- livepatch: Remove .klp.arch (bsc#1071995).
- mac80211: add option for setting control flags (bsc#1111666).
- mac80211: set IEEE80211_TX_CTRL_PORT_CTRL_PROTO for nl80211 TX (bsc#1111666).
- mailbox: imx: Disable the clock on devm_mbox_controller_register() failure (git-fixes).
- md: Avoid namespace collision with bitmap API (git fixes (block drivers)).
- md: use memalloc scope APIs in mddev_suspend()/mddev_resume() (bsc#1166985)).
- md: use memalloc scope APIs in mddev_suspend()/mddev_resume() (git fixes (block drivers)).
- mdraid: fix read/write bytes accounting (bsc#1172537).
- mmc: block: Fix request completion in the CQE timeout path (bsc#1111666).
- mmc: block: Fix use-after-free issue for rpmb (bsc#1111666).
- mmc: fix compilation of user API (bsc#1051510).
- netfilter: connlabels: prefer static lock initialiser (git-fixes).
- netfilter: not mark a spinlock as __read_mostly (git-fixes).
- nl80211: fix NL80211_ATTR_CHANNEL_WIDTH attribute type (bsc#1111666).
- nvme-fc: Fail transport errors with NVME_SC_HOST_PATH (bsc#1158983 bsc#1172538).
- nvme-tcp: fail command with NVME_SC_HOST_PATH_ERROR send failed (bsc#1158983 bsc#1172538).
- nvme: fail cancelled commands with NVME_SC_HOST_PATH_ERROR (bsc#1158983 bsc#1172538).
- overflow.h: Add arithmetic shift helper (git fixes).
- overflow: Fix -Wtype-limits compilation warnings (git fixes).
- p54usb: add AirVasT USB stick device-id (bsc#1051510).
- pcm_native: result of put_user() needs to be checked (bsc#1111666).
- perf, pt, coresight: Fix address filters for vmas with non-zero offset (git-fixes).
- perf, pt, coresight: Fix address filters for vmas with non-zero offset (git-fixes).
- perf/cgroup: Fix perf cgroup hierarchy support (git-fixes).
- perf/cgroup: Fix perf cgroup hierarchy support (git-fixes).
- perf/core: Add sanity check to deal with pinned event failure (git-fixes).
- perf/core: Add sanity check to deal with pinned event failure (git-fixes).
- perf/core: Avoid freeing static PMU contexts when PMU is unregistered (git-fixes).
- perf/core: Avoid freeing static PMU contexts when PMU is unregistered (git-fixes).
- perf/core: Correct event creation with PERF_FORMAT_GROUP (git-fixes).
- perf/core: Correct event creation with PERF_FORMAT_GROUP (git-fixes).
- perf/core: Do not WARN() for impossible ring-buffer sizes (git-fixes).
- perf/core: Do not WARN() for impossible ring-buffer sizes (git-fixes).
- perf/core: Fix __perf_read_group_add() locking (git-fixes (dependent patch)).
- perf/core: Fix __perf_read_group_add() locking (git-fixes (dependent patch)).
- perf/core: Fix bad use of igrab() (git fixes (dependent patch)).
- perf/core: Fix crash when using HW tracing kernel filters (git-fixes).
- perf/core: Fix ctx_event_type in ctx_resched() (git-fixes).
- perf/core: Fix ctx_event_type in ctx_resched() (git-fixes).
- perf/core: Fix error handling in perf_event_alloc() (git-fixes).
- perf/core: Fix error handling in perf_event_alloc() (git-fixes).
- perf/core: Fix exclusive events' grouping (git-fixes).
- perf/core: Fix exclusive events' grouping (git-fixes).
- perf/core: Fix group scheduling with mixed hw and sw events (git-fixes).
- perf/core: Fix group scheduling with mixed hw and sw events (git-fixes).
- perf/core: Fix impossible ring-buffer sizes warning (git-fixes).
- perf/core: Fix impossible ring-buffer sizes warning (git-fixes).
- perf/core: Fix lock inversion between perf,trace,cpuhp (git-fixes (dependent patch for 18736eef1213)).
- perf/core: Fix lock inversion between perf,trace,cpuhp (git-fixes (dependent patch for 18736eef1213)).
- perf/core: Fix locking for children siblings group read (git-fixes).
- perf/core: Fix locking for children siblings group read (git-fixes).
- perf/core: Fix perf_event_read_value() locking (git-fixes).
- perf/core: Fix perf_event_read_value() locking (git-fixes).
- perf/core: Fix perf_pmu_unregister() locking (git-fixes).
- perf/core: Fix perf_pmu_unregister() locking (git-fixes).
- perf/core: Fix perf_sample_regs_user() mm check (git-fixes).
- perf/core: Fix perf_sample_regs_user() mm check (git-fixes).
- perf/core: Fix possible Spectre-v1 indexing for ->aux_pages (git-fixes).
- perf/core: Fix possible Spectre-v1 indexing for ->aux_pages (git-fixes).
- perf/core: Fix race between close() and fork() (git-fixes).
- perf/core: Fix race between close() and fork() (git-fixes).
- perf/core: Fix the address filtering fix (git-fixes).
- perf/core: Fix the address filtering fix (git-fixes).
- perf/core: Fix use-after-free in uprobe_perf_close() (git-fixes).
- perf/core: Fix use-after-free in uprobe_perf_close() (git-fixes).
- perf/core: Force USER_DS when recording user stack data (git-fixes).
- perf/core: Force USER_DS when recording user stack data (git-fixes).
- perf/core: Restore mmap record type correctly (git-fixes).
- perf/core: Restore mmap record type correctly (git-fixes).
- perf/ioctl: Add check for the sample_period value (git-fixes).
- perf/ioctl: Add check for the sample_period value (git-fixes).
- perf/x86/pt, coresight: Clean up address filter structure (git fixes (dependent patch)).
- perf: Allocate context task_ctx_data for child event (git-fixes).
- perf: Allocate context task_ctx_data for child event (git-fixes).
- perf: Copy parent's address filter offsets on clone (git-fixes).
- perf: Copy parent's address filter offsets on clone (git-fixes).
- perf: Fix header.size for namespace events (git-fixes).
- perf: Fix header.size for namespace events (git-fixes).
- perf: Return proper values for user stack errors (git-fixes).
- perf: Return proper values for user stack errors (git-fixes).
- pid: Improve the comment about waiting in zap_pid_ns_processes (git fixes)).
- pinctrl: freescale: imx: Fix an error handling path in 'imx_pinctrl_probe()' (bsc#1051510).
- pinctrl: imxl: Fix an error handling path in 'imx1_pinctrl_core_probe()' (bsc#1051510).
- pinctrl: samsung: Save/restore eint_mask over suspend for EINT_TYPE GPIOs (bsc#1051510).
- platform/x86: dell-laptop: do not register micmute LED if there is no token (bsc#1111666).
- pnp: Use list_for_each_entry() instead of open coding (git fixes).
- power: supply: bq24257_charger: Replace depends on REGMAP_I2C with select (bsc#1051510).
- power: supply: lp8788: Fix an error handling path in 'lp8788_charger_probe()' (bsc#1051510).
- power: supply: smb347-charger: IRQSTAT_D is volatile (bsc#1051510).
- powerpc/64s: Do not let DT CPU features set FSCR_DSCR (bsc#1065729).
- powerpc/64s: Save FSCR to init_task.thread.fscr after feature init (bsc#1065729).
- powerpc/xive: Clear the page tables for the ESB IO mapping (bsc#1085030).
- raid5: remove gfp flags from scribble_alloc() (bsc#1166985).
- raid5: remove gfp flags from scribble_alloc() (git fixes (block drivers)).
- resolve KABI warning for perf-pt-coresight (git-fixes).
- resolve KABI warning for perf-pt-coresight (git-fixes).
- s390/bpf: Maintain 8-byte stack alignment (bsc#1169194).
- scsi: ibmvscsi: Do not send host info in adapter info MAD after LPM (bsc#1172759 ltc#184814).
- spi: dw: use 'smp_mb()' to avoid sending spi data error (bsc#1051510).
- spi: spi-mem: Fix Dual/Quad modes on Octal-capable devices (bsc#1111666).
- staging: rtl8712: Fix IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK (bsc#1051510).
- staging: sm750fb: add missing case while setting FB_VISUAL (bsc#1051510).
- tty: n_gsm: Fix SOF skipping (bsc#1051510).
- tty: n_gsm: Fix bogus i++ in gsm_data_kick (bsc#1051510).
- tty: n_gsm: Fix waking up upper tty layer when room available (bsc#1051510).
- usb: dwc2: gadget: move gadget resume after the core is in L0 state (bsc#1051510).
- usb: gadget: lpc32xx_udc: do not dereference ep pointer before null check (bsc#1051510).
- usb: musb: Fix runtime PM imbalance on error (bsc#1051510).
- usb: musb: start session in resume for host port (bsc#1051510).
- virtio-blk: handle block_device_operations callbacks after hot unplug (git fixes (block drivers)).
- w1: omap-hdq: cleanup to add missing newline for some dev_dbg (bsc#1051510).
- watchdog: sp805: fix restart handler (bsc#1111666).
- wil6210: add general initialization/size checks (bsc#1111666).
- wil6210: check rx_buff_mgmt before accessing it (bsc#1111666).
- wil6210: ignore HALP ICR if already handled (bsc#1111666).
- work around mvfs bug (bsc#1162063).
- x86/cpu/amd: Make erratum #1054 a legacy erratum (bsc#1114279).
- x86: Fix early boot crash on gcc-10, third try (bsc#1114279).
- xfrm: fix error in comment (git fixes).
Patchnames
SUSE-2020-1699,SUSE-SLE-SERVER-12-SP5-2020-1699
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2020-10768: The prctl() function could be used to enable indirect branch speculation even after it has been disabled. (bnc#1172783)\n- CVE-2020-10766: A bug in the logic handling could allow an attacker with a local account to disable SSBD protection. (bnc#1172781)\n- CVE-2020-10767: A IBPB would be disabled when STIBP was not available or when Enhanced Indirect Branch Restricted Speculation (IBRS) was available. This is unexpected behaviour could leave the system open to a spectre v2 style attack (bnc#1172782)\n- CVE-2020-13974: drivers/tty/vt/keyboard.c had an integer overflow if k_ascii was called several times in a row (bnc#1172775)\n- CVE-2019-20810: go7007_snd_init did not call snd_card_free for a failure path, which caused a memory leak (bnc#1172458)\n\nThe following non-security bugs were fixed:\n\n- ACPI: PM: Avoid using power resources if there are none for D0 (bsc#1051510).\n- ALSA: es1688: Add the missed snd_card_free() (bsc#1051510).\n- ALSA: hda/hdmi - enable runtime pm for newer AMD display audio (bsc#1111666).\n- ALSA: hda/realtek - Add LED class support for micmute LED (bsc#1111666).\n- ALSA: hda/realtek - Enable micmute LED on and HP system (bsc#1111666).\n- ALSA: hda/realtek - Fix unused variable warning w/o CONFIG_LEDS_TRIGGER_AUDIO (bsc#1111666).\n- ALSA: hda/realtek - Introduce polarity for micmute LED GPIO (bsc#1111666).\n- ALSA: hda/realtek - add a pintbl quirk for several Lenovo machines (bsc#1111666).\n- ALSA: hda: Add ElkhartLake HDMI codec vid (bsc#1111666).\n- ALSA: hda: add sienna_cichlid audio asic id for sienna_cichlid up (bsc#1111666).\n- ALSA: pcm: disallow linking stream to itself (bsc#1111666).\n- ALSA: usb-audio: Add Pioneer DJ DJM-900NXS2 support (bsc#1111666).\n- ALSA: usb-audio: Add duplex sound support for USB devices using implicit feedback (bsc#1111666).\n- ALSA: usb-audio: Add vendor, product and profile name for HP Thunderbolt Dock (bsc#1111666).\n- ALSA: usb-audio: Clean up quirk entries with macros (bsc#1111666).\n- ALSA: usb-audio: Fix inconsistent card PM state after resume (bsc#1111666).\n- ALSA: usb-audio: Fix racy list management in output queue (bsc#1111666).\n- ALSA: usb-audio: Manage auto-pm of all bundled interfaces (bsc#1111666).\n- ALSA: usb-audio: Use the new macro for HP Dock rename quirks (bsc#1111666).\n- CDC-ACM: heed quirk also in error handling (git-fixes).\n- HID: sony: Fix for broken buttons on DS3 USB dongles (bsc#1051510).\n- KVM: x86/mmu: Set mmio_value to \u00270\u0027 if reserved #PF can\u0027t be generated (bsc#1171904).\n- KVM: x86: only do L1TF workaround on affected processors (bsc#1171904).\n- NFS: Fix an RCU lock leak in nfs4_refresh_delegation_stateid() (bsc#1170592).\n- NFSv4: Retry CLOSE and DELEGRETURN on NFS4ERR_OLD_STATEID (bsc#1170592).\n- PCI/PM: Call .bridge_d3() hook only if non-NULL (git-fixes).\n- PCI/PTM: Inherit Switch Downstream Port PTM settings from Upstream Port (bsc#1051510).\n- PCI: Allow pci_resize_resource() for devices on root bus (bsc#1051510).\n- PCI: Fix pci_register_host_bridge() device_register() error handling (bsc#1051510).\n- PCI: Program MPS for RCiEP devices (bsc#1051510).\n- RDMA/efa: Fix setting of wrong bit in get/set_feature commands (bsc#1111666)\n- RDMA/efa: Support remote read access in MR registration (bsc#1111666)\n- RDMA/efa: Unified getters/setters for device structs bitmask access (bsc#1111666)\n- USB: gadget: udc: s3c2410_udc: Remove pointless NULL check in s3c2410_udc_nuke (bsc#1051510).\n- USB: host: ehci-mxc: Add error handling in ehci_mxc_drv_probe() (bsc#1051510).\n- USB: serial: option: add Telit LE910C1-EUX compositions (bsc#1051510).\n- USB: serial: qcserial: add DW5816e QDL support (bsc#1051510).\n- USB: serial: usb_wwan: do not resubmit rx urb on fatal errors (bsc#1051510).\n- USB: serial: usb_wwan: do not resubmit rx urb on fatal errors (git-fixes).\n- arm64: map FDT as RW for early_init_dt_scan() (jsc#SLE-12423).\n- bcache: Fix an error code in bch_dump_read() (git fixes (block drivers)).\n- block: remove QUEUE_FLAG_STACKABLE (git fixes (block drivers)).\n- block: sed-opal: fix sparse warning: convert __be64 data (git fixes (block drivers)).\n- brcmfmac: fix wrong location to get firmware feature (bsc#1111666).\n- btrfs: do not zero f_bavail if we have available space (bsc#1168081).\n- btrfs: do not zero f_bavail if we have available space (bsc#1168081).\n- char/random: Add a newline at the end of the file (jsc#SLE-12423).\n- cifs: get rid of unused parameter in reconn_setup_dfs_targets() (bsc#1144333).\n- cifs: handle hostnames that resolve to same ip in failover (bsc#1144333 bsc#1161016).\n- cifs: set up next DFS target before generic_ip_connect() (bsc#1144333 bsc#1161016).\n- clk: bcm2835: Fix return type of bcm2835_register_gate (bsc#1051510).\n- clk: clk-flexgen: fix clock-critical handling (bsc#1051510).\n- clk: sunxi: Fix incorrect usage of round_down() (bsc#1051510).\n- compat_ioctl: block: handle BLKREPORTZONE/BLKRESETZONE (git fixes (block drivers)).\n- compat_ioctl: block: handle Persistent Reservations (git fixes (block drivers)).\n- copy_{to,from}_user(): consolidate object size checks (git fixes).\n- crypto: caam - update xts sector size for large input length (bsc#1111666).\n- crypto: chelsio/chtls: properly set tp-\u003elsndtime (bsc#1111666).\n- dm btree: increase rebalance threshold in __rebalance2() (git fixes (block drivers)).\n- dm cache: fix a crash due to incorrect work item cancelling (git fixes (block drivers)).\n- dm crypt: fix benbi IV constructor crash if used in authenticated mode (git fixes (block drivers)).\n- dm space map common: fix to ensure new block isn\u0027t already in use (git fixes (block drivers)).\n- dm verity fec: fix hash block number in verity_fec_decode (git fixes (block drivers)).\n- dm verity fec: fix memory leak in verity_fec_dtr (git fixes (block drivers)).\n- dm: fix potential for q-\u003emake_request_fn NULL pointer (git fixes (block drivers)).\n- dm: various cleanups to md-\u003equeue initialization code (git fixes).\n- dmaengine: tegra210-adma: Fix an error handling path in \u0027tegra_adma_probe()\u0027 (bsc#1111666).\n- drivers: soc: ti: knav_qmss_queue: Make knav_gp_range_ops static (bsc#1051510).\n- drm/i915: Whitelist context-local timestamp in the gen9 cmdparser (bsc#1111666).\n- drm: amd/display: fix Kconfig help text (bsc#1113956)\n- efi/random: Increase size of firmware supplied randomness (jsc#SLE-12423).\n- efi/random: Treat EFI_RNG_PROTOCOL output as bootloader randomness (jsc#SLE-12423).\n- efi: READ_ONCE rng seed size before munmap (jsc#SLE-12423).\n- efi: Reorder pr_notice() with add_device_randomness() call (jsc#SLE-12423).\n- evm: Check also if *tfm is an error pointer in init_desc() (bsc#1051510).\n- evm: Fix a small race in init_desc() (bsc#1051510).\n- extcon: adc-jack: Fix an error handling path in \u0027adc_jack_probe()\u0027 (bsc#1051510).\n- fdt: Update CRC check for rng-seed (jsc#SLE-12423).\n- fdt: add support for rng-seed (jsc#SLE-12423).\n- firmware: imx: scu: Fix corruption of header (git-fixes).\n- firmware: imx: scu: Fix possible memory leak in imx_scu_probe() (bsc#1111666).\n- fpga: dfl: afu: Corrected error handling levels (git-fixes).\n- fs/reiserfs: Reenabled reiserfs (bsc#1172884)\n- gpiolib: Document that GPIO line names are not globally unique (bsc#1051510).\n- gpu: ipu-v3: pre: do not trigger update if buffer address does not change (bsc#1111666).\n- iio: buffer: Do not allow buffers without any channels enabled to be activated (bsc#1051510).\n- iio: pressure: bmp280: Tolerate IRQ before registering (bsc#1051510).\n- ima: Directly assign the ima_default_policy pointer to ima_rules (bsc#1051510).\n- ima: Fix ima digest hash table key calculation (bsc#1051510).\n- include/asm-generic/topology.h: guard cpumask_of_node() macro argument (bsc#1148868).\n- kabi: ppc64le: prevent struct dma_map_ops to become defined (jsc#SLE-12423).\n- kvm: x86: Fix L1TF mitigation for shadow MMU (bsc#1171904).\n- livepatch: Apply vmlinux-specific KLP relocations early (bsc#1071995).\n- livepatch: Disallow vmlinux.ko (bsc#1071995).\n- livepatch: Make klp_apply_object_relocs static (bsc#1071995).\n- livepatch: Prevent module-specific KLP rela sections from referencing vmlinux symbols (bsc#1071995).\n- livepatch: Remove .klp.arch (bsc#1071995).\n- mac80211: add option for setting control flags (bsc#1111666).\n- mac80211: set IEEE80211_TX_CTRL_PORT_CTRL_PROTO for nl80211 TX (bsc#1111666).\n- mailbox: imx: Disable the clock on devm_mbox_controller_register() failure (git-fixes).\n- md: Avoid namespace collision with bitmap API (git fixes (block drivers)).\n- md: use memalloc scope APIs in mddev_suspend()/mddev_resume() (bsc#1166985)).\n- md: use memalloc scope APIs in mddev_suspend()/mddev_resume() (git fixes (block drivers)).\n- mdraid: fix read/write bytes accounting (bsc#1172537).\n- mmc: block: Fix request completion in the CQE timeout path (bsc#1111666).\n- mmc: block: Fix use-after-free issue for rpmb (bsc#1111666).\n- mmc: fix compilation of user API (bsc#1051510).\n- netfilter: connlabels: prefer static lock initialiser (git-fixes).\n- netfilter: not mark a spinlock as __read_mostly (git-fixes).\n- nl80211: fix NL80211_ATTR_CHANNEL_WIDTH attribute type (bsc#1111666).\n- nvme-fc: Fail transport errors with NVME_SC_HOST_PATH (bsc#1158983 bsc#1172538).\n- nvme-tcp: fail command with NVME_SC_HOST_PATH_ERROR send failed (bsc#1158983 bsc#1172538).\n- nvme: fail cancelled commands with NVME_SC_HOST_PATH_ERROR (bsc#1158983 bsc#1172538).\n- overflow.h: Add arithmetic shift helper (git fixes).\n- overflow: Fix -Wtype-limits compilation warnings (git fixes).\n- p54usb: add AirVasT USB stick device-id (bsc#1051510).\n- pcm_native: result of put_user() needs to be checked (bsc#1111666).\n- perf, pt, coresight: Fix address filters for vmas with non-zero offset (git-fixes).\n- perf, pt, coresight: Fix address filters for vmas with non-zero offset (git-fixes).\n- perf/cgroup: Fix perf cgroup hierarchy support (git-fixes).\n- perf/cgroup: Fix perf cgroup hierarchy support (git-fixes).\n- perf/core: Add sanity check to deal with pinned event failure (git-fixes).\n- perf/core: Add sanity check to deal with pinned event failure (git-fixes).\n- perf/core: Avoid freeing static PMU contexts when PMU is unregistered (git-fixes).\n- perf/core: Avoid freeing static PMU contexts when PMU is unregistered (git-fixes).\n- perf/core: Correct event creation with PERF_FORMAT_GROUP (git-fixes).\n- perf/core: Correct event creation with PERF_FORMAT_GROUP (git-fixes).\n- perf/core: Do not WARN() for impossible ring-buffer sizes (git-fixes).\n- perf/core: Do not WARN() for impossible ring-buffer sizes (git-fixes).\n- perf/core: Fix __perf_read_group_add() locking (git-fixes (dependent patch)).\n- perf/core: Fix __perf_read_group_add() locking (git-fixes (dependent patch)).\n- perf/core: Fix bad use of igrab() (git fixes (dependent patch)).\n- perf/core: Fix crash when using HW tracing kernel filters (git-fixes).\n- perf/core: Fix ctx_event_type in ctx_resched() (git-fixes).\n- perf/core: Fix ctx_event_type in ctx_resched() (git-fixes).\n- perf/core: Fix error handling in perf_event_alloc() (git-fixes).\n- perf/core: Fix error handling in perf_event_alloc() (git-fixes).\n- perf/core: Fix exclusive events\u0027 grouping (git-fixes).\n- perf/core: Fix exclusive events\u0027 grouping (git-fixes).\n- perf/core: Fix group scheduling with mixed hw and sw events (git-fixes).\n- perf/core: Fix group scheduling with mixed hw and sw events (git-fixes).\n- perf/core: Fix impossible ring-buffer sizes warning (git-fixes).\n- perf/core: Fix impossible ring-buffer sizes warning (git-fixes).\n- perf/core: Fix lock inversion between perf,trace,cpuhp (git-fixes (dependent patch for 18736eef1213)).\n- perf/core: Fix lock inversion between perf,trace,cpuhp (git-fixes (dependent patch for 18736eef1213)).\n- perf/core: Fix locking for children siblings group read (git-fixes).\n- perf/core: Fix locking for children siblings group read (git-fixes).\n- perf/core: Fix perf_event_read_value() locking (git-fixes).\n- perf/core: Fix perf_event_read_value() locking (git-fixes).\n- perf/core: Fix perf_pmu_unregister() locking (git-fixes).\n- perf/core: Fix perf_pmu_unregister() locking (git-fixes).\n- perf/core: Fix perf_sample_regs_user() mm check (git-fixes).\n- perf/core: Fix perf_sample_regs_user() mm check (git-fixes).\n- perf/core: Fix possible Spectre-v1 indexing for -\u003eaux_pages (git-fixes).\n- perf/core: Fix possible Spectre-v1 indexing for -\u003eaux_pages (git-fixes).\n- perf/core: Fix race between close() and fork() (git-fixes).\n- perf/core: Fix race between close() and fork() (git-fixes).\n- perf/core: Fix the address filtering fix (git-fixes).\n- perf/core: Fix the address filtering fix (git-fixes).\n- perf/core: Fix use-after-free in uprobe_perf_close() (git-fixes).\n- perf/core: Fix use-after-free in uprobe_perf_close() (git-fixes).\n- perf/core: Force USER_DS when recording user stack data (git-fixes).\n- perf/core: Force USER_DS when recording user stack data (git-fixes).\n- perf/core: Restore mmap record type correctly (git-fixes).\n- perf/core: Restore mmap record type correctly (git-fixes).\n- perf/ioctl: Add check for the sample_period value (git-fixes).\n- perf/ioctl: Add check for the sample_period value (git-fixes).\n- perf/x86/pt, coresight: Clean up address filter structure (git fixes (dependent patch)).\n- perf: Allocate context task_ctx_data for child event (git-fixes).\n- perf: Allocate context task_ctx_data for child event (git-fixes).\n- perf: Copy parent\u0027s address filter offsets on clone (git-fixes).\n- perf: Copy parent\u0027s address filter offsets on clone (git-fixes).\n- perf: Fix header.size for namespace events (git-fixes).\n- perf: Fix header.size for namespace events (git-fixes).\n- perf: Return proper values for user stack errors (git-fixes).\n- perf: Return proper values for user stack errors (git-fixes).\n- pid: Improve the comment about waiting in zap_pid_ns_processes (git fixes)).\n- pinctrl: freescale: imx: Fix an error handling path in \u0027imx_pinctrl_probe()\u0027 (bsc#1051510).\n- pinctrl: imxl: Fix an error handling path in \u0027imx1_pinctrl_core_probe()\u0027 (bsc#1051510).\n- pinctrl: samsung: Save/restore eint_mask over suspend for EINT_TYPE GPIOs (bsc#1051510).\n- platform/x86: dell-laptop: do not register micmute LED if there is no token (bsc#1111666).\n- pnp: Use list_for_each_entry() instead of open coding (git fixes).\n- power: supply: bq24257_charger: Replace depends on REGMAP_I2C with select (bsc#1051510).\n- power: supply: lp8788: Fix an error handling path in \u0027lp8788_charger_probe()\u0027 (bsc#1051510).\n- power: supply: smb347-charger: IRQSTAT_D is volatile (bsc#1051510).\n- powerpc/64s: Do not let DT CPU features set FSCR_DSCR (bsc#1065729).\n- powerpc/64s: Save FSCR to init_task.thread.fscr after feature init (bsc#1065729).\n- powerpc/xive: Clear the page tables for the ESB IO mapping (bsc#1085030).\n- raid5: remove gfp flags from scribble_alloc() (bsc#1166985).\n- raid5: remove gfp flags from scribble_alloc() (git fixes (block drivers)).\n- resolve KABI warning for perf-pt-coresight (git-fixes).\n- resolve KABI warning for perf-pt-coresight (git-fixes).\n- s390/bpf: Maintain 8-byte stack alignment (bsc#1169194).\n- scsi: ibmvscsi: Do not send host info in adapter info MAD after LPM (bsc#1172759 ltc#184814).\n- spi: dw: use \u0027smp_mb()\u0027 to avoid sending spi data error (bsc#1051510).\n- spi: spi-mem: Fix Dual/Quad modes on Octal-capable devices (bsc#1111666).\n- staging: rtl8712: Fix IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK (bsc#1051510).\n- staging: sm750fb: add missing case while setting FB_VISUAL (bsc#1051510).\n- tty: n_gsm: Fix SOF skipping (bsc#1051510).\n- tty: n_gsm: Fix bogus i++ in gsm_data_kick (bsc#1051510).\n- tty: n_gsm: Fix waking up upper tty layer when room available (bsc#1051510).\n- usb: dwc2: gadget: move gadget resume after the core is in L0 state (bsc#1051510).\n- usb: gadget: lpc32xx_udc: do not dereference ep pointer before null check (bsc#1051510).\n- usb: musb: Fix runtime PM imbalance on error (bsc#1051510).\n- usb: musb: start session in resume for host port (bsc#1051510).\n- virtio-blk: handle block_device_operations callbacks after hot unplug (git fixes (block drivers)).\n- w1: omap-hdq: cleanup to add missing newline for some dev_dbg (bsc#1051510).\n- watchdog: sp805: fix restart handler (bsc#1111666).\n- wil6210: add general initialization/size checks (bsc#1111666).\n- wil6210: check rx_buff_mgmt before accessing it (bsc#1111666).\n- wil6210: ignore HALP ICR if already handled (bsc#1111666).\n- work around mvfs bug (bsc#1162063).\n- x86/cpu/amd: Make erratum #1054 a legacy erratum (bsc#1114279).\n- x86: Fix early boot crash on gcc-10, third try (bsc#1114279).\n- xfrm: fix error in comment (git fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-1699,SUSE-SLE-SERVER-12-SP5-2020-1699", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_1699-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:1699-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20201699-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:1699-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-June/007005.html" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1085030", "url": "https://bugzilla.suse.com/1085030" }, { "category": "self", "summary": "SUSE Bug 1111666", "url": "https://bugzilla.suse.com/1111666" }, { "category": "self", "summary": "SUSE Bug 1113956", "url": "https://bugzilla.suse.com/1113956" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1144333", "url": "https://bugzilla.suse.com/1144333" }, { "category": "self", "summary": "SUSE Bug 1148868", "url": "https://bugzilla.suse.com/1148868" }, { "category": "self", "summary": "SUSE Bug 1158983", "url": "https://bugzilla.suse.com/1158983" }, { "category": "self", "summary": "SUSE Bug 1161016", "url": "https://bugzilla.suse.com/1161016" }, { "category": "self", "summary": "SUSE Bug 1162063", "url": "https://bugzilla.suse.com/1162063" }, { "category": "self", "summary": "SUSE Bug 1166985", "url": "https://bugzilla.suse.com/1166985" }, { "category": "self", "summary": "SUSE Bug 1168081", "url": "https://bugzilla.suse.com/1168081" }, { "category": "self", "summary": "SUSE Bug 1169194", "url": "https://bugzilla.suse.com/1169194" }, { "category": "self", "summary": "SUSE Bug 1170592", "url": "https://bugzilla.suse.com/1170592" }, { "category": "self", "summary": "SUSE Bug 1171904", "url": "https://bugzilla.suse.com/1171904" }, { "category": "self", "summary": "SUSE Bug 1172458", "url": "https://bugzilla.suse.com/1172458" }, { "category": "self", "summary": "SUSE Bug 1172472", "url": "https://bugzilla.suse.com/1172472" }, { "category": "self", "summary": "SUSE Bug 1172537", "url": "https://bugzilla.suse.com/1172537" }, { "category": "self", "summary": "SUSE Bug 1172538", "url": "https://bugzilla.suse.com/1172538" }, { "category": "self", "summary": "SUSE Bug 1172759", "url": "https://bugzilla.suse.com/1172759" }, { "category": "self", "summary": "SUSE Bug 1172775", "url": "https://bugzilla.suse.com/1172775" }, { "category": "self", "summary": "SUSE Bug 1172781", "url": "https://bugzilla.suse.com/1172781" }, { "category": "self", "summary": "SUSE Bug 1172782", "url": "https://bugzilla.suse.com/1172782" }, { "category": "self", "summary": "SUSE Bug 1172783", "url": "https://bugzilla.suse.com/1172783" }, { "category": "self", "summary": "SUSE Bug 1172884", "url": "https://bugzilla.suse.com/1172884" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20810 page", "url": "https://www.suse.com/security/cve/CVE-2019-20810/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10766 page", "url": "https://www.suse.com/security/cve/CVE-2020-10766/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10767 page", "url": "https://www.suse.com/security/cve/CVE-2020-10767/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10768 page", "url": "https://www.suse.com/security/cve/CVE-2020-10768/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-13974 page", "url": "https://www.suse.com/security/cve/CVE-2020-13974/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-06-22T07:52:05Z", "generator": { "date": "2020-06-22T07:52:05Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:1699-1", "initial_release_date": "2020-06-22T07:52:05Z", "revision_history": [ { "date": "2020-06-22T07:52:05Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-azure-4.12.14-16.19.1.noarch", "product": { "name": "kernel-devel-azure-4.12.14-16.19.1.noarch", "product_id": "kernel-devel-azure-4.12.14-16.19.1.noarch" } }, { "category": "product_version", "name": "kernel-source-azure-4.12.14-16.19.1.noarch", "product": { "name": "kernel-source-azure-4.12.14-16.19.1.noarch", "product_id": "kernel-source-azure-4.12.14-16.19.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-azure-4.12.14-16.19.1.x86_64", "product": { "name": "cluster-md-kmp-azure-4.12.14-16.19.1.x86_64", "product_id": "cluster-md-kmp-azure-4.12.14-16.19.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-azure-4.12.14-16.19.1.x86_64", "product": { "name": "dlm-kmp-azure-4.12.14-16.19.1.x86_64", "product_id": "dlm-kmp-azure-4.12.14-16.19.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-azure-4.12.14-16.19.1.x86_64", "product": { "name": "gfs2-kmp-azure-4.12.14-16.19.1.x86_64", "product_id": "gfs2-kmp-azure-4.12.14-16.19.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-4.12.14-16.19.1.x86_64", "product": { "name": "kernel-azure-4.12.14-16.19.1.x86_64", "product_id": "kernel-azure-4.12.14-16.19.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-base-4.12.14-16.19.1.x86_64", "product": { "name": "kernel-azure-base-4.12.14-16.19.1.x86_64", "product_id": "kernel-azure-base-4.12.14-16.19.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-devel-4.12.14-16.19.1.x86_64", "product": { "name": "kernel-azure-devel-4.12.14-16.19.1.x86_64", "product_id": "kernel-azure-devel-4.12.14-16.19.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-extra-4.12.14-16.19.1.x86_64", "product": { "name": "kernel-azure-extra-4.12.14-16.19.1.x86_64", "product_id": "kernel-azure-extra-4.12.14-16.19.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-kgraft-devel-4.12.14-16.19.1.x86_64", "product": { "name": "kernel-azure-kgraft-devel-4.12.14-16.19.1.x86_64", "product_id": "kernel-azure-kgraft-devel-4.12.14-16.19.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-azure-4.12.14-16.19.1.x86_64", "product": { "name": "kernel-syms-azure-4.12.14-16.19.1.x86_64", "product_id": "kernel-syms-azure-4.12.14-16.19.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-azure-4.12.14-16.19.1.x86_64", "product": { "name": "kselftests-kmp-azure-4.12.14-16.19.1.x86_64", "product_id": "kselftests-kmp-azure-4.12.14-16.19.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-azure-4.12.14-16.19.1.x86_64", "product": { "name": "ocfs2-kmp-azure-4.12.14-16.19.1.x86_64", "product_id": "ocfs2-kmp-azure-4.12.14-16.19.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP5", "product": { "name": "SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-4.12.14-16.19.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.19.1.x86_64" }, "product_reference": "kernel-azure-4.12.14-16.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-base-4.12.14-16.19.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.19.1.x86_64" }, "product_reference": "kernel-azure-base-4.12.14-16.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-4.12.14-16.19.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.19.1.x86_64" }, "product_reference": "kernel-azure-devel-4.12.14-16.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-4.12.14-16.19.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.19.1.noarch" }, "product_reference": "kernel-devel-azure-4.12.14-16.19.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-4.12.14-16.19.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.19.1.noarch" }, "product_reference": "kernel-source-azure-4.12.14-16.19.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-4.12.14-16.19.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.19.1.x86_64" }, "product_reference": "kernel-syms-azure-4.12.14-16.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-4.12.14-16.19.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.19.1.x86_64" }, "product_reference": "kernel-azure-4.12.14-16.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-base-4.12.14-16.19.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.19.1.x86_64" }, "product_reference": "kernel-azure-base-4.12.14-16.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-4.12.14-16.19.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.19.1.x86_64" }, "product_reference": "kernel-azure-devel-4.12.14-16.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-4.12.14-16.19.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.19.1.noarch" }, "product_reference": "kernel-devel-azure-4.12.14-16.19.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-4.12.14-16.19.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.19.1.noarch" }, "product_reference": "kernel-source-azure-4.12.14-16.19.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-4.12.14-16.19.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.19.1.x86_64" }, "product_reference": "kernel-syms-azure-4.12.14-16.19.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-20810", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20810" } ], "notes": [ { "category": "general", "text": "go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel before 5.6 does not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.19.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.19.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20810", "url": "https://www.suse.com/security/cve/CVE-2019-20810" }, { "category": "external", "summary": "SUSE Bug 1172458 for CVE-2019-20810", "url": "https://bugzilla.suse.com/1172458" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.19.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.19.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.19.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.19.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-22T07:52:05Z", "details": "low" } ], "title": "CVE-2019-20810" }, { "cve": "CVE-2020-10766", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10766" } ], "notes": [ { "category": "general", "text": "A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.19.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.19.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10766", "url": "https://www.suse.com/security/cve/CVE-2020-10766" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172781 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1172781" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.19.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.19.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.19.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.19.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-22T07:52:05Z", "details": "moderate" } ], "title": "CVE-2020-10766" }, { "cve": "CVE-2020-10767", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10767" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.19.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.19.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10767", "url": "https://www.suse.com/security/cve/CVE-2020-10767" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172782 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1172782" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.19.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.19.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.19.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.19.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-22T07:52:05Z", "details": "moderate" } ], "title": "CVE-2020-10767" }, { "cve": "CVE-2020-10768", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10768" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.19.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.19.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10768", "url": "https://www.suse.com/security/cve/CVE-2020-10768" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172783 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1172783" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.19.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.19.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.19.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.19.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-22T07:52:05Z", "details": "moderate" } ], "title": "CVE-2020-10768" }, { "cve": "CVE-2020-13974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-13974" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel 4.4 through 5.7.1. drivers/tty/vt/keyboard.c has an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. NOTE: Members in the community argue that the integer overflow does not lead to a security issue in this case.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.19.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.19.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.19.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-13974", "url": "https://www.suse.com/security/cve/CVE-2020-13974" }, { "category": "external", "summary": "SUSE Bug 1172775 for CVE-2020-13974", "url": "https://bugzilla.suse.com/1172775" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.19.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.19.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.19.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.19.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.19.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.19.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.19.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.19.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-22T07:52:05Z", "details": "moderate" } ], "title": "CVE-2020-13974" } ] }
suse-su-2020:2121-1
Vulnerability from csaf_suse
Published
2020-08-04 13:18
Modified
2020-08-04 13:18
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP4 LTSS kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).
- CVE-2019-20908: An issue was discovered in drivers/firmware/efi/efi.c where incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032 (bnc#1173567).
- CVE-2020-15780: An issue was discovered in drivers/acpi/acpi_configfs.c where injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30 (bnc#1173573).
- CVE-2020-15393: usbtest_disconnect in drivers/usb/misc/usbtest.c has a memory leak, aka CID-28ebeb8db770 (bnc#1173514).
- CVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c had a deadlock if a coalescing operation fails (bnc#1171732).
- CVE-2019-16746: net/wireless/nl80211.c did not check the length of variable elements in a beacon head, leading to a buffer overflow (bnc#1152107).
- CVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).
- CVE-2020-10769: A buffer over-read flaw was found in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm's module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash. This flaw allowed a local attacker with user privileges to cause a denial of service (bnc#1173265).
- CVE-2020-10773: A kernel stack information leak on s390/s390x was fixed (bnc#1172999).
- CVE-2020-14416: A race condition in tty->disc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).
- CVE-2020-10768: Indirect branch speculation could have been enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command. (bnc#1172783).
- CVE-2020-10766: Fixed Rogue cross-process SSBD shutdown, where a Linux scheduler logical bug allows an attacker to turn off the SSBD protection. (bnc#1172781).
- CVE-2020-10767: Indirect Branch Prediction Barrier was force-disabled when STIBP is unavailable or enhanced IBRS is available. (bnc#1172782).
- CVE-2020-13974: drivers/tty/vt/keyboard.c had an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. (bnc#1172775).
- CVE-2019-20810: go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel did not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586 (bnc#1172458).
The following non-security bugs were fixed:
- ACPI: PM: Avoid using power resources if there are none for D0 (bsc#1051510).
- ALSA: es1688: Add the missed snd_card_free() (bsc#1051510).
- bcache: Fix an error code in bch_dump_read() (git fixes (block drivers)).
- block, bfq: add requeue-request hook (bsc#1104967 bsc#1171673).
- block, bfq: postpone rq preparation to insert or merge (bsc#1104967 bsc#1171673).
- block: remove QUEUE_FLAG_STACKABLE (git fixes (block drivers)).
- block: sed-opal: fix sparse warning: convert __be64 data (git fixes (block drivers)).
- btrfs: always wait on ordered extents at fsync time (bsc#1171761).
- btrfs: clean up the left over logged_list usage (bsc#1171761).
- btrfs: do not zero f_bavail if we have available space (bsc#1168081).
- btrfs: fix list_add corruption and soft lockups in fsync (bsc#1171761).
- btrfs: fix missing data checksums after a ranged fsync (msync) (bsc#1171761).
- btrfs: fix missing file extent item for hole after ranged fsync (bsc#1171761).
- btrfs: fix missing hole after hole punching and fsync when using NO_HOLES (bsc#1171761).
- btrfs: fix missing semaphore unlock in btrfs_sync_file (bsc#1171761).
- btrfs: fix rare chances for data loss when doing a fast fsync (bsc#1171761).
- btrfs: Remove extra parentheses from condition in copy_items() (bsc#1171761).
- btrfs: remove no longer used io_err from btrfs_log_ctx (bsc#1171761).
- btrfs: remove no longer used logged range variables when logging extents (bsc#1171761).
- btrfs: remove no longer used 'sync' member from transaction handle (bsc#1171761).
- btrfs: remove remaing full_sync logic from btrfs_sync_file (bsc#1171761).
- btrfs: remove the logged extents infrastructure (bsc#1171761).
- btrfs: remove the wait ordered logic in the log_one_extent path (bsc#1171761).
- btrfs: volumes: Remove ENOSPC-prone btrfs_can_relocate() (bsc#1171124).
- CDC-ACM: heed quirk also in error handling (git-fixes).
- cifs: get rid of unused parameter in reconn_setup_dfs_targets() (bsc#1144333).
- cifs: handle hostnames that resolve to same ip in failover (bsc#1144333 bsc#1161016).
- cifs: set up next DFS target before generic_ip_connect() (bsc#1144333 bsc#1161016).
- clk: bcm2835: Fix return type of bcm2835_register_gate (bsc#1051510).
- clk: clk-flexgen: fix clock-critical handling (bsc#1051510).
- clk: sunxi: Fix incorrect usage of round_down() (bsc#1051510).
- compat_ioctl: block: handle BLKREPORTZONE/BLKRESETZONE (git fixes (block drivers)).
- compat_ioctl: block: handle Persistent Reservations (git fixes (block drivers)).
- copy_{to,from}_user(): consolidate object size checks (git fixes).
- crypto: cavium/nitrox - Fix 'nitrox_get_first_device()' when ndevlist is fully iterated (git-fixes).
- dm btree: increase rebalance threshold in __rebalance2() (git fixes (block drivers)).
- dm cache: fix a crash due to incorrect work item cancelling (git fixes (block drivers)).
- dm crypt: fix benbi IV constructor crash if used in authenticated mode (git fixes (block drivers)).
- dm: fix potential for q->make_request_fn NULL pointer (git fixes (block drivers)).
- dm space map common: fix to ensure new block isn't already in use (git fixes (block drivers)).
- dm: various cleanups to md->queue initialization code (git fixes).
- dm verity fec: fix hash block number in verity_fec_decode (git fixes (block drivers)).
- dm verity fec: fix memory leak in verity_fec_dtr (git fixes (block drivers)).
- Drivers: hv: Change flag to write log level in panic msg to false (bsc#1170618).
- drivers: soc: ti: knav_qmss_queue: Make knav_gp_range_ops static (bsc#1051510).
- drm/dp_mst: Increase ACT retry timeout to 3s (bsc#1152472) * context changes
- drm: encoder_slave: fix refcouting error for modules (bsc#1114279)
- drm/mediatek: Check plane visibility in atomic_update (bsc#1152472) * context changes
- drm/qxl: Use correct notify port address when creating cursor ring (bsc#1152472)
- drm/radeon: fix double free (bsc#1152472)
- drm/radeon: fix fb_div check in ni_init_smc_spll_table() (bsc#1152472)
- e1000e: Disable TSO for buffer overrun workaround (bsc#1051510).
- e1000e: Do not wake up the system via WOL if device wakeup is disabled (bsc#1051510).
- EDAC/amd64: Read back the scrub rate PCI register on F15h (bsc#1114279).
- evm: Check also if *tfm is an error pointer in init_desc() (bsc#1051510).
- evm: Fix a small race in init_desc() (bsc#1051510).
- extcon: adc-jack: Fix an error handling path in 'adc_jack_probe()' (bsc#1051510).
- gpiolib: Document that GPIO line names are not globally unique (bsc#1051510).
- HID: sony: Fix for broken buttons on DS3 USB dongles (bsc#1051510).
- ibmveth: Fix max MTU limit (bsc#1173428 ltc#186397).
- ibmvnic: continue to init in CRQ reset returns H_CLOSED (bsc#1173280 ltc#185369).
- ibmvnic: Flush existing work items before device removal (bsc#1065729).
- ibmvnic: Harden device login requests (bsc#1170011 ltc#183538).
- iio: buffer: Do not allow buffers without any channels enabled to be activated (bsc#1051510).
- iio: pressure: bmp280: Tolerate IRQ before registering (bsc#1051510).
- ima: Directly assign the ima_default_policy pointer to ima_rules (bsc#1051510).
- ima: Fix ima digest hash table key calculation (bsc#1051510).
- include/asm-generic/topology.h: guard cpumask_of_node() macro argument (bsc#1148868).
- intel_idle: Graceful probe failure when MWAIT is disabled (bsc#1174115).
- KVM: nVMX: Do not reread VMCS-agnostic state when switching VMCS (bsc#1114279).
- KVM: nVMX: Skip IBPB when switching between vmcs01 and vmcs02 (bsc#1114279).
- kvm: x86: Fix L1TF mitigation for shadow MMU (bsc#1171904).
- KVM: x86/mmu: Set mmio_value to '0' if reserved #PF can't be generated (bsc#1171904).
- KVM: x86: only do L1TF workaround on affected processors (bsc#1171904).
- libceph: do not omit recovery_deletes in target_copy() (bsc#1173462).
- livepatch: Apply vmlinux-specific KLP relocations early (bsc#1071995).
- livepatch: Disallow vmlinux.ko (bsc#1071995).
- livepatch: Make klp_apply_object_relocs static (bsc#1071995).
- livepatch: Prevent module-specific KLP rela sections from referencing vmlinux symbols (bsc#1071995).
- livepatch: Remove .klp.arch (bsc#1071995).
- md: Avoid namespace collision with bitmap API (git fixes (block drivers)).
- md: use memalloc scope APIs in mddev_suspend()/mddev_resume() (git fixes (block drivers)).
- mmc: fix compilation of user API (bsc#1051510).
- netfilter: connlabels: prefer static lock initialiser (git-fixes).
- netfilter: ctnetlink: netns exit must wait for callbacks (bsc#1169795).
- netfilter: not mark a spinlock as __read_mostly (git-fixes).
- net: vmxnet3: fix possible buffer overflow caused by bad DMA value in vmxnet3_get_rss() (bsc#1172484).
- NFS: Fix an RCU lock leak in nfs4_refresh_delegation_stateid() (bsc#1170592).
- NFSv4: Retry CLOSE and DELEGRETURN on NFS4ERR_OLD_STATEID (bsc#1170592).
- nvme: check for NVME_CTRL_LIVE in nvme_report_ns_ids() (bcs#1171558 bsc#1159058).
- nvme: do not update multipath disk information if the controller is down (bcs#1171558 bsc#1159058).
- objtool: Clean instruction state before each function validation (bsc#1169514).
- objtool: Ignore empty alternatives (bsc#1169514).
- overflow: Fix -Wtype-limits compilation warnings (git fixes).
- overflow.h: Add arithmetic shift helper (git fixes).
- p54usb: add AirVasT USB stick device-id (bsc#1051510).
- PCI: Allow pci_resize_resource() for devices on root bus (bsc#1051510).
- PCI: Fix pci_register_host_bridge() device_register() error handling (bsc#1051510).
- PCI: Program MPS for RCiEP devices (bsc#1051510).
- PCI/PTM: Inherit Switch Downstream Port PTM settings from Upstream Port (bsc#1051510).
- perf: Allocate context task_ctx_data for child event (git-fixes).
- perf/cgroup: Fix perf cgroup hierarchy support (git-fixes).
- perf: Copy parent's address filter offsets on clone (git-fixes).
- perf/core: Add sanity check to deal with pinned event failure (git-fixes).
- perf/core: Avoid freeing static PMU contexts when PMU is unregistered (git-fixes).
- perf/core: Correct event creation with PERF_FORMAT_GROUP (git-fixes).
- perf/core: Do not WARN() for impossible ring-buffer sizes (git-fixes).
- perf/core: Fix bad use of igrab() (git fixes (dependent patch)).
- perf/core: Fix crash when using HW tracing kernel filters (git-fixes).
- perf/core: Fix ctx_event_type in ctx_resched() (git-fixes).
- perf/core: Fix error handling in perf_event_alloc() (git-fixes).
- perf/core: Fix exclusive events' grouping (git-fixes).
- perf/core: Fix group scheduling with mixed hw and sw events (git-fixes).
- perf/core: Fix impossible ring-buffer sizes warning (git-fixes).
- perf/core: Fix locking for children siblings group read (git-fixes).
- perf/core: Fix lock inversion between perf,trace,cpuhp (git-fixes (dependent patch for 18736eef1213)).
- perf/core: Fix perf_event_read_value() locking (git-fixes).
- perf/core: Fix perf_pmu_unregister() locking (git-fixes).
- perf/core: Fix __perf_read_group_add() locking (git-fixes (dependent patch)).
- perf/core: Fix perf_sample_regs_user() mm check (git-fixes).
- perf/core: Fix possible Spectre-v1 indexing for ->aux_pages (git-fixes).
- perf/core: Fix race between close() and fork() (git-fixes).
- perf/core: Fix the address filtering fix (git-fixes).
- perf/core: Fix use-after-free in uprobe_perf_close() (git-fixes).
- perf/core: Force USER_DS when recording user stack data (git-fixes).
- perf/core: Restore mmap record type correctly (git-fixes).
- perf: Fix header.size for namespace events (git-fixes).
- perf/ioctl: Add check for the sample_period value (git-fixes).
- perf, pt, coresight: Fix address filters for vmas with non-zero offset (git-fixes).
- perf: Return proper values for user stack errors (git-fixes).
- perf/x86/amd: Constrain Large Increment per Cycle events (git-fixes).
- perf/x86/amd/ibs: Fix reading of the IBS OpData register and thus precise RIP validity (git-fixes).
- perf/x86/amd/ibs: Fix sample bias for dispatched micro-ops (git-fixes).
- perf/x86/amd/ibs: Handle erratum #420 only on the affected CPU family (10h) (git-fixes).
- perf/x86/amd/iommu: Make the 'amd_iommu_attr_groups' symbol static (git-fixes).
- perf/x86/amd/uncore: Do not set 'ThreadMask' and 'SliceMask' for non-L3 PMCs (git-fixes stable).
- perf/x86/amd/uncore: Set the thread mask for F17h L3 PMCs (git-fixes).
- perf/x86/amd/uncore: Set ThreadMask and SliceMask for L3 Cache perf events (git-fixes stable).
- perf/x86: Enable free running PEBS for REGS_USER/INTR (git-fixes).
- perf/x86: Fix incorrect PEBS_REGS (git-fixes).
- perf/x86/intel: Add generic branch tracing check to intel_pmu_has_bts() (git-fixes).
- perf/x86/intel: Add proper condition to run sched_task callbacks (git-fixes).
- perf/x86/intel/bts: Fix the use of page_private() (git-fixes).
- perf/x86/intel: Fix PT PMI handling (git-fixes).
- perf/x86/intel: Move branch tracing setup to the Intel-specific source file (git-fixes).
- perf/x86/intel/uncore: Add Node ID mask (git-fixes).
- perf/x86/intel/uncore: Fix PCI BDF address of M3UPI on SKX (git-fixes).
- perf/x86/pt, coresight: Clean up address filter structure (git fixes (dependent patch)).
- perf/x86/uncore: Fix event group support (git-fixes).
- pid: Improve the comment about waiting in zap_pid_ns_processes (git fixes)).
- pinctrl: freescale: imx: Fix an error handling path in 'imx_pinctrl_probe()' (bsc#1051510).
- pinctrl: imxl: Fix an error handling path in 'imx1_pinctrl_core_probe()' (bsc#1051510).
- pinctrl: samsung: Save/restore eint_mask over suspend for EINT_TYPE GPIOs (bsc#1051510).
- pnp: Use list_for_each_entry() instead of open coding (git fixes).
- powerpc/64s: Do not let DT CPU features set FSCR_DSCR (bsc#1065729).
- powerpc/64s: Save FSCR to init_task.thread.fscr after feature init (bsc#1065729).
- powerpc/xive: Clear the page tables for the ESB IO mapping (bsc#1085030).
- power: supply: bq24257_charger: Replace depends on REGMAP_I2C with select (bsc#1051510).
- power: supply: lp8788: Fix an error handling path in 'lp8788_charger_probe()' (bsc#1051510).
- power: supply: smb347-charger: IRQSTAT_D is volatile (bsc#1051510).
- raid5: remove gfp flags from scribble_alloc() (git fixes (block drivers)).
- resolve KABI warning for perf-pt-coresight (git-fixes).
- Revert 'bcache: ignore pending signals when creating gc and allocator thread' (git fixes (block drivers)).
- Revert 'dm crypt: use WQ_HIGHPRI for the IO and crypt workqueues' (git fixes (block drivers)).
- Revert 'tools lib traceevent: Remove unneeded qsort and uses memmove'
- rpm/kernel-docs.spec.in: Require python-packaging for build.
- s390/bpf: Maintain 8-byte stack alignment (bsc#1169194).
- s390: fix syscall_get_error for compat processes (git-fixes).
- s390/qdio: consistently restore the IRQ handler (git-fixes).
- s390/qdio: lock device while installing IRQ handler (git-fixes).
- s390/qdio: put thinint indicator after early error (git-fixes).
- s390/qdio: tear down thinint indicator after early error (git-fixes).
- s390/qeth: fix error handling for isolation mode cmds (git-fixes).
- scsi: ibmvscsi: Do not send host info in adapter info MAD after LPM (bsc#1172759 ltc#184814).
- scsi: qedf: Add port_id getter (bsc#1150660).
- scsi: qla2xxx: Set NVMe status code for failed NVMe FCP request (bsc#1158983).
- spi: dw: use 'smp_mb()' to avoid sending spi data error (bsc#1051510).
- staging: rtl8712: Fix IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK (bsc#1051510).
- staging: sm750fb: add missing case while setting FB_VISUAL (bsc#1051510).
- SUNRPC: The TCP back channel mustn't disappear while requests are outstanding (bsc#1152624).
- tracing: Fix event trigger to accept redundant spaces (git-fixes).
- tty: n_gsm: Fix bogus i++ in gsm_data_kick (bsc#1051510).
- tty: n_gsm: Fix SOF skipping (bsc#1051510).
- tty: n_gsm: Fix waking up upper tty layer when room available (bsc#1051510).
- usb: dwc2: gadget: move gadget resume after the core is in L0 state (bsc#1051510).
- usb: gadget: lpc32xx_udc: do not dereference ep pointer before null check (bsc#1051510).
- usb: gadget: udc: s3c2410_udc: Remove pointless NULL check in s3c2410_udc_nuke (bsc#1051510).
- usb: host: ehci-mxc: Add error handling in ehci_mxc_drv_probe() (bsc#1051510).
- usb: musb: Fix runtime PM imbalance on error (bsc#1051510).
- usb: musb: start session in resume for host port (bsc#1051510).
- usb: serial: option: add Telit LE910C1-EUX compositions (bsc#1051510).
- usb: serial: qcserial: add DW5816e QDL support (bsc#1051510).
- usb: serial: usb_wwan: do not resubmit rx urb on fatal errors (bsc#1051510).
- usb: serial: usb_wwan: do not resubmit rx urb on fatal errors (git-fixes).
- virtio-blk: handle block_device_operations callbacks after hot unplug (git fixes (block drivers)).
- vmxnet3: add geneve and vxlan tunnel offload support (bsc#1172484).
- vmxnet3: add support to get/set rx flow hash (bsc#1172484).
- vmxnet3: allow rx flow hash ops only when rss is enabled (bsc#1172484).
- vmxnet3: avoid format strint overflow warning (bsc#1172484).
- vmxnet3: prepare for version 4 changes (bsc#1172484).
- vmxnet3: Remove always false conditional statement (bsc#1172484).
- vmxnet3: remove redundant initialization of pointer 'rq' (bsc#1172484).
- vmxnet3: remove unused flag 'rxcsum' from struct vmxnet3_adapter (bsc#1172484).
- vmxnet3: Replace msleep(1) with usleep_range() (bsc#1172484).
- vmxnet3: update to version 4 (bsc#1172484).
- vmxnet3: use correct hdr reference when packet is encapsulated (bsc#1172484).
- w1: omap-hdq: cleanup to add missing newline for some dev_dbg (bsc#1051510).
- work around mvfs bug (bsc#1162063).
- x86/cpu/amd: Make erratum #1054 a legacy erratum (bsc#1114279).
- x86/events/intel/ds: Add PERF_SAMPLE_PERIOD into PEBS_FREERUNNING_FLAGS (git-fixes).
- x86: Fix early boot crash on gcc-10, third try (bsc#1114279).
- x86/{mce,mm}: Unmap the entire page if the whole page is affected and poisoned (bsc#1172257).
- x86/reboot/quirks: Add MacBook6,1 reboot quirk (bsc#1114279).
- xfrm: fix error in comment (git fixes).
Patchnames
SUSE-2020-2121,SUSE-OpenStack-Cloud-9-2020-2121,SUSE-OpenStack-Cloud-Crowbar-9-2020-2121,SUSE-SLE-HA-12-SP4-2020-2121,SUSE-SLE-Live-Patching-12-SP4-2020-2121,SUSE-SLE-SAP-12-SP4-2020-2121,SUSE-SLE-SERVER-12-SP4-LTSS-2020-2121
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 12 SP4 LTSS kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).\n- CVE-2019-20908: An issue was discovered in drivers/firmware/efi/efi.c where incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032 (bnc#1173567).\n- CVE-2020-15780: An issue was discovered in drivers/acpi/acpi_configfs.c where injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30 (bnc#1173573).\n- CVE-2020-15393: usbtest_disconnect in drivers/usb/misc/usbtest.c has a memory leak, aka CID-28ebeb8db770 (bnc#1173514).\n- CVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c had a deadlock if a coalescing operation fails (bnc#1171732).\n- CVE-2019-16746: net/wireless/nl80211.c did not check the length of variable elements in a beacon head, leading to a buffer overflow (bnc#1152107).\n- CVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).\n- CVE-2020-10769: A buffer over-read flaw was found in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm\u0027s module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash. This flaw allowed a local attacker with user privileges to cause a denial of service (bnc#1173265).\n- CVE-2020-10773: A kernel stack information leak on s390/s390x was fixed (bnc#1172999).\n- CVE-2020-14416: A race condition in tty-\u003edisc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).\n- CVE-2020-10768: Indirect branch speculation could have been enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command. (bnc#1172783).\n- CVE-2020-10766: Fixed Rogue cross-process SSBD shutdown, where a Linux scheduler logical bug allows an attacker to turn off the SSBD protection. (bnc#1172781).\n- CVE-2020-10767: Indirect Branch Prediction Barrier was force-disabled when STIBP is unavailable or enhanced IBRS is available. (bnc#1172782).\n- CVE-2020-13974: drivers/tty/vt/keyboard.c had an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. (bnc#1172775).\n- CVE-2019-20810: go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel did not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586 (bnc#1172458).\n\nThe following non-security bugs were fixed:\n\n- ACPI: PM: Avoid using power resources if there are none for D0 (bsc#1051510).\n- ALSA: es1688: Add the missed snd_card_free() (bsc#1051510).\n- bcache: Fix an error code in bch_dump_read() (git fixes (block drivers)).\n- block, bfq: add requeue-request hook (bsc#1104967 bsc#1171673).\n- block, bfq: postpone rq preparation to insert or merge (bsc#1104967 bsc#1171673).\n- block: remove QUEUE_FLAG_STACKABLE (git fixes (block drivers)).\n- block: sed-opal: fix sparse warning: convert __be64 data (git fixes (block drivers)).\n- btrfs: always wait on ordered extents at fsync time (bsc#1171761).\n- btrfs: clean up the left over logged_list usage (bsc#1171761).\n- btrfs: do not zero f_bavail if we have available space (bsc#1168081).\n- btrfs: fix list_add corruption and soft lockups in fsync (bsc#1171761).\n- btrfs: fix missing data checksums after a ranged fsync (msync) (bsc#1171761).\n- btrfs: fix missing file extent item for hole after ranged fsync (bsc#1171761).\n- btrfs: fix missing hole after hole punching and fsync when using NO_HOLES (bsc#1171761).\n- btrfs: fix missing semaphore unlock in btrfs_sync_file (bsc#1171761).\n- btrfs: fix rare chances for data loss when doing a fast fsync (bsc#1171761).\n- btrfs: Remove extra parentheses from condition in copy_items() (bsc#1171761).\n- btrfs: remove no longer used io_err from btrfs_log_ctx (bsc#1171761).\n- btrfs: remove no longer used logged range variables when logging extents (bsc#1171761).\n- btrfs: remove no longer used \u0027sync\u0027 member from transaction handle (bsc#1171761).\n- btrfs: remove remaing full_sync logic from btrfs_sync_file (bsc#1171761).\n- btrfs: remove the logged extents infrastructure (bsc#1171761).\n- btrfs: remove the wait ordered logic in the log_one_extent path (bsc#1171761).\n- btrfs: volumes: Remove ENOSPC-prone btrfs_can_relocate() (bsc#1171124).\n- CDC-ACM: heed quirk also in error handling (git-fixes).\n- cifs: get rid of unused parameter in reconn_setup_dfs_targets() (bsc#1144333).\n- cifs: handle hostnames that resolve to same ip in failover (bsc#1144333 bsc#1161016).\n- cifs: set up next DFS target before generic_ip_connect() (bsc#1144333 bsc#1161016).\n- clk: bcm2835: Fix return type of bcm2835_register_gate (bsc#1051510).\n- clk: clk-flexgen: fix clock-critical handling (bsc#1051510).\n- clk: sunxi: Fix incorrect usage of round_down() (bsc#1051510).\n- compat_ioctl: block: handle BLKREPORTZONE/BLKRESETZONE (git fixes (block drivers)).\n- compat_ioctl: block: handle Persistent Reservations (git fixes (block drivers)).\n- copy_{to,from}_user(): consolidate object size checks (git fixes).\n- crypto: cavium/nitrox - Fix \u0027nitrox_get_first_device()\u0027 when ndevlist is fully iterated (git-fixes).\n- dm btree: increase rebalance threshold in __rebalance2() (git fixes (block drivers)).\n- dm cache: fix a crash due to incorrect work item cancelling (git fixes (block drivers)).\n- dm crypt: fix benbi IV constructor crash if used in authenticated mode (git fixes (block drivers)).\n- dm: fix potential for q-\u003emake_request_fn NULL pointer (git fixes (block drivers)).\n- dm space map common: fix to ensure new block isn\u0027t already in use (git fixes (block drivers)).\n- dm: various cleanups to md-\u003equeue initialization code (git fixes).\n- dm verity fec: fix hash block number in verity_fec_decode (git fixes (block drivers)).\n- dm verity fec: fix memory leak in verity_fec_dtr (git fixes (block drivers)).\n- Drivers: hv: Change flag to write log level in panic msg to false (bsc#1170618).\n- drivers: soc: ti: knav_qmss_queue: Make knav_gp_range_ops static (bsc#1051510).\n- drm/dp_mst: Increase ACT retry timeout to 3s (bsc#1152472) * context changes\n- drm: encoder_slave: fix refcouting error for modules (bsc#1114279)\n- drm/mediatek: Check plane visibility in atomic_update (bsc#1152472) * context changes\n- drm/qxl: Use correct notify port address when creating cursor ring (bsc#1152472)\n- drm/radeon: fix double free (bsc#1152472)\n- drm/radeon: fix fb_div check in ni_init_smc_spll_table() (bsc#1152472)\n- e1000e: Disable TSO for buffer overrun workaround (bsc#1051510).\n- e1000e: Do not wake up the system via WOL if device wakeup is disabled (bsc#1051510).\n- EDAC/amd64: Read back the scrub rate PCI register on F15h (bsc#1114279).\n- evm: Check also if *tfm is an error pointer in init_desc() (bsc#1051510).\n- evm: Fix a small race in init_desc() (bsc#1051510).\n- extcon: adc-jack: Fix an error handling path in \u0027adc_jack_probe()\u0027 (bsc#1051510).\n- gpiolib: Document that GPIO line names are not globally unique (bsc#1051510).\n- HID: sony: Fix for broken buttons on DS3 USB dongles (bsc#1051510).\n- ibmveth: Fix max MTU limit (bsc#1173428 ltc#186397).\n- ibmvnic: continue to init in CRQ reset returns H_CLOSED (bsc#1173280 ltc#185369).\n- ibmvnic: Flush existing work items before device removal (bsc#1065729).\n- ibmvnic: Harden device login requests (bsc#1170011 ltc#183538).\n- iio: buffer: Do not allow buffers without any channels enabled to be activated (bsc#1051510).\n- iio: pressure: bmp280: Tolerate IRQ before registering (bsc#1051510).\n- ima: Directly assign the ima_default_policy pointer to ima_rules (bsc#1051510).\n- ima: Fix ima digest hash table key calculation (bsc#1051510).\n- include/asm-generic/topology.h: guard cpumask_of_node() macro argument (bsc#1148868).\n- intel_idle: Graceful probe failure when MWAIT is disabled (bsc#1174115).\n- KVM: nVMX: Do not reread VMCS-agnostic state when switching VMCS (bsc#1114279).\n- KVM: nVMX: Skip IBPB when switching between vmcs01 and vmcs02 (bsc#1114279).\n- kvm: x86: Fix L1TF mitigation for shadow MMU (bsc#1171904).\n- KVM: x86/mmu: Set mmio_value to \u00270\u0027 if reserved #PF can\u0027t be generated (bsc#1171904).\n- KVM: x86: only do L1TF workaround on affected processors (bsc#1171904).\n- libceph: do not omit recovery_deletes in target_copy() (bsc#1173462).\n- livepatch: Apply vmlinux-specific KLP relocations early (bsc#1071995).\n- livepatch: Disallow vmlinux.ko (bsc#1071995).\n- livepatch: Make klp_apply_object_relocs static (bsc#1071995).\n- livepatch: Prevent module-specific KLP rela sections from referencing vmlinux symbols (bsc#1071995).\n- livepatch: Remove .klp.arch (bsc#1071995).\n- md: Avoid namespace collision with bitmap API (git fixes (block drivers)).\n- md: use memalloc scope APIs in mddev_suspend()/mddev_resume() (git fixes (block drivers)).\n- mmc: fix compilation of user API (bsc#1051510).\n- netfilter: connlabels: prefer static lock initialiser (git-fixes).\n- netfilter: ctnetlink: netns exit must wait for callbacks (bsc#1169795).\n- netfilter: not mark a spinlock as __read_mostly (git-fixes).\n- net: vmxnet3: fix possible buffer overflow caused by bad DMA value in vmxnet3_get_rss() (bsc#1172484).\n- NFS: Fix an RCU lock leak in nfs4_refresh_delegation_stateid() (bsc#1170592).\n- NFSv4: Retry CLOSE and DELEGRETURN on NFS4ERR_OLD_STATEID (bsc#1170592).\n- nvme: check for NVME_CTRL_LIVE in nvme_report_ns_ids() (bcs#1171558 bsc#1159058).\n- nvme: do not update multipath disk information if the controller is down (bcs#1171558 bsc#1159058).\n- objtool: Clean instruction state before each function validation (bsc#1169514).\n- objtool: Ignore empty alternatives (bsc#1169514).\n- overflow: Fix -Wtype-limits compilation warnings (git fixes).\n- overflow.h: Add arithmetic shift helper (git fixes).\n- p54usb: add AirVasT USB stick device-id (bsc#1051510).\n- PCI: Allow pci_resize_resource() for devices on root bus (bsc#1051510).\n- PCI: Fix pci_register_host_bridge() device_register() error handling (bsc#1051510).\n- PCI: Program MPS for RCiEP devices (bsc#1051510).\n- PCI/PTM: Inherit Switch Downstream Port PTM settings from Upstream Port (bsc#1051510).\n- perf: Allocate context task_ctx_data for child event (git-fixes).\n- perf/cgroup: Fix perf cgroup hierarchy support (git-fixes).\n- perf: Copy parent\u0027s address filter offsets on clone (git-fixes).\n- perf/core: Add sanity check to deal with pinned event failure (git-fixes).\n- perf/core: Avoid freeing static PMU contexts when PMU is unregistered (git-fixes).\n- perf/core: Correct event creation with PERF_FORMAT_GROUP (git-fixes).\n- perf/core: Do not WARN() for impossible ring-buffer sizes (git-fixes).\n- perf/core: Fix bad use of igrab() (git fixes (dependent patch)).\n- perf/core: Fix crash when using HW tracing kernel filters (git-fixes).\n- perf/core: Fix ctx_event_type in ctx_resched() (git-fixes).\n- perf/core: Fix error handling in perf_event_alloc() (git-fixes).\n- perf/core: Fix exclusive events\u0027 grouping (git-fixes).\n- perf/core: Fix group scheduling with mixed hw and sw events (git-fixes).\n- perf/core: Fix impossible ring-buffer sizes warning (git-fixes).\n- perf/core: Fix locking for children siblings group read (git-fixes).\n- perf/core: Fix lock inversion between perf,trace,cpuhp (git-fixes (dependent patch for 18736eef1213)).\n- perf/core: Fix perf_event_read_value() locking (git-fixes).\n- perf/core: Fix perf_pmu_unregister() locking (git-fixes).\n- perf/core: Fix __perf_read_group_add() locking (git-fixes (dependent patch)).\n- perf/core: Fix perf_sample_regs_user() mm check (git-fixes).\n- perf/core: Fix possible Spectre-v1 indexing for -\u003eaux_pages (git-fixes).\n- perf/core: Fix race between close() and fork() (git-fixes).\n- perf/core: Fix the address filtering fix (git-fixes).\n- perf/core: Fix use-after-free in uprobe_perf_close() (git-fixes).\n- perf/core: Force USER_DS when recording user stack data (git-fixes).\n- perf/core: Restore mmap record type correctly (git-fixes).\n- perf: Fix header.size for namespace events (git-fixes).\n- perf/ioctl: Add check for the sample_period value (git-fixes).\n- perf, pt, coresight: Fix address filters for vmas with non-zero offset (git-fixes).\n- perf: Return proper values for user stack errors (git-fixes).\n- perf/x86/amd: Constrain Large Increment per Cycle events (git-fixes).\n- perf/x86/amd/ibs: Fix reading of the IBS OpData register and thus precise RIP validity (git-fixes).\n- perf/x86/amd/ibs: Fix sample bias for dispatched micro-ops (git-fixes).\n- perf/x86/amd/ibs: Handle erratum #420 only on the affected CPU family (10h) (git-fixes).\n- perf/x86/amd/iommu: Make the \u0027amd_iommu_attr_groups\u0027 symbol static (git-fixes).\n- perf/x86/amd/uncore: Do not set \u0027ThreadMask\u0027 and \u0027SliceMask\u0027 for non-L3 PMCs (git-fixes stable).\n- perf/x86/amd/uncore: Set the thread mask for F17h L3 PMCs (git-fixes).\n- perf/x86/amd/uncore: Set ThreadMask and SliceMask for L3 Cache perf events (git-fixes stable).\n- perf/x86: Enable free running PEBS for REGS_USER/INTR (git-fixes).\n- perf/x86: Fix incorrect PEBS_REGS (git-fixes).\n- perf/x86/intel: Add generic branch tracing check to intel_pmu_has_bts() (git-fixes).\n- perf/x86/intel: Add proper condition to run sched_task callbacks (git-fixes).\n- perf/x86/intel/bts: Fix the use of page_private() (git-fixes).\n- perf/x86/intel: Fix PT PMI handling (git-fixes).\n- perf/x86/intel: Move branch tracing setup to the Intel-specific source file (git-fixes).\n- perf/x86/intel/uncore: Add Node ID mask (git-fixes).\n- perf/x86/intel/uncore: Fix PCI BDF address of M3UPI on SKX (git-fixes).\n- perf/x86/pt, coresight: Clean up address filter structure (git fixes (dependent patch)).\n- perf/x86/uncore: Fix event group support (git-fixes).\n- pid: Improve the comment about waiting in zap_pid_ns_processes (git fixes)).\n- pinctrl: freescale: imx: Fix an error handling path in \u0027imx_pinctrl_probe()\u0027 (bsc#1051510).\n- pinctrl: imxl: Fix an error handling path in \u0027imx1_pinctrl_core_probe()\u0027 (bsc#1051510).\n- pinctrl: samsung: Save/restore eint_mask over suspend for EINT_TYPE GPIOs (bsc#1051510).\n- pnp: Use list_for_each_entry() instead of open coding (git fixes).\n- powerpc/64s: Do not let DT CPU features set FSCR_DSCR (bsc#1065729).\n- powerpc/64s: Save FSCR to init_task.thread.fscr after feature init (bsc#1065729).\n- powerpc/xive: Clear the page tables for the ESB IO mapping (bsc#1085030).\n- power: supply: bq24257_charger: Replace depends on REGMAP_I2C with select (bsc#1051510).\n- power: supply: lp8788: Fix an error handling path in \u0027lp8788_charger_probe()\u0027 (bsc#1051510).\n- power: supply: smb347-charger: IRQSTAT_D is volatile (bsc#1051510).\n- raid5: remove gfp flags from scribble_alloc() (git fixes (block drivers)).\n- resolve KABI warning for perf-pt-coresight (git-fixes).\n- Revert \u0027bcache: ignore pending signals when creating gc and allocator thread\u0027 (git fixes (block drivers)).\n- Revert \u0027dm crypt: use WQ_HIGHPRI for the IO and crypt workqueues\u0027 (git fixes (block drivers)).\n- Revert \u0027tools lib traceevent: Remove unneeded qsort and uses memmove\u0027\n- rpm/kernel-docs.spec.in: Require python-packaging for build.\n- s390/bpf: Maintain 8-byte stack alignment (bsc#1169194).\n- s390: fix syscall_get_error for compat processes (git-fixes).\n- s390/qdio: consistently restore the IRQ handler (git-fixes).\n- s390/qdio: lock device while installing IRQ handler (git-fixes).\n- s390/qdio: put thinint indicator after early error (git-fixes).\n- s390/qdio: tear down thinint indicator after early error (git-fixes).\n- s390/qeth: fix error handling for isolation mode cmds (git-fixes).\n- scsi: ibmvscsi: Do not send host info in adapter info MAD after LPM (bsc#1172759 ltc#184814).\n- scsi: qedf: Add port_id getter (bsc#1150660).\n- scsi: qla2xxx: Set NVMe status code for failed NVMe FCP request (bsc#1158983).\n- spi: dw: use \u0027smp_mb()\u0027 to avoid sending spi data error (bsc#1051510).\n- staging: rtl8712: Fix IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK (bsc#1051510).\n- staging: sm750fb: add missing case while setting FB_VISUAL (bsc#1051510).\n- SUNRPC: The TCP back channel mustn\u0027t disappear while requests are outstanding (bsc#1152624).\n- tracing: Fix event trigger to accept redundant spaces (git-fixes).\n- tty: n_gsm: Fix bogus i++ in gsm_data_kick (bsc#1051510).\n- tty: n_gsm: Fix SOF skipping (bsc#1051510).\n- tty: n_gsm: Fix waking up upper tty layer when room available (bsc#1051510).\n- usb: dwc2: gadget: move gadget resume after the core is in L0 state (bsc#1051510).\n- usb: gadget: lpc32xx_udc: do not dereference ep pointer before null check (bsc#1051510).\n- usb: gadget: udc: s3c2410_udc: Remove pointless NULL check in s3c2410_udc_nuke (bsc#1051510).\n- usb: host: ehci-mxc: Add error handling in ehci_mxc_drv_probe() (bsc#1051510).\n- usb: musb: Fix runtime PM imbalance on error (bsc#1051510).\n- usb: musb: start session in resume for host port (bsc#1051510).\n- usb: serial: option: add Telit LE910C1-EUX compositions (bsc#1051510).\n- usb: serial: qcserial: add DW5816e QDL support (bsc#1051510).\n- usb: serial: usb_wwan: do not resubmit rx urb on fatal errors (bsc#1051510).\n- usb: serial: usb_wwan: do not resubmit rx urb on fatal errors (git-fixes).\n- virtio-blk: handle block_device_operations callbacks after hot unplug (git fixes (block drivers)).\n- vmxnet3: add geneve and vxlan tunnel offload support (bsc#1172484).\n- vmxnet3: add support to get/set rx flow hash (bsc#1172484).\n- vmxnet3: allow rx flow hash ops only when rss is enabled (bsc#1172484).\n- vmxnet3: avoid format strint overflow warning (bsc#1172484).\n- vmxnet3: prepare for version 4 changes (bsc#1172484).\n- vmxnet3: Remove always false conditional statement (bsc#1172484).\n- vmxnet3: remove redundant initialization of pointer \u0027rq\u0027 (bsc#1172484).\n- vmxnet3: remove unused flag \u0027rxcsum\u0027 from struct vmxnet3_adapter (bsc#1172484).\n- vmxnet3: Replace msleep(1) with usleep_range() (bsc#1172484).\n- vmxnet3: update to version 4 (bsc#1172484).\n- vmxnet3: use correct hdr reference when packet is encapsulated (bsc#1172484).\n- w1: omap-hdq: cleanup to add missing newline for some dev_dbg (bsc#1051510).\n- work around mvfs bug (bsc#1162063).\n- x86/cpu/amd: Make erratum #1054 a legacy erratum (bsc#1114279).\n- x86/events/intel/ds: Add PERF_SAMPLE_PERIOD into PEBS_FREERUNNING_FLAGS (git-fixes).\n- x86: Fix early boot crash on gcc-10, third try (bsc#1114279).\n- x86/{mce,mm}: Unmap the entire page if the whole page is affected and poisoned (bsc#1172257).\n- x86/reboot/quirks: Add MacBook6,1 reboot quirk (bsc#1114279).\n- xfrm: fix error in comment (git fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-2121,SUSE-OpenStack-Cloud-9-2020-2121,SUSE-OpenStack-Cloud-Crowbar-9-2020-2121,SUSE-SLE-HA-12-SP4-2020-2121,SUSE-SLE-Live-Patching-12-SP4-2020-2121,SUSE-SLE-SAP-12-SP4-2020-2121,SUSE-SLE-SERVER-12-SP4-LTSS-2020-2121", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2121-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:2121-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20202121-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:2121-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-August/007219.html" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1085030", "url": "https://bugzilla.suse.com/1085030" }, { "category": "self", "summary": "SUSE Bug 1104967", "url": "https://bugzilla.suse.com/1104967" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1144333", "url": "https://bugzilla.suse.com/1144333" }, { "category": "self", "summary": "SUSE Bug 1148868", "url": "https://bugzilla.suse.com/1148868" }, { "category": "self", "summary": "SUSE Bug 1150660", "url": "https://bugzilla.suse.com/1150660" }, { "category": "self", "summary": "SUSE Bug 1152107", "url": "https://bugzilla.suse.com/1152107" }, { "category": "self", "summary": "SUSE Bug 1152472", "url": "https://bugzilla.suse.com/1152472" }, { "category": "self", "summary": "SUSE Bug 1152624", "url": "https://bugzilla.suse.com/1152624" }, { "category": "self", "summary": "SUSE Bug 1158983", "url": "https://bugzilla.suse.com/1158983" }, { "category": "self", "summary": "SUSE Bug 1159058", "url": "https://bugzilla.suse.com/1159058" }, { "category": "self", "summary": "SUSE Bug 1161016", "url": "https://bugzilla.suse.com/1161016" }, { "category": "self", "summary": "SUSE Bug 1162002", "url": "https://bugzilla.suse.com/1162002" }, { "category": "self", "summary": "SUSE Bug 1162063", "url": "https://bugzilla.suse.com/1162063" }, { "category": "self", "summary": "SUSE Bug 1168081", "url": "https://bugzilla.suse.com/1168081" }, { "category": "self", "summary": "SUSE Bug 1169194", "url": "https://bugzilla.suse.com/1169194" }, { "category": "self", "summary": "SUSE Bug 1169514", "url": "https://bugzilla.suse.com/1169514" }, { "category": "self", "summary": "SUSE Bug 1169795", "url": "https://bugzilla.suse.com/1169795" }, { "category": "self", "summary": "SUSE Bug 1170011", "url": "https://bugzilla.suse.com/1170011" }, { "category": "self", "summary": "SUSE Bug 1170592", "url": "https://bugzilla.suse.com/1170592" }, { "category": "self", "summary": "SUSE Bug 1170618", "url": "https://bugzilla.suse.com/1170618" }, { "category": "self", "summary": "SUSE Bug 1171124", "url": "https://bugzilla.suse.com/1171124" }, { "category": "self", "summary": "SUSE Bug 1171424", "url": "https://bugzilla.suse.com/1171424" }, { "category": "self", "summary": "SUSE Bug 1171558", "url": "https://bugzilla.suse.com/1171558" }, { "category": "self", "summary": "SUSE Bug 1171673", "url": "https://bugzilla.suse.com/1171673" }, { "category": "self", "summary": "SUSE Bug 1171732", "url": "https://bugzilla.suse.com/1171732" }, { "category": "self", "summary": "SUSE Bug 1171761", "url": "https://bugzilla.suse.com/1171761" }, { "category": "self", "summary": "SUSE Bug 1171868", "url": "https://bugzilla.suse.com/1171868" }, { "category": "self", "summary": "SUSE Bug 1171904", "url": "https://bugzilla.suse.com/1171904" }, { "category": "self", "summary": "SUSE Bug 1172257", "url": "https://bugzilla.suse.com/1172257" }, { "category": "self", "summary": "SUSE Bug 1172344", "url": "https://bugzilla.suse.com/1172344" }, { "category": "self", "summary": "SUSE Bug 1172458", "url": "https://bugzilla.suse.com/1172458" }, { "category": "self", "summary": "SUSE Bug 1172484", "url": "https://bugzilla.suse.com/1172484" }, { "category": "self", "summary": "SUSE Bug 1172759", "url": "https://bugzilla.suse.com/1172759" }, { "category": "self", "summary": "SUSE Bug 1172775", "url": "https://bugzilla.suse.com/1172775" }, { "category": "self", "summary": "SUSE Bug 1172781", "url": "https://bugzilla.suse.com/1172781" }, { "category": "self", "summary": "SUSE Bug 1172782", "url": "https://bugzilla.suse.com/1172782" }, { "category": "self", "summary": "SUSE Bug 1172783", "url": "https://bugzilla.suse.com/1172783" }, { "category": "self", "summary": "SUSE Bug 1172999", "url": "https://bugzilla.suse.com/1172999" }, { "category": "self", "summary": "SUSE Bug 1173265", "url": "https://bugzilla.suse.com/1173265" }, { "category": "self", "summary": "SUSE Bug 1173280", "url": "https://bugzilla.suse.com/1173280" }, { "category": "self", "summary": "SUSE Bug 1173428", "url": "https://bugzilla.suse.com/1173428" }, { "category": "self", "summary": "SUSE Bug 1173462", "url": "https://bugzilla.suse.com/1173462" }, { "category": "self", "summary": "SUSE Bug 1173514", "url": "https://bugzilla.suse.com/1173514" }, { "category": "self", "summary": "SUSE Bug 1173567", "url": "https://bugzilla.suse.com/1173567" }, { "category": "self", "summary": "SUSE Bug 1173573", "url": "https://bugzilla.suse.com/1173573" }, { "category": "self", "summary": "SUSE Bug 1174115", "url": "https://bugzilla.suse.com/1174115" }, { "category": "self", "summary": "SUSE Bug 1174462", "url": "https://bugzilla.suse.com/1174462" }, { "category": "self", "summary": "SUSE Bug 1174543", "url": "https://bugzilla.suse.com/1174543" }, { "category": "self", "summary": "SUSE CVE CVE-2019-16746 page", "url": "https://www.suse.com/security/cve/CVE-2019-16746/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20810 page", "url": "https://www.suse.com/security/cve/CVE-2019-20810/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20908 page", "url": "https://www.suse.com/security/cve/CVE-2019-20908/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0305 page", "url": "https://www.suse.com/security/cve/CVE-2020-0305/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10766 page", "url": "https://www.suse.com/security/cve/CVE-2020-10766/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10767 page", "url": "https://www.suse.com/security/cve/CVE-2020-10767/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10768 page", "url": "https://www.suse.com/security/cve/CVE-2020-10768/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10769 page", "url": "https://www.suse.com/security/cve/CVE-2020-10769/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10773 page", "url": "https://www.suse.com/security/cve/CVE-2020-10773/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12771 page", "url": "https://www.suse.com/security/cve/CVE-2020-12771/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12888 page", "url": "https://www.suse.com/security/cve/CVE-2020-12888/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-13974 page", "url": "https://www.suse.com/security/cve/CVE-2020-13974/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14416 page", "url": "https://www.suse.com/security/cve/CVE-2020-14416/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15393 page", "url": "https://www.suse.com/security/cve/CVE-2020-15393/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15780 page", "url": "https://www.suse.com/security/cve/CVE-2020-15780/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-08-04T13:18:16Z", "generator": { "date": "2020-08-04T13:18:16Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:2121-1", "initial_release_date": "2020-08-04T13:18:16Z", "revision_history": [ { "date": "2020-08-04T13:18:16Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.57.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.12.14-95.57.1.aarch64", "product_id": "cluster-md-kmp-default-4.12.14-95.57.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.57.1.aarch64", "product": { "name": "dlm-kmp-default-4.12.14-95.57.1.aarch64", "product_id": "dlm-kmp-default-4.12.14-95.57.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.57.1.aarch64", "product": { "name": "gfs2-kmp-default-4.12.14-95.57.1.aarch64", "product_id": "gfs2-kmp-default-4.12.14-95.57.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.57.1.aarch64", "product": { "name": "kernel-default-4.12.14-95.57.1.aarch64", "product_id": "kernel-default-4.12.14-95.57.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.57.1.aarch64", "product": { "name": "kernel-default-base-4.12.14-95.57.1.aarch64", "product_id": "kernel-default-base-4.12.14-95.57.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.57.1.aarch64", "product": { "name": "kernel-default-devel-4.12.14-95.57.1.aarch64", "product_id": "kernel-default-devel-4.12.14-95.57.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.57.1.aarch64", "product": { "name": "kernel-default-extra-4.12.14-95.57.1.aarch64", "product_id": "kernel-default-extra-4.12.14-95.57.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.57.1.aarch64", "product": { "name": "kernel-default-kgraft-4.12.14-95.57.1.aarch64", "product_id": "kernel-default-kgraft-4.12.14-95.57.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-95.57.1.aarch64", "product": { "name": "kernel-default-kgraft-devel-4.12.14-95.57.1.aarch64", "product_id": "kernel-default-kgraft-devel-4.12.14-95.57.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.57.1.aarch64", "product": { "name": "kernel-obs-build-4.12.14-95.57.1.aarch64", "product_id": "kernel-obs-build-4.12.14-95.57.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.57.1.aarch64", "product": { "name": "kernel-obs-qa-4.12.14-95.57.1.aarch64", "product_id": "kernel-obs-qa-4.12.14-95.57.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.57.1.aarch64", "product": { "name": "kernel-syms-4.12.14-95.57.1.aarch64", "product_id": "kernel-syms-4.12.14-95.57.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.57.1.aarch64", "product": { "name": "kernel-vanilla-4.12.14-95.57.1.aarch64", "product_id": "kernel-vanilla-4.12.14-95.57.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.57.1.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-95.57.1.aarch64", "product_id": "kernel-vanilla-base-4.12.14-95.57.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.57.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.12.14-95.57.1.aarch64", "product_id": "kernel-vanilla-devel-4.12.14-95.57.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-95.57.1.aarch64", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-95.57.1.aarch64", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.57.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.57.1.aarch64", "product": { "name": "kselftests-kmp-default-4.12.14-95.57.1.aarch64", "product_id": "kselftests-kmp-default-4.12.14-95.57.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.57.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.12.14-95.57.1.aarch64", "product_id": "ocfs2-kmp-default-4.12.14-95.57.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-95.57.1.noarch", "product": { "name": "kernel-devel-4.12.14-95.57.1.noarch", "product_id": "kernel-devel-4.12.14-95.57.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-95.57.1.noarch", "product": { "name": "kernel-docs-4.12.14-95.57.1.noarch", "product_id": "kernel-docs-4.12.14-95.57.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-95.57.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-95.57.1.noarch", "product_id": "kernel-docs-html-4.12.14-95.57.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-95.57.1.noarch", "product": { "name": "kernel-macros-4.12.14-95.57.1.noarch", "product_id": "kernel-macros-4.12.14-95.57.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-95.57.1.noarch", "product": { "name": "kernel-source-4.12.14-95.57.1.noarch", "product_id": "kernel-source-4.12.14-95.57.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-95.57.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-95.57.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-95.57.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.57.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.12.14-95.57.1.ppc64le", "product_id": "cluster-md-kmp-default-4.12.14-95.57.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.57.1.ppc64le", "product": { "name": "dlm-kmp-default-4.12.14-95.57.1.ppc64le", "product_id": "dlm-kmp-default-4.12.14-95.57.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.57.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.12.14-95.57.1.ppc64le", "product_id": "gfs2-kmp-default-4.12.14-95.57.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-95.57.1.ppc64le", "product": { "name": "kernel-debug-4.12.14-95.57.1.ppc64le", "product_id": "kernel-debug-4.12.14-95.57.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-95.57.1.ppc64le", "product": { "name": "kernel-debug-base-4.12.14-95.57.1.ppc64le", "product_id": "kernel-debug-base-4.12.14-95.57.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-95.57.1.ppc64le", "product": { "name": "kernel-debug-devel-4.12.14-95.57.1.ppc64le", "product_id": "kernel-debug-devel-4.12.14-95.57.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-kgraft-devel-4.12.14-95.57.1.ppc64le", "product": { "name": "kernel-debug-kgraft-devel-4.12.14-95.57.1.ppc64le", "product_id": "kernel-debug-kgraft-devel-4.12.14-95.57.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.57.1.ppc64le", "product": { "name": "kernel-default-4.12.14-95.57.1.ppc64le", "product_id": "kernel-default-4.12.14-95.57.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.57.1.ppc64le", "product": { "name": "kernel-default-base-4.12.14-95.57.1.ppc64le", "product_id": "kernel-default-base-4.12.14-95.57.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.57.1.ppc64le", "product": { "name": "kernel-default-devel-4.12.14-95.57.1.ppc64le", "product_id": "kernel-default-devel-4.12.14-95.57.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.57.1.ppc64le", "product": { "name": "kernel-default-extra-4.12.14-95.57.1.ppc64le", "product_id": "kernel-default-extra-4.12.14-95.57.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.57.1.ppc64le", "product": { "name": "kernel-default-kgraft-4.12.14-95.57.1.ppc64le", "product_id": "kernel-default-kgraft-4.12.14-95.57.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-95.57.1.ppc64le", "product": { "name": "kernel-default-kgraft-devel-4.12.14-95.57.1.ppc64le", "product_id": "kernel-default-kgraft-devel-4.12.14-95.57.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.57.1.ppc64le", "product": { "name": "kernel-obs-build-4.12.14-95.57.1.ppc64le", "product_id": "kernel-obs-build-4.12.14-95.57.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.57.1.ppc64le", "product": { "name": "kernel-obs-qa-4.12.14-95.57.1.ppc64le", "product_id": "kernel-obs-qa-4.12.14-95.57.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.57.1.ppc64le", "product": { "name": "kernel-syms-4.12.14-95.57.1.ppc64le", "product_id": "kernel-syms-4.12.14-95.57.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.57.1.ppc64le", "product": { "name": "kernel-vanilla-4.12.14-95.57.1.ppc64le", "product_id": "kernel-vanilla-4.12.14-95.57.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.57.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-95.57.1.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-95.57.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.57.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.12.14-95.57.1.ppc64le", "product_id": "kernel-vanilla-devel-4.12.14-95.57.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-95.57.1.ppc64le", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-95.57.1.ppc64le", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.57.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_57-default-1-6.3.1.ppc64le", "product": { "name": "kgraft-patch-4_12_14-95_57-default-1-6.3.1.ppc64le", "product_id": "kgraft-patch-4_12_14-95_57-default-1-6.3.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.57.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.12.14-95.57.1.ppc64le", "product_id": "kselftests-kmp-default-4.12.14-95.57.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.57.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.12.14-95.57.1.ppc64le", "product_id": "ocfs2-kmp-default-4.12.14-95.57.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.57.1.s390x", "product": { "name": "cluster-md-kmp-default-4.12.14-95.57.1.s390x", "product_id": "cluster-md-kmp-default-4.12.14-95.57.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.57.1.s390x", "product": { "name": "dlm-kmp-default-4.12.14-95.57.1.s390x", "product_id": "dlm-kmp-default-4.12.14-95.57.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.57.1.s390x", "product": { "name": "gfs2-kmp-default-4.12.14-95.57.1.s390x", "product_id": "gfs2-kmp-default-4.12.14-95.57.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.57.1.s390x", "product": { "name": "kernel-default-4.12.14-95.57.1.s390x", "product_id": "kernel-default-4.12.14-95.57.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.57.1.s390x", "product": { "name": "kernel-default-base-4.12.14-95.57.1.s390x", "product_id": "kernel-default-base-4.12.14-95.57.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.57.1.s390x", "product": { "name": "kernel-default-devel-4.12.14-95.57.1.s390x", "product_id": "kernel-default-devel-4.12.14-95.57.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.57.1.s390x", "product": { "name": "kernel-default-extra-4.12.14-95.57.1.s390x", "product_id": "kernel-default-extra-4.12.14-95.57.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.57.1.s390x", "product": { "name": "kernel-default-kgraft-4.12.14-95.57.1.s390x", "product_id": "kernel-default-kgraft-4.12.14-95.57.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-95.57.1.s390x", "product": { "name": "kernel-default-kgraft-devel-4.12.14-95.57.1.s390x", "product_id": "kernel-default-kgraft-devel-4.12.14-95.57.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.12.14-95.57.1.s390x", "product": { "name": "kernel-default-man-4.12.14-95.57.1.s390x", "product_id": "kernel-default-man-4.12.14-95.57.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.57.1.s390x", "product": { "name": "kernel-obs-build-4.12.14-95.57.1.s390x", "product_id": "kernel-obs-build-4.12.14-95.57.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.57.1.s390x", "product": { "name": "kernel-obs-qa-4.12.14-95.57.1.s390x", "product_id": "kernel-obs-qa-4.12.14-95.57.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.57.1.s390x", "product": { "name": "kernel-syms-4.12.14-95.57.1.s390x", "product_id": "kernel-syms-4.12.14-95.57.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.57.1.s390x", "product": { "name": "kernel-vanilla-4.12.14-95.57.1.s390x", "product_id": "kernel-vanilla-4.12.14-95.57.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.57.1.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-95.57.1.s390x", "product_id": "kernel-vanilla-base-4.12.14-95.57.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.57.1.s390x", "product": { "name": "kernel-vanilla-devel-4.12.14-95.57.1.s390x", "product_id": "kernel-vanilla-devel-4.12.14-95.57.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-95.57.1.s390x", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-95.57.1.s390x", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.57.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.12.14-95.57.1.s390x", "product": { "name": "kernel-zfcpdump-4.12.14-95.57.1.s390x", "product_id": "kernel-zfcpdump-4.12.14-95.57.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-man-4.12.14-95.57.1.s390x", "product": { "name": "kernel-zfcpdump-man-4.12.14-95.57.1.s390x", "product_id": "kernel-zfcpdump-man-4.12.14-95.57.1.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_57-default-1-6.3.1.s390x", "product": { "name": "kgraft-patch-4_12_14-95_57-default-1-6.3.1.s390x", "product_id": "kgraft-patch-4_12_14-95_57-default-1-6.3.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.57.1.s390x", "product": { "name": "kselftests-kmp-default-4.12.14-95.57.1.s390x", "product_id": "kselftests-kmp-default-4.12.14-95.57.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.57.1.s390x", "product": { "name": "ocfs2-kmp-default-4.12.14-95.57.1.s390x", "product_id": "ocfs2-kmp-default-4.12.14-95.57.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.57.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.12.14-95.57.1.x86_64", "product_id": "cluster-md-kmp-default-4.12.14-95.57.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.57.1.x86_64", "product": { "name": "dlm-kmp-default-4.12.14-95.57.1.x86_64", "product_id": "dlm-kmp-default-4.12.14-95.57.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.57.1.x86_64", "product": { "name": "gfs2-kmp-default-4.12.14-95.57.1.x86_64", "product_id": "gfs2-kmp-default-4.12.14-95.57.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-95.57.1.x86_64", "product": { "name": "kernel-debug-4.12.14-95.57.1.x86_64", "product_id": "kernel-debug-4.12.14-95.57.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-95.57.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-95.57.1.x86_64", "product_id": "kernel-debug-base-4.12.14-95.57.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-95.57.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-95.57.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-95.57.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-kgraft-devel-4.12.14-95.57.1.x86_64", "product": { "name": "kernel-debug-kgraft-devel-4.12.14-95.57.1.x86_64", "product_id": "kernel-debug-kgraft-devel-4.12.14-95.57.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.57.1.x86_64", "product": { "name": "kernel-default-4.12.14-95.57.1.x86_64", "product_id": "kernel-default-4.12.14-95.57.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.57.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-95.57.1.x86_64", "product_id": "kernel-default-base-4.12.14-95.57.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.57.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-95.57.1.x86_64", "product_id": "kernel-default-devel-4.12.14-95.57.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.57.1.x86_64", "product": { "name": "kernel-default-extra-4.12.14-95.57.1.x86_64", "product_id": "kernel-default-extra-4.12.14-95.57.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.57.1.x86_64", "product": { "name": "kernel-default-kgraft-4.12.14-95.57.1.x86_64", "product_id": "kernel-default-kgraft-4.12.14-95.57.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-95.57.1.x86_64", "product": { "name": "kernel-default-kgraft-devel-4.12.14-95.57.1.x86_64", "product_id": "kernel-default-kgraft-devel-4.12.14-95.57.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-95.57.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-95.57.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-95.57.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-95.57.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-95.57.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-95.57.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-95.57.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-95.57.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-95.57.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-kgraft-devel-4.12.14-95.57.1.x86_64", "product": { "name": "kernel-kvmsmall-kgraft-devel-4.12.14-95.57.1.x86_64", "product_id": "kernel-kvmsmall-kgraft-devel-4.12.14-95.57.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.57.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-95.57.1.x86_64", "product_id": "kernel-obs-build-4.12.14-95.57.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.57.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-95.57.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-95.57.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.57.1.x86_64", "product": { "name": "kernel-syms-4.12.14-95.57.1.x86_64", "product_id": "kernel-syms-4.12.14-95.57.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.57.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-95.57.1.x86_64", "product_id": "kernel-vanilla-4.12.14-95.57.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.57.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-95.57.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-95.57.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.57.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-95.57.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-95.57.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-95.57.1.x86_64", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-95.57.1.x86_64", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.57.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_57-default-1-6.3.1.x86_64", "product": { "name": "kgraft-patch-4_12_14-95_57-default-1-6.3.1.x86_64", "product_id": "kgraft-patch-4_12_14-95_57-default-1-6.3.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.57.1.x86_64", "product": { "name": "kselftests-kmp-default-4.12.14-95.57.1.x86_64", "product_id": "kselftests-kmp-default-4.12.14-95.57.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.57.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.12.14-95.57.1.x86_64", "product_id": "ocfs2-kmp-default-4.12.14-95.57.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE OpenStack Cloud 9", "product": { "name": "SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:9" } } }, { "category": "product_name", "name": "SUSE OpenStack Cloud Crowbar 9", "product": { "name": "SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:9" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 12 SP4", "product": { "name": "SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.57.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.57.1.x86_64" }, "product_reference": "kernel-default-4.12.14-95.57.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.57.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.57.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-95.57.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.57.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.57.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-95.57.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-95.57.1.noarch as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.57.1.noarch" }, "product_reference": "kernel-devel-4.12.14-95.57.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-95.57.1.noarch as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.57.1.noarch" }, "product_reference": "kernel-macros-4.12.14-95.57.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-95.57.1.noarch as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.57.1.noarch" }, "product_reference": "kernel-source-4.12.14-95.57.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.57.1.x86_64 as component of SUSE OpenStack Cloud 9", "product_id": "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.57.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-95.57.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.57.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.57.1.x86_64" }, "product_reference": "kernel-default-4.12.14-95.57.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.57.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.57.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-95.57.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.57.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.57.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-95.57.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-95.57.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.57.1.noarch" }, "product_reference": "kernel-devel-4.12.14-95.57.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-95.57.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.57.1.noarch" }, "product_reference": "kernel-macros-4.12.14-95.57.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-95.57.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.57.1.noarch" }, "product_reference": "kernel-source-4.12.14-95.57.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.57.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", "product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.57.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-95.57.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-95.57.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.12.14-95.57.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-95.57.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.12.14-95.57.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-95.57.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-95.57.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-95.57.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.12.14-95.57.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-95.57.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.s390x" }, "product_reference": "dlm-kmp-default-4.12.14-95.57.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-95.57.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-95.57.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-95.57.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.12.14-95.57.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-95.57.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.s390x" }, "product_reference": "gfs2-kmp-default-4.12.14-95.57.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-95.57.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-95.57.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-95.57.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.12.14-95.57.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-95.57.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.12.14-95.57.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-95.57.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-95.57.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-95.57.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.ppc64le" }, "product_reference": "kernel-default-kgraft-4.12.14-95.57.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-95.57.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.s390x" }, "product_reference": "kernel-default-kgraft-4.12.14-95.57.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-95.57.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.12.14-95.57.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-95.57.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.ppc64le" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-95.57.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-95.57.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.s390x" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-95.57.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-95.57.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.x86_64" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-95.57.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_57-default-1-6.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_57-default-1-6.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_57-default-1-6.3.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-95_57-default-1-6.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_57-default-1-6.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_57-default-1-6.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.57.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-95.57.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.57.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.x86_64" }, "product_reference": "kernel-default-4.12.14-95.57.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.57.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-95.57.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.57.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-95.57.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.57.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-95.57.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.57.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-95.57.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-95.57.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.57.1.noarch" }, "product_reference": "kernel-devel-4.12.14-95.57.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-95.57.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.57.1.noarch" }, "product_reference": "kernel-macros-4.12.14-95.57.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-95.57.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.57.1.noarch" }, "product_reference": "kernel-source-4.12.14-95.57.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.57.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-95.57.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.57.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-95.57.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.57.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.aarch64" }, "product_reference": "kernel-default-4.12.14-95.57.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.57.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-95.57.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.57.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.s390x" }, "product_reference": "kernel-default-4.12.14-95.57.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.57.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.x86_64" }, "product_reference": "kernel-default-4.12.14-95.57.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.57.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-95.57.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.57.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-95.57.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.57.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-95.57.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.57.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-95.57.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.57.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-95.57.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.57.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-95.57.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.57.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-95.57.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.57.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-95.57.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-95.57.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.57.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-95.57.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-95.57.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.57.1.noarch" }, "product_reference": "kernel-devel-4.12.14-95.57.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-95.57.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.57.1.noarch" }, "product_reference": "kernel-macros-4.12.14-95.57.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-95.57.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.57.1.noarch" }, "product_reference": "kernel-source-4.12.14-95.57.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.57.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-95.57.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.57.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-95.57.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.57.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.s390x" }, "product_reference": "kernel-syms-4.12.14-95.57.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.57.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-95.57.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-16746", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-16746" } ], "notes": [ { "category": "general", "text": "An issue was discovered in net/wireless/nl80211.c in the Linux kernel through 5.2.17. It does not check the length of variable elements in a beacon head, leading to a buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.57.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-16746", "url": "https://www.suse.com/security/cve/CVE-2019-16746" }, { "category": "external", "summary": "SUSE Bug 1152107 for CVE-2019-16746", "url": "https://bugzilla.suse.com/1152107" }, { "category": "external", "summary": "SUSE Bug 1173659 for CVE-2019-16746", "url": "https://bugzilla.suse.com/1173659" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.57.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.57.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-04T13:18:16Z", "details": "moderate" } ], "title": "CVE-2019-16746" }, { "cve": "CVE-2019-20810", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20810" } ], "notes": [ { "category": "general", "text": "go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel before 5.6 does not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.57.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20810", "url": "https://www.suse.com/security/cve/CVE-2019-20810" }, { "category": "external", "summary": "SUSE Bug 1172458 for CVE-2019-20810", "url": "https://bugzilla.suse.com/1172458" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.57.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.57.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-04T13:18:16Z", "details": "low" } ], "title": "CVE-2019-20810" }, { "cve": "CVE-2019-20908", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20908" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/firmware/efi/efi.c in the Linux kernel before 5.4. Incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.57.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20908", "url": "https://www.suse.com/security/cve/CVE-2019-20908" }, { "category": "external", "summary": "SUSE Bug 1173567 for CVE-2019-20908", "url": "https://bugzilla.suse.com/1173567" }, { "category": "external", "summary": "SUSE Bug 1174187 for CVE-2019-20908", "url": "https://bugzilla.suse.com/1174187" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.57.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.57.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-04T13:18:16Z", "details": "important" } ], "title": "CVE-2019-20908" }, { "cve": "CVE-2020-0305", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0305" } ], "notes": [ { "category": "general", "text": "In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-153467744", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.57.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0305", "url": "https://www.suse.com/security/cve/CVE-2020-0305" }, { "category": "external", "summary": "SUSE Bug 1174462 for CVE-2020-0305", "url": "https://bugzilla.suse.com/1174462" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.57.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.57.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-04T13:18:16Z", "details": "moderate" } ], "title": "CVE-2020-0305" }, { "cve": "CVE-2020-10766", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10766" } ], "notes": [ { "category": "general", "text": "A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.57.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10766", "url": "https://www.suse.com/security/cve/CVE-2020-10766" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172781 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1172781" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.57.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.57.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-04T13:18:16Z", "details": "moderate" } ], "title": "CVE-2020-10766" }, { "cve": "CVE-2020-10767", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10767" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.57.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10767", "url": "https://www.suse.com/security/cve/CVE-2020-10767" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172782 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1172782" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.57.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.57.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-04T13:18:16Z", "details": "moderate" } ], "title": "CVE-2020-10767" }, { "cve": "CVE-2020-10768", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10768" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.57.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10768", "url": "https://www.suse.com/security/cve/CVE-2020-10768" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172783 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1172783" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.57.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.57.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-04T13:18:16Z", "details": "moderate" } ], "title": "CVE-2020-10768" }, { "cve": "CVE-2020-10769", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10769" } ], "notes": [ { "category": "general", "text": "A buffer over-read flaw was found in RH kernel versions before 5.0 in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm\u0027s module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash. This flaw allows a local attacker with user privileges to cause a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.57.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10769", "url": "https://www.suse.com/security/cve/CVE-2020-10769" }, { "category": "external", "summary": "SUSE Bug 1173265 for CVE-2020-10769", "url": "https://bugzilla.suse.com/1173265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.57.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.57.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-04T13:18:16Z", "details": "moderate" } ], "title": "CVE-2020-10769" }, { "cve": "CVE-2020-10773", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10773" } ], "notes": [ { "category": "general", "text": "A stack information leak flaw was found in s390/s390x in the Linux kernel\u0027s memory manager functionality, where it incorrectly writes to the /proc/sys/vm/cmm_timeout file. This flaw allows a local user to see the kernel data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.57.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10773", "url": "https://www.suse.com/security/cve/CVE-2020-10773" }, { "category": "external", "summary": "SUSE Bug 1172999 for CVE-2020-10773", "url": "https://bugzilla.suse.com/1172999" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.57.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.57.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-04T13:18:16Z", "details": "low" } ], "title": "CVE-2020-10773" }, { "cve": "CVE-2020-12771", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12771" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.6.11. btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.57.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12771", "url": "https://www.suse.com/security/cve/CVE-2020-12771" }, { "category": "external", "summary": "SUSE Bug 1171732 for CVE-2020-12771", "url": "https://bugzilla.suse.com/1171732" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.57.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.57.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-04T13:18:16Z", "details": "moderate" } ], "title": "CVE-2020-12771" }, { "cve": "CVE-2020-12888", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12888" } ], "notes": [ { "category": "general", "text": "The VFIO PCI driver in the Linux kernel through 5.6.13 mishandles attempts to access disabled memory space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.57.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12888", "url": "https://www.suse.com/security/cve/CVE-2020-12888" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1171868 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1171868" }, { "category": "external", "summary": "SUSE Bug 1176979 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1176979" }, { "category": "external", "summary": "SUSE Bug 1179612 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1179612" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.57.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.57.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-04T13:18:16Z", "details": "moderate" } ], "title": "CVE-2020-12888" }, { "cve": "CVE-2020-13974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-13974" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel 4.4 through 5.7.1. drivers/tty/vt/keyboard.c has an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. NOTE: Members in the community argue that the integer overflow does not lead to a security issue in this case.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.57.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-13974", "url": "https://www.suse.com/security/cve/CVE-2020-13974" }, { "category": "external", "summary": "SUSE Bug 1172775 for CVE-2020-13974", "url": "https://bugzilla.suse.com/1172775" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.57.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.57.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-04T13:18:16Z", "details": "moderate" } ], "title": "CVE-2020-13974" }, { "cve": "CVE-2020-14416", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14416" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.4.16, a race condition in tty-\u003edisc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.57.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14416", "url": "https://www.suse.com/security/cve/CVE-2020-14416" }, { "category": "external", "summary": "SUSE Bug 1162002 for CVE-2020-14416", "url": "https://bugzilla.suse.com/1162002" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.57.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.57.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-04T13:18:16Z", "details": "moderate" } ], "title": "CVE-2020-14416" }, { "cve": "CVE-2020-15393", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15393" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.4 through 5.7.6, usbtest_disconnect in drivers/usb/misc/usbtest.c has a memory leak, aka CID-28ebeb8db770.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.57.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15393", "url": "https://www.suse.com/security/cve/CVE-2020-15393" }, { "category": "external", "summary": "SUSE Bug 1173514 for CVE-2020-15393", "url": "https://bugzilla.suse.com/1173514" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.57.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.57.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-04T13:18:16Z", "details": "moderate" } ], "title": "CVE-2020-15393" }, { "cve": "CVE-2020-15780", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15780" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.57.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15780", "url": "https://www.suse.com/security/cve/CVE-2020-15780" }, { "category": "external", "summary": "SUSE Bug 1173573 for CVE-2020-15780", "url": "https://bugzilla.suse.com/1173573" }, { "category": "external", "summary": "SUSE Bug 1174186 for CVE-2020-15780", "url": "https://bugzilla.suse.com/1174186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.57.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_57-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.57.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.57.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.57.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-04T13:18:16Z", "details": "important" } ], "title": "CVE-2020-15780" } ] }
suse-su-2020:1693-1
Vulnerability from csaf_suse
Published
2020-06-19 12:25
Modified
2020-06-19 12:25
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-10768: The prctl() function could be used to enable indirect branch speculation even after it has been disabled. (bnc#1172783)
- CVE-2020-10766: A bug in the logic handling could allow an attacker with a local account to disable SSBD protection. (bnc#1172781)
- CVE-2020-10767: A IBPB would be disabled when STIBP was not available or when Enhanced Indirect Branch Restricted Speculation (IBRS) was available. This is unexpected behaviour could leave the system open to a spectre v2 style attack (bnc#1172782)
- CVE-2020-13974: drivers/tty/vt/keyboard.c had an integer overflow if k_ascii was called several times in a row (bnc#1172775)
- CVE-2019-20810: go7007_snd_init did not call snd_card_free for a failure path, which caused a memory leak (bnc#1172458)
The following non-security bugs were fixed:
- ACPI: PM: Avoid using power resources if there are none for D0 (bsc#1051510).
- ALSA: es1688: Add the missed snd_card_free() (bsc#1051510).
- ALSA: hda/hdmi - enable runtime pm for newer AMD display audio (bsc#1111666).
- ALSA: hda/realtek - Add LED class support for micmute LED (bsc#1111666).
- ALSA: hda/realtek - Enable micmute LED on and HP system (bsc#1111666).
- ALSA: hda/realtek - Fix unused variable warning w/o CONFIG_LEDS_TRIGGER_AUDIO (bsc#1111666).
- ALSA: hda/realtek - Introduce polarity for micmute LED GPIO (bsc#1111666).
- ALSA: hda/realtek - add a pintbl quirk for several Lenovo machines (bsc#1111666).
- ALSA: hda: Add ElkhartLake HDMI codec vid (bsc#1111666).
- ALSA: hda: add sienna_cichlid audio asic id for sienna_cichlid up (bsc#1111666).
- ALSA: pcm: disallow linking stream to itself (bsc#1111666).
- ALSA: usb-audio: Add Pioneer DJ DJM-900NXS2 support (bsc#1111666).
- ALSA: usb-audio: Add duplex sound support for USB devices using implicit feedback (bsc#1111666).
- ALSA: usb-audio: Add vendor, product and profile name for HP Thunderbolt Dock (bsc#1111666).
- ALSA: usb-audio: Clean up quirk entries with macros (bsc#1111666).
- ALSA: usb-audio: Fix inconsistent card PM state after resume (bsc#1111666).
- ALSA: usb-audio: Fix racy list management in output queue (bsc#1111666).
- ALSA: usb-audio: Manage auto-pm of all bundled interfaces (bsc#1111666).
- ALSA: usb-audio: Use the new macro for HP Dock rename quirks (bsc#1111666).
- CDC-ACM: heed quirk also in error handling (git-fixes).
- HID: sony: Fix for broken buttons on DS3 USB dongles (bsc#1051510).
- KVM: x86/mmu: Set mmio_value to '0' if reserved #PF can't be generated (bsc#1171904).
- KVM: x86: only do L1TF workaround on affected processors (bsc#1171904).
- NFS: Fix an RCU lock leak in nfs4_refresh_delegation_stateid() (bsc#1170592).
- NFSv4: Retry CLOSE and DELEGRETURN on NFS4ERR_OLD_STATEID (bsc#1170592).
- PCI/PM: Call .bridge_d3() hook only if non-NULL (git-fixes).
- PCI/PTM: Inherit Switch Downstream Port PTM settings from Upstream Port (bsc#1051510).
- PCI: Allow pci_resize_resource() for devices on root bus (bsc#1051510).
- PCI: Fix pci_register_host_bridge() device_register() error handling (bsc#1051510).
- PCI: Program MPS for RCiEP devices (bsc#1051510).
- RDMA/efa: Fix setting of wrong bit in get/set_feature commands (bsc#1111666)
- RDMA/efa: Support remote read access in MR registration (bsc#1111666)
- RDMA/efa: Unified getters/setters for device structs bitmask access (bsc#1111666)
- USB: gadget: udc: s3c2410_udc: Remove pointless NULL check in s3c2410_udc_nuke (bsc#1051510).
- USB: host: ehci-mxc: Add error handling in ehci_mxc_drv_probe() (bsc#1051510).
- USB: serial: option: add Telit LE910C1-EUX compositions (bsc#1051510).
- USB: serial: qcserial: add DW5816e QDL support (bsc#1051510).
- USB: serial: usb_wwan: do not resubmit rx urb on fatal errors (bsc#1051510).
- USB: serial: usb_wwan: do not resubmit rx urb on fatal errors (git-fixes).
- arm64: map FDT as RW for early_init_dt_scan() (jsc#SLE-12423).
- bcache: Fix an error code in bch_dump_read() (git fixes (block drivers)).
- block: remove QUEUE_FLAG_STACKABLE (git fixes (block drivers)).
- block: sed-opal: fix sparse warning: convert __be64 data (git fixes (block drivers)).
- brcmfmac: fix wrong location to get firmware feature (bsc#1111666).
- btrfs: do not zero f_bavail if we have available space (bsc#1168081).
- btrfs: do not zero f_bavail if we have available space (bsc#1168081).
- char/random: Add a newline at the end of the file (jsc#SLE-12423).
- cifs: get rid of unused parameter in reconn_setup_dfs_targets() (bsc#1144333).
- cifs: handle hostnames that resolve to same ip in failover (bsc#1144333 bsc#1161016).
- cifs: set up next DFS target before generic_ip_connect() (bsc#1144333 bsc#1161016).
- clk: bcm2835: Fix return type of bcm2835_register_gate (bsc#1051510).
- clk: clk-flexgen: fix clock-critical handling (bsc#1051510).
- clk: sunxi: Fix incorrect usage of round_down() (bsc#1051510).
- compat_ioctl: block: handle BLKREPORTZONE/BLKRESETZONE (git fixes (block drivers)).
- compat_ioctl: block: handle Persistent Reservations (git fixes (block drivers)).
- copy_{to,from}_user(): consolidate object size checks (git fixes).
- crypto: caam - update xts sector size for large input length (bsc#1111666).
- crypto: chelsio/chtls: properly set tp->lsndtime (bsc#1111666).
- dm btree: increase rebalance threshold in __rebalance2() (git fixes (block drivers)).
- dm cache: fix a crash due to incorrect work item cancelling (git fixes (block drivers)).
- dm crypt: fix benbi IV constructor crash if used in authenticated mode (git fixes (block drivers)).
- dm space map common: fix to ensure new block isn't already in use (git fixes (block drivers)).
- dm verity fec: fix hash block number in verity_fec_decode (git fixes (block drivers)).
- dm verity fec: fix memory leak in verity_fec_dtr (git fixes (block drivers)).
- dm: fix potential for q->make_request_fn NULL pointer (git fixes (block drivers)).
- dm: various cleanups to md->queue initialization code (git fixes).
- dmaengine: tegra210-adma: Fix an error handling path in 'tegra_adma_probe()' (bsc#1111666).
- drivers: soc: ti: knav_qmss_queue: Make knav_gp_range_ops static (bsc#1051510).
- drm/i915: Whitelist context-local timestamp in the gen9 cmdparser (bsc#1111666).
- drm: amd/display: fix Kconfig help text (bsc#1113956)
- efi/random: Increase size of firmware supplied randomness (jsc#SLE-12423).
- efi/random: Treat EFI_RNG_PROTOCOL output as bootloader randomness (jsc#SLE-12423).
- efi: READ_ONCE rng seed size before munmap (jsc#SLE-12423).
- efi: Reorder pr_notice() with add_device_randomness() call (jsc#SLE-12423).
- evm: Check also if *tfm is an error pointer in init_desc() (bsc#1051510).
- evm: Fix a small race in init_desc() (bsc#1051510).
- extcon: adc-jack: Fix an error handling path in 'adc_jack_probe()' (bsc#1051510).
- fdt: Update CRC check for rng-seed (jsc#SLE-12423).
- fdt: add support for rng-seed (jsc#SLE-12423).
- firmware: imx: scu: Fix corruption of header (git-fixes).
- firmware: imx: scu: Fix possible memory leak in imx_scu_probe() (bsc#1111666).
- firmware: revert letter case change which broke compatibility with the SAP license generator (bsc#1172472).
- fpga: dfl: afu: Corrected error handling levels (git-fixes).
- fs/reiserfs: Reenabled reiserfs (bsc#1172884)
- gpiolib: Document that GPIO line names are not globally unique (bsc#1051510).
- gpu: ipu-v3: pre: do not trigger update if buffer address does not change (bsc#1111666).
- iio: buffer: Do not allow buffers without any channels enabled to be activated (bsc#1051510).
- iio: pressure: bmp280: Tolerate IRQ before registering (bsc#1051510).
- ima: Directly assign the ima_default_policy pointer to ima_rules (bsc#1051510).
- ima: Fix ima digest hash table key calculation (bsc#1051510).
- include/asm-generic/topology.h: guard cpumask_of_node() macro argument (bsc#1148868).
- kabi: ppc64le: prevent struct dma_map_ops to become defined (jsc#SLE-12423).
- kvm: x86: Fix L1TF mitigation for shadow MMU (bsc#1171904).
- livepatch: Apply vmlinux-specific KLP relocations early (bsc#1071995).
- livepatch: Disallow vmlinux.ko (bsc#1071995).
- livepatch: Make klp_apply_object_relocs static (bsc#1071995).
- livepatch: Prevent module-specific KLP rela sections from referencing vmlinux symbols (bsc#1071995).
- livepatch: Remove .klp.arch (bsc#1071995).
- mac80211: add option for setting control flags (bsc#1111666).
- mac80211: set IEEE80211_TX_CTRL_PORT_CTRL_PROTO for nl80211 TX (bsc#1111666).
- mailbox: imx: Disable the clock on devm_mbox_controller_register() failure (git-fixes).
- md: Avoid namespace collision with bitmap API (git fixes (block drivers)).
- md: use memalloc scope APIs in mddev_suspend()/mddev_resume() (bsc#1166985)).
- md: use memalloc scope APIs in mddev_suspend()/mddev_resume() (git fixes (block drivers)).
- mdraid: fix read/write bytes accounting (bsc#1172537).
- mmc: block: Fix request completion in the CQE timeout path (bsc#1111666).
- mmc: block: Fix use-after-free issue for rpmb (bsc#1111666).
- mmc: fix compilation of user API (bsc#1051510).
- netfilter: connlabels: prefer static lock initialiser (git-fixes).
- netfilter: not mark a spinlock as __read_mostly (git-fixes).
- nl80211: fix NL80211_ATTR_CHANNEL_WIDTH attribute type (bsc#1111666).
- nvme-fc: Fail transport errors with NVME_SC_HOST_PATH (bsc#1158983 bsc#1172538).
- nvme-tcp: fail command with NVME_SC_HOST_PATH_ERROR send failed (bsc#1158983 bsc#1172538).
- nvme: fail cancelled commands with NVME_SC_HOST_PATH_ERROR (bsc#1158983 bsc#1172538).
- overflow.h: Add arithmetic shift helper (git fixes).
- overflow: Fix -Wtype-limits compilation warnings (git fixes).
- p54usb: add AirVasT USB stick device-id (bsc#1051510).
- pcm_native: result of put_user() needs to be checked (bsc#1111666).
- perf, pt, coresight: Fix address filters for vmas with non-zero offset (git-fixes).
- perf, pt, coresight: Fix address filters for vmas with non-zero offset (git-fixes).
- perf/cgroup: Fix perf cgroup hierarchy support (git-fixes).
- perf/cgroup: Fix perf cgroup hierarchy support (git-fixes).
- perf/core: Add sanity check to deal with pinned event failure (git-fixes).
- perf/core: Add sanity check to deal with pinned event failure (git-fixes).
- perf/core: Avoid freeing static PMU contexts when PMU is unregistered (git-fixes).
- perf/core: Avoid freeing static PMU contexts when PMU is unregistered (git-fixes).
- perf/core: Correct event creation with PERF_FORMAT_GROUP (git-fixes).
- perf/core: Correct event creation with PERF_FORMAT_GROUP (git-fixes).
- perf/core: Do not WARN() for impossible ring-buffer sizes (git-fixes).
- perf/core: Do not WARN() for impossible ring-buffer sizes (git-fixes).
- perf/core: Fix __perf_read_group_add() locking (git-fixes (dependent patch)).
- perf/core: Fix __perf_read_group_add() locking (git-fixes (dependent patch)).
- perf/core: Fix bad use of igrab() (git fixes (dependent patch)).
- perf/core: Fix crash when using HW tracing kernel filters (git-fixes).
- perf/core: Fix ctx_event_type in ctx_resched() (git-fixes).
- perf/core: Fix ctx_event_type in ctx_resched() (git-fixes).
- perf/core: Fix error handling in perf_event_alloc() (git-fixes).
- perf/core: Fix error handling in perf_event_alloc() (git-fixes).
- perf/core: Fix exclusive events' grouping (git-fixes).
- perf/core: Fix exclusive events' grouping (git-fixes).
- perf/core: Fix group scheduling with mixed hw and sw events (git-fixes).
- perf/core: Fix group scheduling with mixed hw and sw events (git-fixes).
- perf/core: Fix impossible ring-buffer sizes warning (git-fixes).
- perf/core: Fix impossible ring-buffer sizes warning (git-fixes).
- perf/core: Fix lock inversion between perf,trace,cpuhp (git-fixes (dependent patch for 18736eef1213)).
- perf/core: Fix lock inversion between perf,trace,cpuhp (git-fixes (dependent patch for 18736eef1213)).
- perf/core: Fix locking for children siblings group read (git-fixes).
- perf/core: Fix locking for children siblings group read (git-fixes).
- perf/core: Fix perf_event_read_value() locking (git-fixes).
- perf/core: Fix perf_event_read_value() locking (git-fixes).
- perf/core: Fix perf_pmu_unregister() locking (git-fixes).
- perf/core: Fix perf_pmu_unregister() locking (git-fixes).
- perf/core: Fix perf_sample_regs_user() mm check (git-fixes).
- perf/core: Fix perf_sample_regs_user() mm check (git-fixes).
- perf/core: Fix possible Spectre-v1 indexing for ->aux_pages (git-fixes).
- perf/core: Fix possible Spectre-v1 indexing for ->aux_pages (git-fixes).
- perf/core: Fix race between close() and fork() (git-fixes).
- perf/core: Fix race between close() and fork() (git-fixes).
- perf/core: Fix the address filtering fix (git-fixes).
- perf/core: Fix the address filtering fix (git-fixes).
- perf/core: Fix use-after-free in uprobe_perf_close() (git-fixes).
- perf/core: Fix use-after-free in uprobe_perf_close() (git-fixes).
- perf/core: Force USER_DS when recording user stack data (git-fixes).
- perf/core: Force USER_DS when recording user stack data (git-fixes).
- perf/core: Restore mmap record type correctly (git-fixes).
- perf/core: Restore mmap record type correctly (git-fixes).
- perf/ioctl: Add check for the sample_period value (git-fixes).
- perf/ioctl: Add check for the sample_period value (git-fixes).
- perf/x86/pt, coresight: Clean up address filter structure (git fixes (dependent patch)).
- perf: Allocate context task_ctx_data for child event (git-fixes).
- perf: Allocate context task_ctx_data for child event (git-fixes).
- perf: Copy parent's address filter offsets on clone (git-fixes).
- perf: Copy parent's address filter offsets on clone (git-fixes).
- perf: Fix header.size for namespace events (git-fixes).
- perf: Fix header.size for namespace events (git-fixes).
- perf: Return proper values for user stack errors (git-fixes).
- perf: Return proper values for user stack errors (git-fixes).
- pid: Improve the comment about waiting in zap_pid_ns_processes (git fixes)).
- pinctrl: freescale: imx: Fix an error handling path in 'imx_pinctrl_probe()' (bsc#1051510).
- pinctrl: imxl: Fix an error handling path in 'imx1_pinctrl_core_probe()' (bsc#1051510).
- pinctrl: samsung: Save/restore eint_mask over suspend for EINT_TYPE GPIOs (bsc#1051510).
- platform/x86: dell-laptop: do not register micmute LED if there is no token (bsc#1111666).
- pnp: Use list_for_each_entry() instead of open coding (git fixes).
- power: supply: bq24257_charger: Replace depends on REGMAP_I2C with select (bsc#1051510).
- power: supply: lp8788: Fix an error handling path in 'lp8788_charger_probe()' (bsc#1051510).
- power: supply: smb347-charger: IRQSTAT_D is volatile (bsc#1051510).
- powerpc/64s: Do not let DT CPU features set FSCR_DSCR (bsc#1065729).
- powerpc/64s: Save FSCR to init_task.thread.fscr after feature init (bsc#1065729).
- powerpc/xive: Clear the page tables for the ESB IO mapping (bsc#1085030).
- raid5: remove gfp flags from scribble_alloc() (bsc#1166985).
- raid5: remove gfp flags from scribble_alloc() (git fixes (block drivers)).
- resolve KABI warning for perf-pt-coresight (git-fixes).
- resolve KABI warning for perf-pt-coresight (git-fixes).
- s390/bpf: Maintain 8-byte stack alignment (bsc#1169194).
- scsi: ibmvscsi: Do not send host info in adapter info MAD after LPM (bsc#1172759 ltc#184814).
- spi: dw: use 'smp_mb()' to avoid sending spi data error (bsc#1051510).
- spi: spi-mem: Fix Dual/Quad modes on Octal-capable devices (bsc#1111666).
- staging: rtl8712: Fix IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK (bsc#1051510).
- staging: sm750fb: add missing case while setting FB_VISUAL (bsc#1051510).
- tty: n_gsm: Fix SOF skipping (bsc#1051510).
- tty: n_gsm: Fix bogus i++ in gsm_data_kick (bsc#1051510).
- tty: n_gsm: Fix waking up upper tty layer when room available (bsc#1051510).
- usb: dwc2: gadget: move gadget resume after the core is in L0 state (bsc#1051510).
- usb: gadget: lpc32xx_udc: do not dereference ep pointer before null check (bsc#1051510).
- usb: musb: Fix runtime PM imbalance on error (bsc#1051510).
- usb: musb: start session in resume for host port (bsc#1051510).
- virtio-blk: handle block_device_operations callbacks after hot unplug (git fixes (block drivers)).
- w1: omap-hdq: cleanup to add missing newline for some dev_dbg (bsc#1051510).
- watchdog: sp805: fix restart handler (bsc#1111666).
- wil6210: add general initialization/size checks (bsc#1111666).
- wil6210: check rx_buff_mgmt before accessing it (bsc#1111666).
- wil6210: ignore HALP ICR if already handled (bsc#1111666).
- work around mvfs bug (bsc#1162063).
- x86/cpu/amd: Make erratum #1054 a legacy erratum (bsc#1114279).
- x86: Fix early boot crash on gcc-10, third try (bsc#1114279).
- xfrm: fix error in comment (git fixes).
Patchnames
SUSE-2020-1693,SUSE-SLE-HA-12-SP5-2020-1693,SUSE-SLE-Live-Patching-12-SP5-2020-1693,SUSE-SLE-SDK-12-SP5-2020-1693,SUSE-SLE-SERVER-12-SP5-2020-1693,SUSE-SLE-WE-12-SP5-2020-1693
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2020-10768: The prctl() function could be used to enable indirect branch speculation even after it has been disabled. (bnc#1172783)\n- CVE-2020-10766: A bug in the logic handling could allow an attacker with a local account to disable SSBD protection. (bnc#1172781)\n- CVE-2020-10767: A IBPB would be disabled when STIBP was not available or when Enhanced Indirect Branch Restricted Speculation (IBRS) was available. This is unexpected behaviour could leave the system open to a spectre v2 style attack (bnc#1172782)\n- CVE-2020-13974: drivers/tty/vt/keyboard.c had an integer overflow if k_ascii was called several times in a row (bnc#1172775)\n- CVE-2019-20810: go7007_snd_init did not call snd_card_free for a failure path, which caused a memory leak (bnc#1172458)\n\nThe following non-security bugs were fixed:\n\n- ACPI: PM: Avoid using power resources if there are none for D0 (bsc#1051510).\n- ALSA: es1688: Add the missed snd_card_free() (bsc#1051510).\n- ALSA: hda/hdmi - enable runtime pm for newer AMD display audio (bsc#1111666).\n- ALSA: hda/realtek - Add LED class support for micmute LED (bsc#1111666).\n- ALSA: hda/realtek - Enable micmute LED on and HP system (bsc#1111666).\n- ALSA: hda/realtek - Fix unused variable warning w/o CONFIG_LEDS_TRIGGER_AUDIO (bsc#1111666).\n- ALSA: hda/realtek - Introduce polarity for micmute LED GPIO (bsc#1111666).\n- ALSA: hda/realtek - add a pintbl quirk for several Lenovo machines (bsc#1111666).\n- ALSA: hda: Add ElkhartLake HDMI codec vid (bsc#1111666).\n- ALSA: hda: add sienna_cichlid audio asic id for sienna_cichlid up (bsc#1111666).\n- ALSA: pcm: disallow linking stream to itself (bsc#1111666).\n- ALSA: usb-audio: Add Pioneer DJ DJM-900NXS2 support (bsc#1111666).\n- ALSA: usb-audio: Add duplex sound support for USB devices using implicit feedback (bsc#1111666).\n- ALSA: usb-audio: Add vendor, product and profile name for HP Thunderbolt Dock (bsc#1111666).\n- ALSA: usb-audio: Clean up quirk entries with macros (bsc#1111666).\n- ALSA: usb-audio: Fix inconsistent card PM state after resume (bsc#1111666).\n- ALSA: usb-audio: Fix racy list management in output queue (bsc#1111666).\n- ALSA: usb-audio: Manage auto-pm of all bundled interfaces (bsc#1111666).\n- ALSA: usb-audio: Use the new macro for HP Dock rename quirks (bsc#1111666).\n- CDC-ACM: heed quirk also in error handling (git-fixes).\n- HID: sony: Fix for broken buttons on DS3 USB dongles (bsc#1051510).\n- KVM: x86/mmu: Set mmio_value to \u00270\u0027 if reserved #PF can\u0027t be generated (bsc#1171904).\n- KVM: x86: only do L1TF workaround on affected processors (bsc#1171904).\n- NFS: Fix an RCU lock leak in nfs4_refresh_delegation_stateid() (bsc#1170592).\n- NFSv4: Retry CLOSE and DELEGRETURN on NFS4ERR_OLD_STATEID (bsc#1170592).\n- PCI/PM: Call .bridge_d3() hook only if non-NULL (git-fixes).\n- PCI/PTM: Inherit Switch Downstream Port PTM settings from Upstream Port (bsc#1051510).\n- PCI: Allow pci_resize_resource() for devices on root bus (bsc#1051510).\n- PCI: Fix pci_register_host_bridge() device_register() error handling (bsc#1051510).\n- PCI: Program MPS for RCiEP devices (bsc#1051510).\n- RDMA/efa: Fix setting of wrong bit in get/set_feature commands (bsc#1111666)\n- RDMA/efa: Support remote read access in MR registration (bsc#1111666)\n- RDMA/efa: Unified getters/setters for device structs bitmask access (bsc#1111666)\n- USB: gadget: udc: s3c2410_udc: Remove pointless NULL check in s3c2410_udc_nuke (bsc#1051510).\n- USB: host: ehci-mxc: Add error handling in ehci_mxc_drv_probe() (bsc#1051510).\n- USB: serial: option: add Telit LE910C1-EUX compositions (bsc#1051510).\n- USB: serial: qcserial: add DW5816e QDL support (bsc#1051510).\n- USB: serial: usb_wwan: do not resubmit rx urb on fatal errors (bsc#1051510).\n- USB: serial: usb_wwan: do not resubmit rx urb on fatal errors (git-fixes).\n- arm64: map FDT as RW for early_init_dt_scan() (jsc#SLE-12423).\n- bcache: Fix an error code in bch_dump_read() (git fixes (block drivers)).\n- block: remove QUEUE_FLAG_STACKABLE (git fixes (block drivers)).\n- block: sed-opal: fix sparse warning: convert __be64 data (git fixes (block drivers)).\n- brcmfmac: fix wrong location to get firmware feature (bsc#1111666).\n- btrfs: do not zero f_bavail if we have available space (bsc#1168081).\n- btrfs: do not zero f_bavail if we have available space (bsc#1168081).\n- char/random: Add a newline at the end of the file (jsc#SLE-12423).\n- cifs: get rid of unused parameter in reconn_setup_dfs_targets() (bsc#1144333).\n- cifs: handle hostnames that resolve to same ip in failover (bsc#1144333 bsc#1161016).\n- cifs: set up next DFS target before generic_ip_connect() (bsc#1144333 bsc#1161016).\n- clk: bcm2835: Fix return type of bcm2835_register_gate (bsc#1051510).\n- clk: clk-flexgen: fix clock-critical handling (bsc#1051510).\n- clk: sunxi: Fix incorrect usage of round_down() (bsc#1051510).\n- compat_ioctl: block: handle BLKREPORTZONE/BLKRESETZONE (git fixes (block drivers)).\n- compat_ioctl: block: handle Persistent Reservations (git fixes (block drivers)).\n- copy_{to,from}_user(): consolidate object size checks (git fixes).\n- crypto: caam - update xts sector size for large input length (bsc#1111666).\n- crypto: chelsio/chtls: properly set tp-\u003elsndtime (bsc#1111666).\n- dm btree: increase rebalance threshold in __rebalance2() (git fixes (block drivers)).\n- dm cache: fix a crash due to incorrect work item cancelling (git fixes (block drivers)).\n- dm crypt: fix benbi IV constructor crash if used in authenticated mode (git fixes (block drivers)).\n- dm space map common: fix to ensure new block isn\u0027t already in use (git fixes (block drivers)).\n- dm verity fec: fix hash block number in verity_fec_decode (git fixes (block drivers)).\n- dm verity fec: fix memory leak in verity_fec_dtr (git fixes (block drivers)).\n- dm: fix potential for q-\u003emake_request_fn NULL pointer (git fixes (block drivers)).\n- dm: various cleanups to md-\u003equeue initialization code (git fixes).\n- dmaengine: tegra210-adma: Fix an error handling path in \u0027tegra_adma_probe()\u0027 (bsc#1111666).\n- drivers: soc: ti: knav_qmss_queue: Make knav_gp_range_ops static (bsc#1051510).\n- drm/i915: Whitelist context-local timestamp in the gen9 cmdparser (bsc#1111666).\n- drm: amd/display: fix Kconfig help text (bsc#1113956)\n- efi/random: Increase size of firmware supplied randomness (jsc#SLE-12423).\n- efi/random: Treat EFI_RNG_PROTOCOL output as bootloader randomness (jsc#SLE-12423).\n- efi: READ_ONCE rng seed size before munmap (jsc#SLE-12423).\n- efi: Reorder pr_notice() with add_device_randomness() call (jsc#SLE-12423).\n- evm: Check also if *tfm is an error pointer in init_desc() (bsc#1051510).\n- evm: Fix a small race in init_desc() (bsc#1051510).\n- extcon: adc-jack: Fix an error handling path in \u0027adc_jack_probe()\u0027 (bsc#1051510).\n- fdt: Update CRC check for rng-seed (jsc#SLE-12423).\n- fdt: add support for rng-seed (jsc#SLE-12423).\n- firmware: imx: scu: Fix corruption of header (git-fixes).\n- firmware: imx: scu: Fix possible memory leak in imx_scu_probe() (bsc#1111666).\n- firmware: revert letter case change which broke compatibility with the SAP license generator (bsc#1172472).\n- fpga: dfl: afu: Corrected error handling levels (git-fixes).\n- fs/reiserfs: Reenabled reiserfs (bsc#1172884)\n- gpiolib: Document that GPIO line names are not globally unique (bsc#1051510).\n- gpu: ipu-v3: pre: do not trigger update if buffer address does not change (bsc#1111666).\n- iio: buffer: Do not allow buffers without any channels enabled to be activated (bsc#1051510).\n- iio: pressure: bmp280: Tolerate IRQ before registering (bsc#1051510).\n- ima: Directly assign the ima_default_policy pointer to ima_rules (bsc#1051510).\n- ima: Fix ima digest hash table key calculation (bsc#1051510).\n- include/asm-generic/topology.h: guard cpumask_of_node() macro argument (bsc#1148868).\n- kabi: ppc64le: prevent struct dma_map_ops to become defined (jsc#SLE-12423).\n- kvm: x86: Fix L1TF mitigation for shadow MMU (bsc#1171904).\n- livepatch: Apply vmlinux-specific KLP relocations early (bsc#1071995).\n- livepatch: Disallow vmlinux.ko (bsc#1071995).\n- livepatch: Make klp_apply_object_relocs static (bsc#1071995).\n- livepatch: Prevent module-specific KLP rela sections from referencing vmlinux symbols (bsc#1071995).\n- livepatch: Remove .klp.arch (bsc#1071995).\n- mac80211: add option for setting control flags (bsc#1111666).\n- mac80211: set IEEE80211_TX_CTRL_PORT_CTRL_PROTO for nl80211 TX (bsc#1111666).\n- mailbox: imx: Disable the clock on devm_mbox_controller_register() failure (git-fixes).\n- md: Avoid namespace collision with bitmap API (git fixes (block drivers)).\n- md: use memalloc scope APIs in mddev_suspend()/mddev_resume() (bsc#1166985)).\n- md: use memalloc scope APIs in mddev_suspend()/mddev_resume() (git fixes (block drivers)).\n- mdraid: fix read/write bytes accounting (bsc#1172537).\n- mmc: block: Fix request completion in the CQE timeout path (bsc#1111666).\n- mmc: block: Fix use-after-free issue for rpmb (bsc#1111666).\n- mmc: fix compilation of user API (bsc#1051510).\n- netfilter: connlabels: prefer static lock initialiser (git-fixes).\n- netfilter: not mark a spinlock as __read_mostly (git-fixes).\n- nl80211: fix NL80211_ATTR_CHANNEL_WIDTH attribute type (bsc#1111666).\n- nvme-fc: Fail transport errors with NVME_SC_HOST_PATH (bsc#1158983 bsc#1172538).\n- nvme-tcp: fail command with NVME_SC_HOST_PATH_ERROR send failed (bsc#1158983 bsc#1172538).\n- nvme: fail cancelled commands with NVME_SC_HOST_PATH_ERROR (bsc#1158983 bsc#1172538).\n- overflow.h: Add arithmetic shift helper (git fixes).\n- overflow: Fix -Wtype-limits compilation warnings (git fixes).\n- p54usb: add AirVasT USB stick device-id (bsc#1051510).\n- pcm_native: result of put_user() needs to be checked (bsc#1111666).\n- perf, pt, coresight: Fix address filters for vmas with non-zero offset (git-fixes).\n- perf, pt, coresight: Fix address filters for vmas with non-zero offset (git-fixes).\n- perf/cgroup: Fix perf cgroup hierarchy support (git-fixes).\n- perf/cgroup: Fix perf cgroup hierarchy support (git-fixes).\n- perf/core: Add sanity check to deal with pinned event failure (git-fixes).\n- perf/core: Add sanity check to deal with pinned event failure (git-fixes).\n- perf/core: Avoid freeing static PMU contexts when PMU is unregistered (git-fixes).\n- perf/core: Avoid freeing static PMU contexts when PMU is unregistered (git-fixes).\n- perf/core: Correct event creation with PERF_FORMAT_GROUP (git-fixes).\n- perf/core: Correct event creation with PERF_FORMAT_GROUP (git-fixes).\n- perf/core: Do not WARN() for impossible ring-buffer sizes (git-fixes).\n- perf/core: Do not WARN() for impossible ring-buffer sizes (git-fixes).\n- perf/core: Fix __perf_read_group_add() locking (git-fixes (dependent patch)).\n- perf/core: Fix __perf_read_group_add() locking (git-fixes (dependent patch)).\n- perf/core: Fix bad use of igrab() (git fixes (dependent patch)).\n- perf/core: Fix crash when using HW tracing kernel filters (git-fixes).\n- perf/core: Fix ctx_event_type in ctx_resched() (git-fixes).\n- perf/core: Fix ctx_event_type in ctx_resched() (git-fixes).\n- perf/core: Fix error handling in perf_event_alloc() (git-fixes).\n- perf/core: Fix error handling in perf_event_alloc() (git-fixes).\n- perf/core: Fix exclusive events\u0027 grouping (git-fixes).\n- perf/core: Fix exclusive events\u0027 grouping (git-fixes).\n- perf/core: Fix group scheduling with mixed hw and sw events (git-fixes).\n- perf/core: Fix group scheduling with mixed hw and sw events (git-fixes).\n- perf/core: Fix impossible ring-buffer sizes warning (git-fixes).\n- perf/core: Fix impossible ring-buffer sizes warning (git-fixes).\n- perf/core: Fix lock inversion between perf,trace,cpuhp (git-fixes (dependent patch for 18736eef1213)).\n- perf/core: Fix lock inversion between perf,trace,cpuhp (git-fixes (dependent patch for 18736eef1213)).\n- perf/core: Fix locking for children siblings group read (git-fixes).\n- perf/core: Fix locking for children siblings group read (git-fixes).\n- perf/core: Fix perf_event_read_value() locking (git-fixes).\n- perf/core: Fix perf_event_read_value() locking (git-fixes).\n- perf/core: Fix perf_pmu_unregister() locking (git-fixes).\n- perf/core: Fix perf_pmu_unregister() locking (git-fixes).\n- perf/core: Fix perf_sample_regs_user() mm check (git-fixes).\n- perf/core: Fix perf_sample_regs_user() mm check (git-fixes).\n- perf/core: Fix possible Spectre-v1 indexing for -\u003eaux_pages (git-fixes).\n- perf/core: Fix possible Spectre-v1 indexing for -\u003eaux_pages (git-fixes).\n- perf/core: Fix race between close() and fork() (git-fixes).\n- perf/core: Fix race between close() and fork() (git-fixes).\n- perf/core: Fix the address filtering fix (git-fixes).\n- perf/core: Fix the address filtering fix (git-fixes).\n- perf/core: Fix use-after-free in uprobe_perf_close() (git-fixes).\n- perf/core: Fix use-after-free in uprobe_perf_close() (git-fixes).\n- perf/core: Force USER_DS when recording user stack data (git-fixes).\n- perf/core: Force USER_DS when recording user stack data (git-fixes).\n- perf/core: Restore mmap record type correctly (git-fixes).\n- perf/core: Restore mmap record type correctly (git-fixes).\n- perf/ioctl: Add check for the sample_period value (git-fixes).\n- perf/ioctl: Add check for the sample_period value (git-fixes).\n- perf/x86/pt, coresight: Clean up address filter structure (git fixes (dependent patch)).\n- perf: Allocate context task_ctx_data for child event (git-fixes).\n- perf: Allocate context task_ctx_data for child event (git-fixes).\n- perf: Copy parent\u0027s address filter offsets on clone (git-fixes).\n- perf: Copy parent\u0027s address filter offsets on clone (git-fixes).\n- perf: Fix header.size for namespace events (git-fixes).\n- perf: Fix header.size for namespace events (git-fixes).\n- perf: Return proper values for user stack errors (git-fixes).\n- perf: Return proper values for user stack errors (git-fixes).\n- pid: Improve the comment about waiting in zap_pid_ns_processes (git fixes)).\n- pinctrl: freescale: imx: Fix an error handling path in \u0027imx_pinctrl_probe()\u0027 (bsc#1051510).\n- pinctrl: imxl: Fix an error handling path in \u0027imx1_pinctrl_core_probe()\u0027 (bsc#1051510).\n- pinctrl: samsung: Save/restore eint_mask over suspend for EINT_TYPE GPIOs (bsc#1051510).\n- platform/x86: dell-laptop: do not register micmute LED if there is no token (bsc#1111666).\n- pnp: Use list_for_each_entry() instead of open coding (git fixes).\n- power: supply: bq24257_charger: Replace depends on REGMAP_I2C with select (bsc#1051510).\n- power: supply: lp8788: Fix an error handling path in \u0027lp8788_charger_probe()\u0027 (bsc#1051510).\n- power: supply: smb347-charger: IRQSTAT_D is volatile (bsc#1051510).\n- powerpc/64s: Do not let DT CPU features set FSCR_DSCR (bsc#1065729).\n- powerpc/64s: Save FSCR to init_task.thread.fscr after feature init (bsc#1065729).\n- powerpc/xive: Clear the page tables for the ESB IO mapping (bsc#1085030).\n- raid5: remove gfp flags from scribble_alloc() (bsc#1166985).\n- raid5: remove gfp flags from scribble_alloc() (git fixes (block drivers)).\n- resolve KABI warning for perf-pt-coresight (git-fixes).\n- resolve KABI warning for perf-pt-coresight (git-fixes).\n- s390/bpf: Maintain 8-byte stack alignment (bsc#1169194).\n- scsi: ibmvscsi: Do not send host info in adapter info MAD after LPM (bsc#1172759 ltc#184814).\n- spi: dw: use \u0027smp_mb()\u0027 to avoid sending spi data error (bsc#1051510).\n- spi: spi-mem: Fix Dual/Quad modes on Octal-capable devices (bsc#1111666).\n- staging: rtl8712: Fix IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK (bsc#1051510).\n- staging: sm750fb: add missing case while setting FB_VISUAL (bsc#1051510).\n- tty: n_gsm: Fix SOF skipping (bsc#1051510).\n- tty: n_gsm: Fix bogus i++ in gsm_data_kick (bsc#1051510).\n- tty: n_gsm: Fix waking up upper tty layer when room available (bsc#1051510).\n- usb: dwc2: gadget: move gadget resume after the core is in L0 state (bsc#1051510).\n- usb: gadget: lpc32xx_udc: do not dereference ep pointer before null check (bsc#1051510).\n- usb: musb: Fix runtime PM imbalance on error (bsc#1051510).\n- usb: musb: start session in resume for host port (bsc#1051510).\n- virtio-blk: handle block_device_operations callbacks after hot unplug (git fixes (block drivers)).\n- w1: omap-hdq: cleanup to add missing newline for some dev_dbg (bsc#1051510).\n- watchdog: sp805: fix restart handler (bsc#1111666).\n- wil6210: add general initialization/size checks (bsc#1111666).\n- wil6210: check rx_buff_mgmt before accessing it (bsc#1111666).\n- wil6210: ignore HALP ICR if already handled (bsc#1111666).\n- work around mvfs bug (bsc#1162063).\n- x86/cpu/amd: Make erratum #1054 a legacy erratum (bsc#1114279).\n- x86: Fix early boot crash on gcc-10, third try (bsc#1114279).\n- xfrm: fix error in comment (git fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-1693,SUSE-SLE-HA-12-SP5-2020-1693,SUSE-SLE-Live-Patching-12-SP5-2020-1693,SUSE-SLE-SDK-12-SP5-2020-1693,SUSE-SLE-SERVER-12-SP5-2020-1693,SUSE-SLE-WE-12-SP5-2020-1693", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_1693-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:1693-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20201693-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:1693-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-June/006989.html" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1085030", "url": "https://bugzilla.suse.com/1085030" }, { "category": "self", "summary": "SUSE Bug 1111666", "url": "https://bugzilla.suse.com/1111666" }, { "category": "self", "summary": "SUSE Bug 1113956", "url": "https://bugzilla.suse.com/1113956" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1144333", "url": "https://bugzilla.suse.com/1144333" }, { "category": "self", "summary": "SUSE Bug 1148868", "url": "https://bugzilla.suse.com/1148868" }, { "category": "self", "summary": "SUSE Bug 1158983", "url": "https://bugzilla.suse.com/1158983" }, { "category": "self", "summary": "SUSE Bug 1161016", "url": "https://bugzilla.suse.com/1161016" }, { "category": "self", "summary": "SUSE Bug 1162063", "url": "https://bugzilla.suse.com/1162063" }, { "category": "self", "summary": "SUSE Bug 1166985", "url": "https://bugzilla.suse.com/1166985" }, { "category": "self", "summary": "SUSE Bug 1168081", "url": "https://bugzilla.suse.com/1168081" }, { "category": "self", "summary": "SUSE Bug 1169194", "url": "https://bugzilla.suse.com/1169194" }, { "category": "self", "summary": "SUSE Bug 1170592", "url": "https://bugzilla.suse.com/1170592" }, { "category": "self", "summary": "SUSE Bug 1171904", "url": "https://bugzilla.suse.com/1171904" }, { "category": "self", "summary": "SUSE Bug 1172458", "url": "https://bugzilla.suse.com/1172458" }, { "category": "self", "summary": "SUSE Bug 1172472", "url": "https://bugzilla.suse.com/1172472" }, { "category": "self", "summary": "SUSE Bug 1172537", "url": "https://bugzilla.suse.com/1172537" }, { "category": "self", "summary": "SUSE Bug 1172538", "url": "https://bugzilla.suse.com/1172538" }, { "category": "self", "summary": "SUSE Bug 1172759", "url": "https://bugzilla.suse.com/1172759" }, { "category": "self", "summary": "SUSE Bug 1172775", "url": "https://bugzilla.suse.com/1172775" }, { "category": "self", "summary": "SUSE Bug 1172781", "url": "https://bugzilla.suse.com/1172781" }, { "category": "self", "summary": "SUSE Bug 1172782", "url": "https://bugzilla.suse.com/1172782" }, { "category": "self", "summary": "SUSE Bug 1172783", "url": "https://bugzilla.suse.com/1172783" }, { "category": "self", "summary": "SUSE Bug 1172884", "url": "https://bugzilla.suse.com/1172884" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20810 page", "url": "https://www.suse.com/security/cve/CVE-2019-20810/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10766 page", "url": "https://www.suse.com/security/cve/CVE-2020-10766/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10767 page", "url": "https://www.suse.com/security/cve/CVE-2020-10767/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10768 page", "url": "https://www.suse.com/security/cve/CVE-2020-10768/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-13974 page", "url": "https://www.suse.com/security/cve/CVE-2020-13974/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-06-19T12:25:45Z", "generator": { "date": "2020-06-19T12:25:45Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:1693-1", "initial_release_date": "2020-06-19T12:25:45Z", "revision_history": [ { "date": "2020-06-19T12:25:45Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-122.26.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.12.14-122.26.1.aarch64", "product_id": "cluster-md-kmp-default-4.12.14-122.26.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-122.26.1.aarch64", "product": { "name": "dlm-kmp-default-4.12.14-122.26.1.aarch64", "product_id": "dlm-kmp-default-4.12.14-122.26.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-122.26.1.aarch64", "product": { "name": "gfs2-kmp-default-4.12.14-122.26.1.aarch64", "product_id": "gfs2-kmp-default-4.12.14-122.26.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-122.26.1.aarch64", "product": { "name": "kernel-default-4.12.14-122.26.1.aarch64", "product_id": "kernel-default-4.12.14-122.26.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-122.26.1.aarch64", "product": { "name": "kernel-default-base-4.12.14-122.26.1.aarch64", "product_id": "kernel-default-base-4.12.14-122.26.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-122.26.1.aarch64", "product": { "name": "kernel-default-devel-4.12.14-122.26.1.aarch64", "product_id": "kernel-default-devel-4.12.14-122.26.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-122.26.1.aarch64", "product": { "name": "kernel-default-extra-4.12.14-122.26.1.aarch64", "product_id": "kernel-default-extra-4.12.14-122.26.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-122.26.1.aarch64", "product": { "name": "kernel-default-kgraft-4.12.14-122.26.1.aarch64", "product_id": "kernel-default-kgraft-4.12.14-122.26.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-122.26.1.aarch64", "product": { "name": "kernel-default-kgraft-devel-4.12.14-122.26.1.aarch64", "product_id": "kernel-default-kgraft-devel-4.12.14-122.26.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-122.26.1.aarch64", "product": { "name": "kernel-obs-build-4.12.14-122.26.1.aarch64", "product_id": "kernel-obs-build-4.12.14-122.26.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-122.26.1.aarch64", "product": { "name": "kernel-obs-qa-4.12.14-122.26.1.aarch64", "product_id": "kernel-obs-qa-4.12.14-122.26.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-122.26.1.aarch64", "product": { "name": "kernel-syms-4.12.14-122.26.1.aarch64", "product_id": "kernel-syms-4.12.14-122.26.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-122.26.1.aarch64", "product": { "name": "kernel-vanilla-4.12.14-122.26.1.aarch64", "product_id": "kernel-vanilla-4.12.14-122.26.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-122.26.1.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-122.26.1.aarch64", "product_id": "kernel-vanilla-base-4.12.14-122.26.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-122.26.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.12.14-122.26.1.aarch64", "product_id": "kernel-vanilla-devel-4.12.14-122.26.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-122.26.1.aarch64", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-122.26.1.aarch64", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.26.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-122.26.1.aarch64", "product": { "name": "kselftests-kmp-default-4.12.14-122.26.1.aarch64", "product_id": "kselftests-kmp-default-4.12.14-122.26.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-122.26.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.12.14-122.26.1.aarch64", "product_id": "ocfs2-kmp-default-4.12.14-122.26.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-122.26.1.noarch", "product": { "name": "kernel-devel-4.12.14-122.26.1.noarch", "product_id": "kernel-devel-4.12.14-122.26.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-122.26.2.noarch", "product": { "name": "kernel-docs-4.12.14-122.26.2.noarch", "product_id": "kernel-docs-4.12.14-122.26.2.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-122.26.2.noarch", "product": { "name": "kernel-docs-html-4.12.14-122.26.2.noarch", "product_id": "kernel-docs-html-4.12.14-122.26.2.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-122.26.1.noarch", "product": { "name": "kernel-macros-4.12.14-122.26.1.noarch", "product_id": "kernel-macros-4.12.14-122.26.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-122.26.1.noarch", "product": { "name": "kernel-source-4.12.14-122.26.1.noarch", "product_id": "kernel-source-4.12.14-122.26.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-122.26.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-122.26.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-122.26.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-122.26.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.12.14-122.26.1.ppc64le", "product_id": "cluster-md-kmp-default-4.12.14-122.26.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-122.26.1.ppc64le", "product": { "name": "dlm-kmp-default-4.12.14-122.26.1.ppc64le", "product_id": "dlm-kmp-default-4.12.14-122.26.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-122.26.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.12.14-122.26.1.ppc64le", "product_id": "gfs2-kmp-default-4.12.14-122.26.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-122.26.1.ppc64le", "product": { "name": "kernel-debug-4.12.14-122.26.1.ppc64le", "product_id": "kernel-debug-4.12.14-122.26.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-122.26.1.ppc64le", "product": { "name": "kernel-debug-base-4.12.14-122.26.1.ppc64le", "product_id": "kernel-debug-base-4.12.14-122.26.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-122.26.1.ppc64le", "product": { "name": "kernel-debug-devel-4.12.14-122.26.1.ppc64le", "product_id": "kernel-debug-devel-4.12.14-122.26.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-kgraft-devel-4.12.14-122.26.1.ppc64le", "product": { "name": "kernel-debug-kgraft-devel-4.12.14-122.26.1.ppc64le", "product_id": "kernel-debug-kgraft-devel-4.12.14-122.26.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.12.14-122.26.1.ppc64le", "product": { "name": "kernel-default-4.12.14-122.26.1.ppc64le", "product_id": "kernel-default-4.12.14-122.26.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-122.26.1.ppc64le", "product": { "name": "kernel-default-base-4.12.14-122.26.1.ppc64le", "product_id": "kernel-default-base-4.12.14-122.26.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-122.26.1.ppc64le", "product": { "name": "kernel-default-devel-4.12.14-122.26.1.ppc64le", "product_id": "kernel-default-devel-4.12.14-122.26.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-122.26.1.ppc64le", "product": { "name": "kernel-default-extra-4.12.14-122.26.1.ppc64le", "product_id": "kernel-default-extra-4.12.14-122.26.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-122.26.1.ppc64le", "product": { "name": "kernel-default-kgraft-4.12.14-122.26.1.ppc64le", "product_id": "kernel-default-kgraft-4.12.14-122.26.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-122.26.1.ppc64le", "product": { "name": "kernel-default-kgraft-devel-4.12.14-122.26.1.ppc64le", "product_id": "kernel-default-kgraft-devel-4.12.14-122.26.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-122.26.1.ppc64le", "product": { "name": "kernel-obs-build-4.12.14-122.26.1.ppc64le", "product_id": "kernel-obs-build-4.12.14-122.26.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-122.26.1.ppc64le", "product": { "name": "kernel-obs-qa-4.12.14-122.26.1.ppc64le", "product_id": "kernel-obs-qa-4.12.14-122.26.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-122.26.1.ppc64le", "product": { "name": "kernel-syms-4.12.14-122.26.1.ppc64le", "product_id": "kernel-syms-4.12.14-122.26.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-122.26.1.ppc64le", "product": { "name": "kernel-vanilla-4.12.14-122.26.1.ppc64le", "product_id": "kernel-vanilla-4.12.14-122.26.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-122.26.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-122.26.1.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-122.26.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-122.26.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.12.14-122.26.1.ppc64le", "product_id": "kernel-vanilla-devel-4.12.14-122.26.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-122.26.1.ppc64le", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-122.26.1.ppc64le", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.26.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_26-default-1-8.3.1.ppc64le", "product": { "name": "kgraft-patch-4_12_14-122_26-default-1-8.3.1.ppc64le", "product_id": "kgraft-patch-4_12_14-122_26-default-1-8.3.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-122.26.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.12.14-122.26.1.ppc64le", "product_id": "kselftests-kmp-default-4.12.14-122.26.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-122.26.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.12.14-122.26.1.ppc64le", "product_id": "ocfs2-kmp-default-4.12.14-122.26.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-122.26.1.s390x", "product": { "name": "cluster-md-kmp-default-4.12.14-122.26.1.s390x", "product_id": "cluster-md-kmp-default-4.12.14-122.26.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-122.26.1.s390x", "product": { "name": "dlm-kmp-default-4.12.14-122.26.1.s390x", "product_id": "dlm-kmp-default-4.12.14-122.26.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-122.26.1.s390x", "product": { "name": "gfs2-kmp-default-4.12.14-122.26.1.s390x", "product_id": "gfs2-kmp-default-4.12.14-122.26.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.12.14-122.26.1.s390x", "product": { "name": "kernel-default-4.12.14-122.26.1.s390x", "product_id": "kernel-default-4.12.14-122.26.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-122.26.1.s390x", "product": { "name": "kernel-default-base-4.12.14-122.26.1.s390x", "product_id": "kernel-default-base-4.12.14-122.26.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-122.26.1.s390x", "product": { "name": "kernel-default-devel-4.12.14-122.26.1.s390x", "product_id": "kernel-default-devel-4.12.14-122.26.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-122.26.1.s390x", "product": { "name": "kernel-default-extra-4.12.14-122.26.1.s390x", "product_id": "kernel-default-extra-4.12.14-122.26.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-122.26.1.s390x", "product": { "name": "kernel-default-kgraft-4.12.14-122.26.1.s390x", "product_id": "kernel-default-kgraft-4.12.14-122.26.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-122.26.1.s390x", "product": { "name": "kernel-default-kgraft-devel-4.12.14-122.26.1.s390x", "product_id": "kernel-default-kgraft-devel-4.12.14-122.26.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.12.14-122.26.1.s390x", "product": { "name": "kernel-default-man-4.12.14-122.26.1.s390x", "product_id": "kernel-default-man-4.12.14-122.26.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-122.26.1.s390x", "product": { "name": "kernel-obs-build-4.12.14-122.26.1.s390x", "product_id": "kernel-obs-build-4.12.14-122.26.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-122.26.1.s390x", "product": { "name": "kernel-obs-qa-4.12.14-122.26.1.s390x", "product_id": "kernel-obs-qa-4.12.14-122.26.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-122.26.1.s390x", "product": { "name": "kernel-syms-4.12.14-122.26.1.s390x", "product_id": "kernel-syms-4.12.14-122.26.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-122.26.1.s390x", "product": { "name": "kernel-vanilla-4.12.14-122.26.1.s390x", "product_id": "kernel-vanilla-4.12.14-122.26.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-122.26.1.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-122.26.1.s390x", "product_id": "kernel-vanilla-base-4.12.14-122.26.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-122.26.1.s390x", "product": { "name": "kernel-vanilla-devel-4.12.14-122.26.1.s390x", "product_id": "kernel-vanilla-devel-4.12.14-122.26.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-122.26.1.s390x", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-122.26.1.s390x", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.26.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.12.14-122.26.1.s390x", "product": { "name": "kernel-zfcpdump-4.12.14-122.26.1.s390x", "product_id": "kernel-zfcpdump-4.12.14-122.26.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-man-4.12.14-122.26.1.s390x", "product": { "name": "kernel-zfcpdump-man-4.12.14-122.26.1.s390x", "product_id": "kernel-zfcpdump-man-4.12.14-122.26.1.s390x" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_26-default-1-8.3.1.s390x", "product": { "name": "kgraft-patch-4_12_14-122_26-default-1-8.3.1.s390x", "product_id": "kgraft-patch-4_12_14-122_26-default-1-8.3.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-122.26.1.s390x", "product": { "name": "kselftests-kmp-default-4.12.14-122.26.1.s390x", "product_id": "kselftests-kmp-default-4.12.14-122.26.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-122.26.1.s390x", "product": { "name": "ocfs2-kmp-default-4.12.14-122.26.1.s390x", "product_id": "ocfs2-kmp-default-4.12.14-122.26.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-122.26.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.12.14-122.26.1.x86_64", "product_id": "cluster-md-kmp-default-4.12.14-122.26.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-122.26.1.x86_64", "product": { "name": "dlm-kmp-default-4.12.14-122.26.1.x86_64", "product_id": "dlm-kmp-default-4.12.14-122.26.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-122.26.1.x86_64", "product": { "name": "gfs2-kmp-default-4.12.14-122.26.1.x86_64", "product_id": "gfs2-kmp-default-4.12.14-122.26.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-122.26.1.x86_64", "product": { "name": "kernel-debug-4.12.14-122.26.1.x86_64", "product_id": "kernel-debug-4.12.14-122.26.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-122.26.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-122.26.1.x86_64", "product_id": "kernel-debug-base-4.12.14-122.26.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-122.26.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-122.26.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-122.26.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-kgraft-devel-4.12.14-122.26.1.x86_64", "product": { "name": "kernel-debug-kgraft-devel-4.12.14-122.26.1.x86_64", "product_id": "kernel-debug-kgraft-devel-4.12.14-122.26.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-122.26.1.x86_64", "product": { "name": "kernel-default-4.12.14-122.26.1.x86_64", "product_id": "kernel-default-4.12.14-122.26.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-122.26.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-122.26.1.x86_64", "product_id": "kernel-default-base-4.12.14-122.26.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-122.26.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-122.26.1.x86_64", "product_id": "kernel-default-devel-4.12.14-122.26.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-122.26.1.x86_64", "product": { "name": "kernel-default-extra-4.12.14-122.26.1.x86_64", "product_id": "kernel-default-extra-4.12.14-122.26.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-122.26.1.x86_64", "product": { "name": "kernel-default-kgraft-4.12.14-122.26.1.x86_64", "product_id": "kernel-default-kgraft-4.12.14-122.26.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-devel-4.12.14-122.26.1.x86_64", "product": { "name": "kernel-default-kgraft-devel-4.12.14-122.26.1.x86_64", "product_id": "kernel-default-kgraft-devel-4.12.14-122.26.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-122.26.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-122.26.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-122.26.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-122.26.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-122.26.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-122.26.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-122.26.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-122.26.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-122.26.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-kgraft-devel-4.12.14-122.26.1.x86_64", "product": { "name": "kernel-kvmsmall-kgraft-devel-4.12.14-122.26.1.x86_64", "product_id": "kernel-kvmsmall-kgraft-devel-4.12.14-122.26.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-122.26.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-122.26.1.x86_64", "product_id": "kernel-obs-build-4.12.14-122.26.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-122.26.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-122.26.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-122.26.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-122.26.1.x86_64", "product": { "name": "kernel-syms-4.12.14-122.26.1.x86_64", "product_id": "kernel-syms-4.12.14-122.26.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-122.26.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-122.26.1.x86_64", "product_id": "kernel-vanilla-4.12.14-122.26.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-122.26.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-122.26.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-122.26.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-122.26.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-122.26.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-122.26.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-kgraft-devel-4.12.14-122.26.1.x86_64", "product": { "name": "kernel-vanilla-kgraft-devel-4.12.14-122.26.1.x86_64", "product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.26.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-122_26-default-1-8.3.1.x86_64", "product": { "name": "kgraft-patch-4_12_14-122_26-default-1-8.3.1.x86_64", "product_id": "kgraft-patch-4_12_14-122_26-default-1-8.3.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-122.26.1.x86_64", "product": { "name": "kselftests-kmp-default-4.12.14-122.26.1.x86_64", "product_id": "kselftests-kmp-default-4.12.14-122.26.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-122.26.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.12.14-122.26.1.x86_64", "product_id": "ocfs2-kmp-default-4.12.14-122.26.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 12 SP5", "product": { "name": "SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP5", "product": { "name": "SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 12 SP5", "product": { "name": "SUSE Linux Enterprise Workstation Extension 12 SP5", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-122.26.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.26.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.12.14-122.26.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-122.26.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.26.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.12.14-122.26.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-122.26.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.26.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-122.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-122.26.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.26.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.12.14-122.26.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-122.26.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.26.1.s390x" }, "product_reference": "dlm-kmp-default-4.12.14-122.26.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-122.26.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.26.1.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-122.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-122.26.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.26.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.12.14-122.26.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-122.26.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.26.1.s390x" }, "product_reference": "gfs2-kmp-default-4.12.14-122.26.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-122.26.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.26.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-122.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-122.26.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.26.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.12.14-122.26.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-122.26.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.26.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.12.14-122.26.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-122.26.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.26.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-122.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-122.26.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.26.1.ppc64le" }, "product_reference": "kernel-default-kgraft-4.12.14-122.26.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-122.26.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.26.1.s390x" }, "product_reference": "kernel-default-kgraft-4.12.14-122.26.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-4.12.14-122.26.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.26.1.x86_64" }, "product_reference": "kernel-default-kgraft-4.12.14-122.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-122.26.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.26.1.ppc64le" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-122.26.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-122.26.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.26.1.s390x" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-122.26.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-kgraft-devel-4.12.14-122.26.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.26.1.x86_64" }, "product_reference": "kernel-default-kgraft-devel-4.12.14-122.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_26-default-1-8.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-1-8.3.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-122_26-default-1-8.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_26-default-1-8.3.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-1-8.3.1.s390x" }, "product_reference": "kgraft-patch-4_12_14-122_26-default-1-8.3.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-122_26-default-1-8.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-1-8.3.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-122_26-default-1-8.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-122.26.2.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.26.2.noarch" }, "product_reference": "kernel-docs-4.12.14-122.26.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-122.26.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-122.26.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-122.26.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-122.26.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-122.26.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.s390x" }, "product_reference": "kernel-obs-build-4.12.14-122.26.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-122.26.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-122.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.26.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.aarch64" }, "product_reference": "kernel-default-4.12.14-122.26.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.26.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-122.26.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.26.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.s390x" }, "product_reference": "kernel-default-4.12.14-122.26.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.26.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.x86_64" }, "product_reference": "kernel-default-4.12.14-122.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.26.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-122.26.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.26.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-122.26.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.26.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-122.26.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.26.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-122.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.26.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-122.26.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.26.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-122.26.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.26.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-122.26.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.26.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-122.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-122.26.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.26.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-122.26.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-122.26.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.26.1.noarch" }, "product_reference": "kernel-devel-4.12.14-122.26.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-122.26.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.26.1.noarch" }, "product_reference": "kernel-macros-4.12.14-122.26.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-122.26.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.26.1.noarch" }, "product_reference": "kernel-source-4.12.14-122.26.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.26.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-122.26.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.26.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-122.26.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.26.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.s390x" }, "product_reference": "kernel-syms-4.12.14-122.26.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.26.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", "product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-122.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.26.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.aarch64" }, "product_reference": "kernel-default-4.12.14-122.26.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.26.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-122.26.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.26.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.s390x" }, "product_reference": "kernel-default-4.12.14-122.26.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-122.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.x86_64" }, "product_reference": "kernel-default-4.12.14-122.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.26.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-122.26.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.26.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-122.26.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.26.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-122.26.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-122.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-122.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.26.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-122.26.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.26.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-122.26.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.26.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-122.26.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-122.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-122.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-122.26.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.26.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-122.26.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-122.26.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.26.1.noarch" }, "product_reference": "kernel-devel-4.12.14-122.26.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-122.26.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.26.1.noarch" }, "product_reference": "kernel-macros-4.12.14-122.26.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-122.26.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.26.1.noarch" }, "product_reference": "kernel-source-4.12.14-122.26.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.26.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-122.26.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.26.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-122.26.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.26.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.s390x" }, "product_reference": "kernel-syms-4.12.14-122.26.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-122.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-122.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-4.12.14-122.26.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP5", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.26.1.x86_64" }, "product_reference": "kernel-default-extra-4.12.14-122.26.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-20810", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20810" } ], "notes": [ { "category": "general", "text": "go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel before 5.6 does not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.26.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.26.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20810", "url": "https://www.suse.com/security/cve/CVE-2019-20810" }, { "category": "external", "summary": "SUSE Bug 1172458 for CVE-2019-20810", "url": "https://bugzilla.suse.com/1172458" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.26.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.26.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.26.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.26.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-19T12:25:45Z", "details": "low" } ], "title": "CVE-2019-20810" }, { "cve": "CVE-2020-10766", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10766" } ], "notes": [ { "category": "general", "text": "A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.26.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.26.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10766", "url": "https://www.suse.com/security/cve/CVE-2020-10766" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172781 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1172781" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.26.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.26.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.26.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.26.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-19T12:25:45Z", "details": "moderate" } ], "title": "CVE-2020-10766" }, { "cve": "CVE-2020-10767", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10767" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.26.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.26.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10767", "url": "https://www.suse.com/security/cve/CVE-2020-10767" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172782 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1172782" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.26.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.26.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.26.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.26.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-19T12:25:45Z", "details": "moderate" } ], "title": "CVE-2020-10767" }, { "cve": "CVE-2020-10768", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10768" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.26.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.26.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10768", "url": "https://www.suse.com/security/cve/CVE-2020-10768" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172783 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1172783" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.26.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.26.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.26.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.26.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-19T12:25:45Z", "details": "moderate" } ], "title": "CVE-2020-10768" }, { "cve": "CVE-2020-13974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-13974" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel 4.4 through 5.7.1. drivers/tty/vt/keyboard.c has an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. NOTE: Members in the community argue that the integer overflow does not lead to a security issue in this case.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.26.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.26.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-13974", "url": "https://www.suse.com/security/cve/CVE-2020-13974" }, { "category": "external", "summary": "SUSE Bug 1172775 for CVE-2020-13974", "url": "https://bugzilla.suse.com/1172775" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.26.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.26.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_26-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.26.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.26.2.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.26.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.26.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-06-19T12:25:45Z", "details": "moderate" } ], "title": "CVE-2020-13974" } ] }
suse-su-2020:2027-1
Vulnerability from csaf_suse
Published
2020-07-23 11:49
Modified
2020-07-23 11:49
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP2 Azure kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-15780: A lockdown bypass for loading unsigned modules using ACPI table injection was fixed. (bsc#1173573)
- CVE-2020-15393: Fixed a memory leak in usbtest_disconnect (bnc#1173514).
- CVE-2020-12771: An issue was discovered in btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails (bnc#1171732).
- CVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).
- CVE-2020-10773: Fixed a memory leak on s390/s390x, in the cmm_timeout_hander in file arch/s390/mm/cmm.c (bnc#1172999).
- CVE-2020-14416: Fixed a race condition in tty->disc_data handling in the slip and slcan line discipline could lead to a use-after-free. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).
- CVE-2020-10768: Fixed an issue with the prctl() function, where indirect branch speculation could be enabled even though it was diabled before (bnc#1172783).
- CVE-2020-10766: Fixed an issue which allowed an attacker with a local account to disable SSBD protection (bnc#1172781).
- CVE-2020-10767: Fixed an issue where Indirect Branch Prediction Barrier was disabled in certain circumstances, leaving the system open to a spectre v2 style attack (bnc#1172782).
- CVE-2020-13974: Fixed a integer overflow in drivers/tty/vt/keyboard.c, if k_ascii is called several times in a row (bnc#1172775).
- CVE-2019-20810: Fixed a memory leak in go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c because it did not call snd_card_free for a failure path (bnc#1172458).
- CVE-2019-20812: An issue was discovered in the prb_calc_retire_blk_tmo() function in net/packet/af_packet.c could result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3 (bnc#1172453).
- CVE-2019-19462: relay_open in kernel/relay.c in the Linux kernel allowed local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result (bnc#1158265).
- CVE-2020-10732: A flaw was found in the implementation of Userspace core dumps. This flaw allowed an attacker with a local account to crash a trivial program and exfiltrate private kernel data (bnc#1171220).
- CVE-2020-12656: Fixed a memory leak in gss_mech_free in the rpcsec_gss_krb5 implementation, caused by a lack of certain domain_release calls (bnc#1171219).
- CVE-2020-10751: A flaw was found in the SELinux LSM hook implementation, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing (bnc#1171189).
- CVE-2020-10711: A NULL pointer dereference flaw was found in the SELinux subsystem in versions This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. This flaw allowed a remote network user to crash the system kernel, resulting in a denial of service (bnc#1171191).
- CVE-2020-12769: An issue was discovered in drivers/spi/spi-dw.c allowed attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one (bnc#1171983).
- CVE-2020-13143: gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c relies on kstrdup without considering the possibility of an internal '\0' value, which allowed attackers to trigger an out-of-bounds read (bnc#1171982).
The following non-security bugs were fixed:
- ACPICA: Fixes for acpiExec namespace init file (git-fixes).
- ACPI: configfs: Disallow loading ACPI tables when locked down (git-fixes).
- ACPI: CPPC: Fix reference count leak in acpi_cppc_processor_probe() (git-fixes).
- ACPI: GED: add support for _Exx / _Lxx handler methods (git-fixes).
- ACPI: GED: use correct trigger type field in _Exx / _Lxx handling (git-fixes).
- ACPI: PM: Avoid using power resources if there are none for D0 (git-fixes).
- ACPI: sysfs: Fix pm_profile_attr type (git-fixes).
- ACPI: sysfs: Fix reference count leak in acpi_sysfs_add_hotplug_profile() (git-fixes).
- Add a GIT commit ID of already cherry-picked x86/platform patch
- Add cherry-picked ID to the already applied pinctrl patch
- af_unix: add compat_ioctl support (git-fixes).
- agp/intel: Reinforce the barrier after GTT updates (git-fixes).
- aio: fix async fsync creds (bsc#1173828).
- ALSA: emu10k1: delete an unnecessary condition (git-fixes).
- ALSA: es1688: Add the missed snd_card_free() (git-fixes).
- ALSA: fireface: fix configuration error for nominal sampling transfer frequency (git-fixes).
- ALSA: firewire-lib: fix invalid assignment to union data for directional parameter (git-fixes).
- ALSA: hda: Add ElkhartLake HDMI codec vid (git-fixes).
- ALSA: hda: add member to store ratio for stripe control (git-fixes).
- ALSA: hda: Add NVIDIA codec IDs 9a & 9d through a0 to patch table (git-fixes).
- ALSA: hda: add sienna_cichlid audio asic id for sienna_cichlid up (git-fixes).
- ALSA: hda: Fix potential race in unsol event handler (git-fixes).
- ALSA: hda/hdmi: fix failures at PCM open on Intel ICL and later (git-fixes).
- ALSA: hda/hdmi: improve debug traces for stream lookups (git-fixes).
- ALSA: hda - let hs_mic be picked ahead of hp_mic (git-fixes).
- ALSA: hda/realtek - Add a model for Thinkpad T570 without DAC workaround (bsc#1172017).
- ALSA: hda/realtek - add a pintbl quirk for several Lenovo machines (git-fixes).
- ALSA: hda/realtek - Add LED class support for micmute LED (git-fixes).
- ALSA: hda/realtek - Add more fixup entries for Clevo machines (git-fixes).
- ALSA: hda/realtek: Add mute LED and micmute LED support for HP systems (git-fixes).
- ALSA: hda/realtek - Add new codec supported for ALC287 (git-fixes).
- ALSA: hda/realtek - Add quirk for MSI GE63 laptop (git-fixes).
- ALSA: hda/realtek - Enable audio jacks of Acer vCopperbox with ALC269VC (git-fixes).
- ALSA: hda/realtek: Enable headset mic of Acer C20-820 with ALC269VC (git-fixes).
- ALSA: hda/realtek: Enable headset mic of Acer Veriton N4660G with ALC269VC (git-fixes).
- ALSA: hda/realtek - Enable micmute LED on and HP system (git-fixes).
- ALSA: hda/realtek - Fix Lenovo Thinkpad X1 Carbon 7th quirk subdevice id (git-fixes).
- ALSA: hda/realtek - Fix silent output on Gigabyte X570 Aorus Xtreme (git-fixes).
- ALSA: hda/realtek - Fix unused variable warning w/o CONFIG_LEDS_TRIGGER_AUDIO (git-fixes).
- ALSA: hda/realtek - Introduce polarity for micmute LED GPIO (git-fixes).
- ALSA: hda/tegra: correct number of SDO lines for Tegra194 (git-fixes).
- ALSA: hda/tegra: workaround playback failure on Tegra194 (git-fixes).
- ALSA: hwdep: fix a left shifting 1 by 31 UB bug (git-fixes).
- ALSA: iec1712: Initialize STDSP24 properly when using the model=staudio option (git-fixes).
- ALSA: isa/wavefront: prevent out of bounds write in ioctl (git-fixes).
- ALSA: opl3: fix infoleak in opl3 (git-fixes).
- ALSA: pcm: disallow linking stream to itself (git-fixes).
- ALSA: pcm: fix incorrect hw_base increase (git-fixes).
- ALSA: pcm: fix snd_pcm_link() lockdep splat (git-fixes).
- ALSA: usb-audio: Add duplex sound support for USB devices using implicit feedback (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for RTX6001 (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for SSL2+ (git-fixes).
- ALSA: usb-audio: Add Pioneer DJ DJM-900NXS2 support (git-fixes).
- ALSA: usb-audio: add quirk for Denon DCD-1500RE (git-fixes).
- ALSA: usb-audio: add quirk for MacroSilicon MS2109 (git-fixes).
- ALSA: usb-audio: add quirk for Samsung USBC Headset (AKG) (git-fixes).
- ALSA: usb-audio: Add vendor, product and profile name for HP Thunderbolt Dock (git-fixes).
- ALSA: usb-audio: Clean up quirk entries with macros (git-fixes).
- ALSA: usb-audio: Fix a limit check in proc_dump_substream_formats() (git-fixes).
- ALSA: usb-audio: Fix inconsistent card PM state after resume (git-fixes).
- ALSA: usb-audio: fixing upper volume limit for RME Babyface Pro routing crosspoints (git-fixes).
- ALSA: usb-audio: Fixing usage of plain int instead of NULL (git-fixes).
- ALSA: usb-audio: Fix OOB access of mixer element list (git-fixes).
- ALSA: usb-audio: Fix packet size calculation (bsc#1173847).
- ALSA: usb-audio: Fix potential use-after-free of streams (git-fixes).
- ALSA: usb-audio: Fix racy list management in output queue (git-fixes).
- ALSA: usb-audio: Improve frames size computation (git-fixes).
- ALSA: usb-audio: Manage auto-pm of all bundled interfaces (git-fixes).
- ALSA: usb-audio: mixer: volume quirk for ESS Technology Asus USB DAC (git-fixes).
- ALSA: usb-audio: Print more information in stream proc files (git-fixes).
- ALSA: usb-audio: Quirks for Gigabyte TRX40 Aorus Master onboard audio (git-fixes).
- ALSA: usb-audio: Remove async workaround for Scarlett 2nd gen (git-fixes).
- ALSA: usb-audio: Replace s/frame/packet/ where appropriate (git-fixes).
- ALSA: usb-audio: RME Babyface Pro mixer patch (git-fixes).
- ALSA: usb-audio: Use the new macro for HP Dock rename quirks (git-fixes).
- amdgpu: a NULL ->mm does not mean a thread is a kthread (git-fixes).
- amd-xgbe: Use __napi_schedule() in BH context (networking-stable-20_04_17).
- arm64: map FDT as RW for early_init_dt_scan() (jsc#SLE-12424).
- ARM: oxnas: make ox820_boot_secondary static (git-fixes).
- asm-gemeric/tlb: remove stray function declarations (bsc#1156395).
- ASoC: core: only convert non DPCM link to DPCM link (git-fixes).
- ASoC: davinci-mcasp: Fix dma_chan refcnt leak when getting dma type (git-fixes).
- ASoC: fix incomplete error-handling in img_i2s_in_probe (git-fixes).
- ASoC: fsl_asrc_dma: Fix dma_chan leak when config DMA channel failed (git-fixes).
- ASoC: fsl_ssi: Fix bclk calculation for mono channel (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for Toshiba Encore WT10-A tablet (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for Toshiba Encore WT8-A tablet (git-fixes).
- ASoC: intel: cht_bsw_max98090_ti: Add all Chromebooks that need pmc_plt_clk_0 quirk (bsc#1171246).
- ASoC: intel - fix the card names (git-fixes).
- ASoC: max98373: reorder max98373_reset() in resume (git-fixes).
- ASoC: max9867: fix volume controls (git-fixes).
- ASoC: meson: add missing free_irq() in error path (git-fixes).
- ASoc: q6afe: add support to get port direction (git-fixes).
- ASoC: q6asm: handle EOS correctly (git-fixes).
- ASoC: qcom: q6asm-dai: kCFI fix (git-fixes).
- ASoC: rockchip: Fix a reference count leak (git-fixes).
- ASoC: rt5645: Add platform-data for Asus T101HA (git-fixes).
- ASoC: SOF: core: fix error return code in sof_probe_continue() (git-fixes).
- ASoC: SOF: Do nothing when DSP PM callbacks are not set (git-fixes).
- ASoC: SOF: nocodec: conditionally set dpcm_capture/dpcm_playback flags (git-fixes).
- ASoC: tegra: tegra_wm8903: Support nvidia, headset property (git-fixes).
- ASoC: ti: omap-mcbsp: Fix an error handling path in 'asoc_mcbsp_probe()' (git-fixes).
- ASoC: ux500: mop500: Fix some refcounted resources issues (git-fixes).
- ata/libata: Fix usage of page address by page_address in ata_scsi_mode_select_xlat function (git-fixes).
- ath10k: fix kernel null pointer dereference (git-fixes).
- ath10k: Fix the race condition in firmware dump work queue (git-fixes).
- ath10k: Remove ath10k_qmi_register_service_notifier() declaration (git-fixes).
- ath10k: remove the max_sched_scan_reqs value (git-fixes).
- ath10k: Skip handling del_server during driver exit (git-fixes).
- ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb (git-fixes).
- ath9k: Fix use-after-free Read in ath9k_wmi_ctrl_rx (git-fixes).
- ath9k: Fix use-after-free Read in htc_connect_service (git-fixes).
- ath9k: Fix use-after-free Write in ath9k_htc_rx_msg (git-fixes).
- ath9k_htc: Silence undersized packet warnings (git-fixes).
- ath9x: Fix stack-out-of-bounds Write in ath9k_hif_usb_rx_cb (git-fixes).
- ax25: fix setsockopt(SO_BINDTODEVICE) (git-fixes).
- b43: Fix connection problem with WPA3 (git-fixes).
- b43legacy: Fix case where channel status is corrupted (git-fixes).
- b43_legacy: Fix connection problem with WPA3 (git-fixes).
- backlight: lp855x: Ensure regulators are disabled on probe failure (git-fixes).
- batman-adv: Revert 'disable ethtool link speed detection when auto negotiation off' (git-fixes).
- bfq: Avoid false bfq queue merging (bsc#1171513).
- bfq: Fix check detecting whether waker queue should be selected (bsc#1168838).
- bfq: Use only idle IO periods for think time calculations (bsc#1171513).
- bfq: Use 'ttime' local variable (bsc#1171513).
- blk-iocost: Fix error on iocost_ioc_vrate_adj (bsc#1173206).
- blk-iocost: fix incorrect vtime comparison in iocg_is_idle() (bsc#1173206).
- block/bio-integrity: do not free 'buf' if bio_integrity_add_page() failed (bsc#1173817).
- block: Fix use-after-free in blkdev_get() (bsc#1173834).
- block: nr_sects_write(): Disable preemption on seqcount write (bsc#1173818).
- Bluetooth: Add SCO fallback for invalid LMP parameters error (git-fixes).
- Bluetooth: btbcm: Add 2 missing models to subver tables (git-fixes).
- Bluetooth: btmtkuart: Improve exception handling in btmtuart_probe() (git-fixes).
- Bluetooth: hci_bcm: fix freeing not-requested IRQ (git-fixes).
- bnxt_en: Fix AER reset logic on 57500 chips (bsc#1171150).
- bnxt_en: fix firmware message length endianness (bsc#1173894).
- bnxt_en: Fix return code to 'flash_device' (bsc#1173894).
- bnxt_en: Improve TQM ring context memory sizing formulas (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Re-enable SRIOV during resume (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Return from timer if interface is not in open state (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Simplify bnxt_resume() (jsc#SLE-8371 bsc#1153274).
- bpf: Document optval > PAGE_SIZE behavior for sockopt hooks (bsc#1155518).
- bpf: Do not return EINVAL from {get,set}sockopt when optlen > PAGE_SIZE (bsc#1155518).
- bpf: Fix an error code in check_btf_func() (bsc#1154353).
- bpf: Fix map permissions check (bsc#1155518).
- bpf: Prevent mmap()'ing read-only maps as writable (bsc#1155518).
- bpf: Restrict bpf_probe_read{, str}() only to archs where they work (bsc#1172344).
- bpf: Restrict bpf_trace_printk()'s %s usage and add %pks, %pus specifier (bsc#1172344).
- bpf, sockhash: Synchronize_rcu before free'ing map (git-fixes).
- bpf, sockmap: Check update requirements after locking (git-fixes).
- bpf: Undo internal BPF_PROBE_MEM in BPF insns dump (bsc#1155518).
- bpf, xdp, samples: Fix null pointer dereference in *_user code (bsc#1155518).
- brcmfmac: expose RPi firmware config files through modinfo (bsc#1169094).
- brcmfmac: fix wrong location to get firmware feature (git-fixes).
- btrfs: fix log context list corruption after rename whiteout error (bsc#1172342).
- btrfs: fix partial loss of prealloc extent past i_size after fsync (bsc#1172343).
- btrfs: reloc: clear DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417 bsc#1160947 bsc#1172366).
- btrfs: reloc: fix reloc root leak and NULL pointer dereference (bsc#1171417 bsc#1160947 bsc#1172366).
- bus: ti-sysc: Ignore clockactivity unless specified as a quirk (git-fixes).
- carl9170: remove P2P_GO support (git-fixes).
- cdc-acm: Add DISABLE_ECHO quirk for Microchip/SMSC chip (git-fixes).
- CDC-ACM: heed quirk also in error handling (git-fixes).
- CDC-ACM: heed quirk also in error handling (git-fixes).
- ceph: add comments for handle_cap_flush_ack logic (bsc#1172940).
- ceph: allow rename operation under different quota realms (bsc#1172988).
- ceph: ceph_kick_flushing_caps needs the s_mutex (bsc#1172986).
- ceph: convert mdsc->cap_dirty to a per-session list (bsc#1172984 bsc#1167104).
- ceph: document what protects i_dirty_item and i_flushing_item (bsc#1172940).
- ceph: do not release i_ceph_lock in handle_cap_trunc (bsc#1172940).
- ceph: do not return -ESTALE if there's still an open file (bsc#1171915).
- ceph: do not take i_ceph_lock in handle_cap_import (bsc#1172940).
- ceph: fix potential race in ceph_check_caps (bsc#1172940).
- ceph: flush release queue when handling caps for unknown inode (bsc#1172939).
- ceph: make sure mdsc->mutex is nested in s->s_mutex to fix dead lock (bsc#1172989).
- ceph: normalize 'delta' parameter usage in check_quota_exceeded (bsc#1172987).
- ceph: reorganize __send_cap for less spinlock abuse (bsc#1172940).
- ceph: request expedited service on session's last cap flush (bsc#1172985 bsc#1167104).
- ceph: reset i_requested_max_size if file write is not wanted (bsc#1172983).
- ceph: skip checking caps when session reconnecting and releasing reqs (bsc#1172990).
- ceph: split up __finish_cap_flush (bsc#1172940).
- ceph: throw a warning if we destroy session with mutex still locked (bsc#1172940).
- char/random: Add a newline at the end of the file (jsc#SLE-12424).
- clk: bcm2835: Fix return type of bcm2835_register_gate (git-fixes).
- clk: bcm2835: Remove casting to bcm2835_clk_register (git-fixes).
- clk: clk-flexgen: fix clock-critical handling (git-fixes).
- clk: mediatek: assign the initial value to clk_init_data of mtk_mux (git-fixes).
- clk: meson: meson8b: Do not rely on u-boot to init all GP_PLL registers (git-fixes).
- clk: meson: meson8b: Fix the polarity of the RESET_N lines (git-fixes).
- clk: meson: meson8b: Fix the vclk_div{1, 2, 4, 6, 12}_en gate bits (git-fixes).
- clk: qcom: Add missing msm8998 ufs_unipro_core_clk_src (git-fixes).
- clk: qcom: msm8916: Fix the address location of pll->config_reg (git-fixes).
- clk: renesas: cpg-mssr: Fix STBCR suspend/resume handling (git-fixes).
- clk: samsung: exynos5433: Add IGNORE_UNUSED flag to sclk_i2s1 (git-fixes).
- clk: samsung: Mark top ISP and CAM clocks on Exynos542x as critical (git-fixes).
- clk: sifive: allocate sufficient memory for struct __prci_data (git-fixes).
- clk: sprd: return correct type of value for _sprd_pll_recalc_rate (git-fixes).
- clk: sunxi: Fix incorrect usage of round_down() (git-fixes).
- clk: ti: am33xx: fix RTC clock parent (git-fixes).
- clk: ti: composite: fix memory leak (git-fixes).
- clk: zynqmp: fix memory leak in zynqmp_register_clocks (git-fixes).
- clocksource: dw_apb_timer: Make CPU-affiliation being optional (git-fixes).
- clocksource: dw_apb_timer_of: Fix missing clockevent timers (git-fixes).
- component: Silence bind error on -EPROBE_DEFER (git-fixes).
- config: arm64: enable CONFIG_IOMMU_DEFAULT_PASSTHROUGH References: bsc#1172739
- coredump: fix crash when umh is disabled (git-fixes).
- coredump: fix null pointer dereference on coredump (git-fixes).
- cpufreq: Fix up cpufreq_boost_set_sw() (git-fixes).
- cpufreq: intel_pstate: Only mention the BIOS disabling turbo mode once (git-fixes).
- cpufreq: powernv: Fix frame-size-overflow in powernv_cpufreq_work_fn (git-fixes).
- cpuidle: Fix three reference count leaks (git-fixes).
- crypto: algapi - Avoid spurious modprobe on LOADED (git-fixes).
- crypto: algboss - do not wait during notifier callback (git-fixes).
- crypto: algif_skcipher - Cap recv SG list at ctx->used (git-fixes).
- crypto - Avoid free() namespace collision (git-fixes).
- crypto: cavium/nitrox - Fix 'nitrox_get_first_device()' when ndevlist is fully iterated (git-fixes).
- crypto: ccp -- do not 'select' CONFIG_DMADEVICES (git-fixes).
- Crypto/chcr: fix for ccm(aes) failed test (git-fixes).
- crypto: chelsio/chtls: properly set tp->lsndtime (git-fixes).
- crypto: drbg - fix error return code in drbg_alloc_state() (git-fixes).
- crypto: omap-sham - add proper load balancing support for multicore (git-fixes).
- crypto: stm32/crc32 - fix ext4 chksum BUG_ON() (git-fixes).
- crypto: stm32/crc32 - fix multi-instance (git-fixes).
- crypto: stm32/crc32 - fix run-time self test issue (git-fixes).
- cxgb4: fix adapter crash due to wrong MC size (networking-stable-20_04_27).
- cxgb4: fix large delays in PTP synchronization (networking-stable-20_04_27).
- debugfs: Check module state before warning in {full/open}_proxy_open() (bsc#1173746).
- devlink: fix return value after hitting end in region read (networking-stable-20_05_12).
- devmap: Use bpf_map_area_alloc() for allocating hash buckets (bsc#1154353).
- Disable PINCTRL_TIGERLAKE
- dma-coherent: fix integer overflow in the reserved-memory dma allocation (git-fixes).
- dma-debug: fix displaying of dma allocation type (git-fixes).
- dma-direct: fix data truncation in dma_direct_get_required_mask() (git-fixes).
- dmaengine: dmatest: Fix process hang when reading 'wait' parameter (git-fixes).
- dmaengine: dmatest: Restore default for channel (git-fixes).
- dmaengine: mmp_tdma: Do not ignore slave config validation errors (git-fixes).
- dmaengine: mmp_tdma: Reset channel error on release (git-fixes).
- dmaengine: owl: Use correct lock in owl_dma_get_pchan() (git-fixes).
- dmaengine: pch_dma.c: Avoid data race between probe and irq handler (git-fixes).
- dmaengine: tegra210-adma: Fix an error handling path in 'tegra_adma_probe()' (git-fixes).
- dm verity fec: fix hash block number in verity_fec_decode (git fixes (block drivers)).
- dm writecache: fix data corruption when reloading the target (git fixes (block drivers)).
- dm writecache: reject asynchronous pmem devices (bsc#1156395).
- dpaa2-eth: prevent array underflow in update_cls_rule() (networking-stable-20_05_16).
- dpaa2-eth: properly handle buffer size restrictions (networking-stable-20_05_16).
- dpaa_eth: fix usage as DSA master, try 3 (networking-stable-20_05_27).
- drivers: base: Fix NULL pointer exception in __platform_driver_probe() if a driver developer is foolish (git-fixes).
- Drivers: hv: Change flag to write log level in panic msg to false (bsc#1170617).
- drivers/net/ibmvnic: Update VNIC protocol version reporting (bsc#1065729).
- drivers: phy: sr-usb: do not use internal fsm for USB2 phy init (git-fixes).
- drivers: soc: ti: knav_qmss_queue: Make knav_gp_range_ops static (git-fixes).
- drm/amd/display: add basic atomic check for cursor plane (git-fixes).
- drm/amd/display: drop cursor position check in atomic test (git-fixes).
- drm: amd/display: fix Kconfig help text (bsc#1152489) * context changes
- drm/amd/display: Only revalidate bandwidth on medium and fast updates (git-fixes).
- drm/amd/display: Prevent dpcd reads with passive dongles (git-fixes).
- drm/amd/display: Revalidate bandwidth before commiting DC updates (git-fixes).
- drm/amd: fix potential memleak in err branch (git-fixes).
- drm/amdgpu: add fw release for sdma v5_0 (git-fixes).
- drm/amdgpu: drop redundant cg/pg ungate on runpm enter (git-fixes).
- drm/amdgpu: fix gfx hang during suspend with video playback (v2) (git-fixes).
- drm/amdgpu: fix the hw hang during perform system reboot and reset (git-fixes).
- drm/amdgpu: force fbdev into vram (bsc#1152472) * context changes
- drm/amdgpu: Init data to avoid oops while reading pp_num_states (git-fixes).
- drm/amdgpu: invalidate L2 before SDMA IBs (v2) (git-fixes).
- drm/amdgpu: move kfd suspend after ip_suspend_phase1 (git-fixes).
- drm/amdgpu: Replace invalid device ID with a valid device ID (bsc#1152472)
- drm/amdgpu: simplify padding calculations (v2) (git-fixes).
- drm/amd/powerpay: Disable gfxoff when setting manual mode on picasso and raven (git-fixes).
- drm/amd/powerplay: avoid using pm_en before it is initialized revised (git-fixes).
- drm/amd/powerplay: perform PG ungate prior to CG ungate (git-fixes).
- drm: bridge: adv7511: Extend list of audio sample rates (git-fixes).
- drm/connector: notify userspace on hotplug after register complete (bsc#1152489) * context changes
- drm/dp_mst: Increase ACT retry timeout to 3s (bsc#1152472) * context changes
- drm/dp_mst: Reformat drm_dp_check_act_status() a bit (git-fixes).
- drm/edid: Add Oculus Rift S to non-desktop list (git-fixes).
- drm: encoder_slave: fix refcouting error for modules (git-fixes).
- drm/etnaviv: fix perfmon domain interation (git-fixes).
- drm/etnaviv: rework perfmon query infrastructure (git-fixes).
- drm/i915: Do not enable WaIncreaseLatencyIPCEnabled when IPC is (bsc#1152489)
- drm/i915: Do not enable WaIncreaseLatencyIPCEnabled when IPC is disabled (git-fixes).
- drm/i915: extend audio CDCLK>=2*BCLK constraint to more platforms (git-fixes).
- drm/i915: Extend WaDisableDARBFClkGating to icl,ehl,tgl (bsc#1152489)
- drm/i915: fix port checks for MST support on gen >= 11 (git-fixes).
- drm/i915/gem: Avoid iterating an empty list (git-fixes).
- drm/i915/gt: Do not schedule normal requests immediately along (bsc#1152489)
- drm/i915/gvt: Fix kernel oops for 3-level ppgtt guest (bsc#1152489)
- drm/i915/gvt: Fix kernel oops for 3-level ppgtt guest (git-fixes).
- drm/i915/gvt: Fix two CFL MMIO handling caused by regression. (bsc#1152489)
- drm/i915/gvt: Fix two CFL MMIO handling caused by regression (git-fixes).
- drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of (bsc#1152489)
- drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of inheritance (git-fixes).
- drm/i915: HDCP: fix Ri prime check done during link check (bsc#1152489) * context changes
- drm/i915: HDCP: fix Ri prime check done during link check (git-fixes).
- drm/i915/icl+: Fix hotplug interrupt disabling after storm detection (bsc#1152489)
- drm/i915: Limit audio CDCLK>=2*BCLK constraint back to GLK only (git-fixes).
- drm/i915: Propagate error from completed fences (git-fixes).
- drm/i915: Whitelist context-local timestamp in the gen9 cmdparser (git-fixes).
- drm/i915: work around false-positive maybe-uninitialized warning (git-fixes).
- drm/mcde: dsi: Fix return value check in mcde_dsi_bind() (git-fixes).
- drm/msm: Check for powered down HW in the devfreq callbacks (bsc#1152489)
- drm/msm/dpu: fix error return code in dpu_encoder_init (bsc#1152489)
- drm/msm/dpu: fix error return code in dpu_encoder_init (git-fixes).
- drm/msm/mdp5: Fix mdp5_init error path for failed mdp5_kms allocation (git-fixes).
- drm/nouveau/disp/gm200-: fix NV_PDISP_SOR_HDMI2_CTRL(n) selection (git-fixes).
- drm/qxl: lost qxl_bo_kunmap_atomic_page in qxl_image_init_helper() (git-fixes).
- drm/qxl: Use correct notify port address when creating cursor ring (bsc#1152472)
- drm/radeon: fix fb_div check in ni_init_smc_spll_table() (bsc#1152472)
- drm: rcar-du: Fix build error (bsc#1152472)
- drm/sun4i: hdmi ddc clk: Fix size of m divider (git-fixes).
- drm: sun4i: hdmi: Remove extra HPD polling (bsc#1152489)
- drm: sun4i: hdmi: Remove extra HPD polling (git-fixes).
- drm/vkms: Hold gem object while still in-use (git-fixes).
- Drop a couple of block layer git-fixes (bsc#1170891 bsc#1173139)
- dwc3: Remove check for HWO flag in dwc3_gadget_ep_reclaim_trb_sg() (git-fixes).
- e1000: Distribute switch variables for initialization (git-fixes).
- e1000e: Disable TSO for buffer overrun workaround (git-fixes).
- e1000e: Do not wake up the system via WOL if device wakeup is disabled (git-fixes).
- e1000e: Relax condition to trigger reset for ME workaround (git-fixes).
- EDAC/amd64: Add PCI device IDs for family 17h, model 70h (bsc#1165975).
- EDAC/ghes: Setup DIMM label from DMI and use it in error reports (bsc#1168779).
- EDAC/skx: Use the mcmtr register to retrieve close_pg/bank_xor_enable (bsc#1152489).
- EDAC/synopsys: Do not dump uninitialized pinf->col (bsc#1152489).
- efi/efivars: Add missing kobject_put() in sysfs entry creation error path (git-fixes).
- efi/random: Treat EFI_RNG_PROTOCOL output as bootloader randomness (jsc#SLE-12424).
- efi: READ_ONCE rng seed size before munmap (jsc#SLE-12424).
- efi/tpm: Verify event log header before parsing (bsc#1173461).
- eventpoll: fix missing wakeup for ovflist in ep_poll_callback (bsc#1159867).
- evm: Check also if *tfm is an error pointer in init_desc() (git-fixes).
- evm: Fix a small race in init_desc() (git-fixes).
- evm: Fix possible memory leak in evm_calc_hmac_or_hash() (git-fixes).
- evm: Fix RCU list related warnings (git-fixes).
- ext4: avoid utf8_strncasecmp() with unstable name (bsc#1173843).
- ext4: fix error pointer dereference (bsc#1173837).
- ext4: fix EXT_MAX_EXTENT/INDEX to check for zeroed eh_max (bsc#1173836).
- ext4: fix partial cluster initialization when splitting extent (bsc#1173839).
- ext4: fix race between ext4_sync_parent() and rename() (bsc#1173838).
- ext4, jbd2: ensure panic by fix a race between jbd2 abort and ext4 error handlers (bsc#1173833).
- ext4: stop overwrite the errcode in ext4_setup_super (bsc#1173841).
- extcon: adc-jack: Fix an error handling path in 'adc_jack_probe()' (git-fixes).
- fanotify: fix ignore mask logic for events on child and on dir (bsc#1172719).
- fat: do not allow to mount if the FAT length == 0 (bsc#1173831).
- fdt: add support for rng-seed (jsc#SLE-12424).
- fdt: Update CRC check for rng-seed (jsc#SLE-12424).
- firmware: imx: scu: Fix corruption of header (git-fixes).
- firmware: imx: scu: Fix possible memory leak in imx_scu_probe() (git-fixes).
- firmware: imx-scu: Support one TX and one RX (git-fixes).
- firmware: imx: warn on unexpected RX (git-fixes).
- firmware: qcom_scm: fix bogous abuse of dma-direct internals (git-fixes).
- firmware: xilinx: Fix an error handling path in 'zynqmp_firmware_probe()' (git-fixes).
- Fix a regression of AF_ALG crypto interface hang with aes_s390 (bsc#1167651)
- Fix boot crash with MD (bsc#1173860)
- fix multiplication overflow in copy_fdtable() (bsc#1173825).
- fork: prevent accidental access to clone3 features (bsc#1174018).
- fpga: dfl: afu: Corrected error handling levels (git-fixes).
- fq_codel: fix TCA_FQ_CODEL_DROP_BATCH_SIZE sanity checks (networking-stable-20_05_12).
- fs: Do not check if there is a fsnotify watcher on pseudo inodes (bsc#1158765).
- fsnotify: Rearrange fast path to minimise overhead when there is no watcher (bsc#1158765).
- genetlink: clean up family attributes allocations (git-fixes).
- genetlink: fix memory leaks in genl_family_rcv_msg_dumpit() (bsc#1154353).
- geneve: allow changing DF behavior after creation (git-fixes).
- geneve: change from tx_error to tx_dropped on missing metadata (git-fixes).
- gfs2: fix glock reference problem in gfs2_trans_remove_revoke (bsc#1173823).
- gfs2: Multi-block allocations in gfs2_page_mkwrite (bsc#1173822).
- gpio: bcm-kona: Fix return value of bcm_kona_gpio_probe() (git-fixes).
- gpio: dwapb: Append MODULE_ALIAS for platform driver (git-fixes).
- gpio: dwapb: Call acpi_gpiochip_free_interrupts() on GPIO chip de-registration (git-fixes).
- gpio: exar: Fix bad handling for ida_simple_get error path (git-fixes).
- gpiolib: Document that GPIO line names are not globally unique (git-fixes).
- gpio: pca953x: fix handling of automatic address incrementing (git-fixes).
- gpio: pca953x: Fix pca953x_gpio_set_config (git-fixes).
- gpio: pxa: Fix return value of pxa_gpio_probe() (git-fixes).
- gpio: tegra: mask GPIO IRQs during IRQ shutdown (git-fixes).
- gpu/drm: Ingenic: Fix opaque pointer casted to wrong type (git-fixes).
- habanalabs: Align protection bits configuration of all TPCs (git-fixes).
- HID: Add quirks for Trust Panora Graphic Tablet (git-fixes).
- HID: alps: Add AUI1657 device ID (git-fixes).
- HID: alps: ALPS_1657 is too specific; use U1_UNICORN_LEGACY instead (git-fixes).
- HID: i2c-hid: add Schneider SCL142ALM to descriptor override (git-fixes).
- HID: i2c-hid: reset Synaptics SYNA2393 on resume (git-fixes).
- HID: intel-ish-hid: avoid bogus uninitialized-variable warning (git-fixes).
- HID: multitouch: add eGalaxTouch P80H84 support (git-fixes).
- HID: multitouch: enable multi-input as a quirk for some devices (git-fixes).
- HID: quirks: Add HID_QUIRK_NO_INIT_REPORTS quirk for Dell K12A keyboard-dock (git-fixes).
- HID: sony: Fix for broken buttons on DS3 USB dongles (git-fixes).
- hinic: fix a bug of ndo_stop (networking-stable-20_05_16).
- hinic: fix wrong para of wait_for_completion_timeout (networking-stable-20_05_16).
- hsr: check protocol version in hsr_newlink() (networking-stable-20_04_17).
- hv_netvsc: Fix netvsc_start_xmit's return type (git-fixes).
- hwmon: (acpi_power_meter) Fix potential memory leak in acpi_power_meter_add() (git-fixes).
- hwmon: (k10temp) Add AMD family 17h model 60h PCI match (git-fixes).
- hwmon: (max6697) Make sure the OVERT mask is set correctly (git-fixes).
- hwmon: (pmbus) fix a typo in Kconfig SENSORS_IR35221 option (git-fixes).
- i2c: acpi: put device when verifying client fails (git-fixes).
- i2c: algo-pca: Add 0x78 as SCL stuck low status for PCA9665 (git-fixes).
- i2c: altera: Fix race between xfer_msg and isr thread (git-fixes).
- i2c: core: check returned size of emulated smbus block read (git-fixes).
- i2c: designware-pci: Add support for Elkhart Lake PSE I2C (jsc#SLE-12734).
- i2c: designware-pci: Fix BUG_ON during device removal (jsc#SLE-12734).
- i2c: designware-pci: Switch over to MSI interrupts (jsc#SLE-12734).
- i2c: dev: Fix the race between the release of i2c_dev and cdev (git-fixes).
- i2c: fix missing pm_runtime_put_sync in i2c_device_probe (git-fixes).
- i2c: fsi: Fix the port number field in status register (git-fixes).
- i2c: mlxcpld: check correct size of maximum RECV_LEN packet (git-fixes).
- i2c: mux: demux-pinctrl: Fix an error handling path in 'i2c_demux_pinctrl_probe()' (git-fixes).
- i2c: piix4: Detect secondary SMBus controller on AMD AM4 chipsets (git-fixes).
- i2c: pxa: clear all master action bits in i2c_pxa_stop_message() (git-fixes).
- i2c: pxa: fix i2c_pxa_scream_blue_murder() debug output (git-fixes).
- ibmveth: Fix max MTU limit (bsc#1173428 ltc#186397).
- ibmvnic: continue to init in CRQ reset returns H_CLOSED (bsc#1173280 ltc#185369).
- ibmvnic: Flush existing work items before device removal (bsc#1065729).
- ibmvnic: Harden device login requests (bsc#1170011 ltc#183538).
- IB/rdmavt: Free kernel completion queue when done (bsc#1173625).
- ice: Fix error return code in ice_add_prof() (jsc#SLE-7926).
- ice: Fix inability to set channels when down (jsc#SLE-7926).
- ieee80211: Fix incorrect mask for default PE duration (git-fixes).
- iio: adc: stm32-adc: fix device used to request dma (git-fixes).
- iio: adc: stm32-adc: Use dma_request_chan() instead dma_request_slave_channel() (git-fixes).
- iio: adc: stm32-dfsdm: fix device used to request dma (git-fixes).
- iio: adc: stm32-dfsdm: Use dma_request_chan() instead dma_request_slave_channel() (git-fixes).
- iio: adc: ti-ads8344: Fix channel selection (git-fixes).
- iio: bmp280: fix compensation of humidity (git-fixes).
- iio: buffer: Do not allow buffers without any channels enabled to be activated (git-fixes).
- iio:chemical:pms7003: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:chemical:sps30: Fix timestamp alignment (git-fixes).
- iio: dac: vf610: Fix an error handling path in 'vf610_dac_probe()' (git-fixes).
- iio: pressure: bmp280: Tolerate IRQ before registering (git-fixes).
- iio: sca3000: Remove an erroneous 'get_device()' (git-fixes).
- iio: vcnl4000: Fix i2c swapped word reading (git-fixes).
- ima: Call ima_calc_boot_aggregate() in ima_eventdigest_init() (bsc#1172223).
- ima: Directly assign the ima_default_policy pointer to ima_rules (bsc#1172223) Delete obsoleted downstream fix
- ima: Directly free *entry in ima_alloc_init_template() if digests is NULL (bsc#1172223).
- ima: Remove __init annotation from ima_pcrread() (git-fixes).
- include/asm-generic/topology.h: guard cpumask_of_node() macro argument (bsc#1148868).
- Input: dlink-dir685-touchkeys - fix a typo in driver name (git-fixes).
- Input: edt-ft5x06 - fix get_default register write access (git-fixes).
- Input: evdev - call input_flush_device() on release(), not flush() (git-fixes).
- Input: i8042 - add ThinkPad S230u to i8042 reset list (git-fixes).
- input: i8042 - Remove special PowerPC handling (git-fixes).
- Input: mms114 - fix handling of mms345l (git-fixes).
- Input: synaptics - add a second working PNP_ID for Lenovo T470s (git-fixes).
- Input: synaptics-rmi4 - fix error return code in rmi_driver_probe() (git-fixes).
- Input: synaptics-rmi4 - really fix attn_data use-after-free (git-fixes).
- Input: usbtouchscreen - add support for BonXeon TP (git-fixes).
- Input: xpad - add custom init packet for Xbox One S controllers (git-fixes).
- iocost: check active_list of all the ancestors in iocg_activate() (bsc#1173206).
- iocost: do not let vrate run wild while there's no saturation signal (bsc1173206).
- iocost: over-budget forced IOs should schedule async delay (bsc#1173206).
- iommu/amd: Call domain_flush_complete() in update_domain() (bsc#1172061).
- iommu/amd: Do not flush Device Table in iommu_map_page() (bsc#1172062).
- iommu/amd: Do not loop forever when trying to increase address space (bsc#1172063).
- iommu/amd: Fix legacy interrupt remapping for x2APIC-enabled system (bsc#1172393).
- iommu/amd: Fix over-read of ACPI UID from IVRS table (bsc#1172064).
- iommu/amd: Fix race in increase_address_space()/fetch_pte() (bsc#1172065).
- iommu/amd: Update Device Table in increase_address_space() (bsc#1172066).
- iommu: Fix reference count leak in iommu_group_alloc (bsc#1172394).
- iommu/qcom: Fix local_base status check (bsc#1172067).
- iommu/virtio: Reverse arguments to list_add (bsc#1172068).
- ionic: add pcie_print_link_status (bsc#1167773).
- ionic: export features for vlans to use (bsc#1167773).
- ionic: no link check while resetting queues (bsc#1167773).
- ionic: remove support for mgmt device (bsc#1167773).
- ionic: tame the watchdog timer on reconfig (bsc#1167773).
- ionic: wait on queue start until after IFF_UP (bsc#1167773).
- io_uring: use kvfree() in io_sqe_buffer_register() (bsc#1173832).
- ipmi: use vzalloc instead of kmalloc for user creation (git-fixes).
- ipv4: Update fib_select_default to handle nexthop objects (networking-stable-20_04_27).
- ipv6: fix IPV6_ADDRFORM operation logic (bsc#1171662).
- ipvs: Improve robustness to the ipvs sysctl (git-fixes).
- irqchip/al-fic: Add support for irq retrigger (jsc#SLE-10505).
- irqchip/ti-sci-inta: Fix processing of masked irqs (git-fixes).
- irqchip/versatile-fpga: Apply clear-mask earlier (git-fixes).
- irqchip/versatile-fpga: Handle chained IRQs properly (git-fixes).
- iwlwifi: avoid debug max amsdu config overwriting itself (git-fixes).
- iwlwifi: mvm: fix aux station leak (git-fixes).
- iwlwifi: mvm: limit maximum queue appropriately (git-fixes).
- iwlwifi: pcie: handle QuZ configs with killer NICs as well (bsc#1172374).
- ixgbe: do not check firmware errors (bsc#1170284).
- jbd2: avoid leaking transaction credits when unreserving handle (bsc#1173845).
- jbd2: fix data races at struct journal_head (bsc#1173438).
- jbd2: Preserve kABI when adding j_abort_mutex (bsc#1173833).
- kABI fixup mtk-vpu: avoid unaligned access to DTCM buffer (git-fixes).
- kabi: hv: prevent struct device_node to become defined (bsc#1172871).
- kabi: ppc64le: prevent struct dma_map_ops to become defined (jsc#SLE-12424).
- kABI: protect struct fib_dump_filter (kabi).
- kABI: protect struct mlx5_cmd_work_ent (kabi).
- kabi/severities: Ingnore get_dev_data() The function is internal to the AMD IOMMU driver and must not be called by any third party.
- kABI workaround for struct hdac_bus changes (git-fixes).
- ktest: Add timeout for ssh sync testing (git-fixes).
- KVM: Check validity of resolved slot when searching memslots (bsc#1172069).
- KVM: x86/mmu: Set mmio_value to '0' if reserved #PF can't be generated (bsc#1171904).
- KVM: x86: only do L1TF workaround on affected processors (bsc#1171904).
- l2tp: Allow management of tunnels and session in user namespace (networking-stable-20_04_17).
- libbpf: Fix perf_buffer__free() API for sparse allocs (bsc#1155518).
- libceph: do not omit recovery_deletes in target_copy() (git-fixes).
- libceph: ignore pool overlay and cache logic on redirects (bsc#1172938).
- lib: devres: add a helper function for ioremap_uc (git-fixes).
- libertas_tf: avoid a null dereference in pointer priv (git-fixes).
- lib/lzo: fix ambiguous encoding bug in lzo-rle (git-fixes).
- libnvdimm/btt: fix variable 'rc' set but not used (bsc#1162400).
- libnvdimm: cover up nd_pfn_sb changes (bsc#1171759).
- libnvdimm: cover up nd_region changes (bsc#1162400).
- libnvdimm/dax: Pick the right alignment default when creating dax devices (bsc#1171759).
- libnvdimm/label: Remove the dpa align check (bsc#1171759).
- libnvdimm/namespace: Enforce memremap_compat_align() (bsc#1162400).
- libnvdimm/namsepace: Do not set claim_class on error (bsc#1162400).
- libnvdimm/of_pmem: Provide a unique name for bus provider (bsc#1171739).
- libnvdimm: Out of bounds read in __nd_ioctl() (bsc#1065729).
- libnvdimm/pfn_dev: Add a build check to make sure we notice when struct page size change (bsc#1171743).
- libnvdimm/pfn_dev: Add page size and struct page size to pfn superblock (bsc#1171759).
- libnvdimm/pfn: Prevent raw mode fallback if pfn-infoblock valid (bsc#1171743).
- libnvdimm/pmem: Advance namespace seed for specific probe errors (bsc#1171743).
- libnvdimm/region: Fix build error (bsc#1162400).
- libnvdimm/region: Introduce an 'align' attribute (bsc#1162400).
- libnvdimm/region: Introduce NDD_LABELING (bsc#1162400).
- libnvdimm/region: Rewrite _probe_success() to _advance_seeds() (bsc#1171743).
- libnvdimm: Use PAGE_SIZE instead of SZ_4K for align check (bsc#1171759).
- lib: Uplevel the pmem 'region' ida to a global allocator (bc#1162400).
- list: Add hlist_unhashed_lockless() (bsc#1173438).
- livepatch: Apply vmlinux-specific KLP relocations early (bsc#1071995).
- livepatch: Disallow vmlinux.ko (bsc#1071995).
- livepatch: Make klp_apply_object_relocs static (bsc#1071995).
- livepatch: Prevent module-specific KLP rela sections from referencing vmlinux symbols (bsc#1071995).
- livepatch: Remove .klp.arch (bsc#1071995).
- locktorture: Allow CPU-hotplug to be disabled via --bootargs (bsc#1173068).
- loop: replace kill_bdev with invalidate_bdev (bsc#1173820).
- lpfc_debugfs: get rid of pointless access_ok() (bsc#1171530).
- lpfc: fix axchg pointer reference after free and double frees (bsc#1171530).
- lpfc: Fix pointer checks and comments in LS receive refactoring (bsc#1171530).
- lpfc: Fix return value in __lpfc_nvme_ls_abort (bsc#1171530).
- lpfc: Synchronize NVME transport and lpfc driver devloss_tmo (bcs#1173060).
- mac80211: mesh: fix discovery timer re-arming issue / crash (git-fixes).
- mailbox: zynqmp-ipi: Fix NULL vs IS_ERR() check in zynqmp_ipi_mbox_probe() (git-fixes).
- Make the 'Reducing compressed framebufer size' message be DRM_INFO_ONCE() (git-fixes).
- mdraid: fix read/write bytes accounting (bsc#1172537).
- media: cedrus: Program output format during each run (git-fixes).
- media: dvbdev: Fix tuner->demod media controller link (git-fixes).
- media: dvb: return -EREMOTEIO on i2c transfer failure (git-fixes).
- media: dvbsky: add support for eyeTV Geniatech T2 lite (bsc#1173776).
- media: dvbsky: add support for Mygica T230C v2 (bsc#1173776).
- media: imx: imx7-mipi-csis: Cleanup and fix subdev pad format handling (git-fixes).
- media: mtk-vpu: avoid unaligned access to DTCM buffer (git-fixes).
- media: ov5640: fix use of destroyed mutex (git-fixes).
- media: platform: fcp: Set appropriate DMA parameters (git-fixes).
- media: Revert 'staging: imgu: Address a compiler warning on alignment' (git-fixes).
- media: si2157: Better check for running tuner in init (git-fixes).
- media: si2168: add support for Mygica T230C v2 (bsc#1173776).
- media: staging: imgu: do not hold spinlock during freeing mmu page table (git-fixes).
- media: staging/intel-ipu3: Implement lock for stream on/off operations (git-fixes).
- media: staging: ipu3: Fix stale list entries on parameter queue failure (git-fixes).
- media: staging: ipu3-imgu: Move alignment attribute to field (git-fixes).
- media: vicodec: Fix error codes in probe function (git-fixes).
- mei: release me_cl object reference (git-fixes).
- mfd: intel-lpss: Add Intel Tiger Lake PCI IDs (jsc#SLE-12737).
- mfd: intel-lpss: Use devm_ioremap_uc for MMIO (git-fixes).
- mfd: stmfx: Fix stmfx_irq_init error path (git-fixes).
- mfd: stmfx: Reset chip on resume as supply was disabled (git-fixes).
- mfd: wm8994: Fix driver operation if loaded as modules (git-fixes).
- misc: fastrpc: fix potential fastrpc_invoke_ctx leak (git-fixes).
- misc: rtsx: Add short delay after exit from ASPM (git-fixes).
- mlxsw: Fix some IS_ERR() vs NULL bugs (networking-stable-20_04_27).
- mlxsw: spectrum_acl_tcam: Position vchunk in a vregion list properly (networking-stable-20_05_12).
- mm: adjust vm_committed_as_batch according to vm overcommit policy (bnc#1173271).
- mmc: block: Fix use-after-free issue for rpmb (git-fixes).
- mmc: core: Use DEFINE_DEBUGFS_ATTRIBUTE instead of DEFINE_SIMPLE_ATTRIBUTE (git-fixes).
- mmc: fix compilation of user API (git-fixes).
- mmc: meson-mx-sdio: trigger a soft reset after a timeout or CRC error (git-fixes).
- mmc: mmci_sdmmc: fix DMA API warning overlapping mappings (git-fixes).
- mmc: sdhci-esdhc-imx: fix the mask for tuning start point (git-fixes).
- mmc: sdhci-msm: Clear tuning done flag while hs400 tuning (git-fixes).
- mmc: sdhci-msm: Set SDHCI_QUIRK_MULTIBLOCK_READ_ACMD12 quirk (git-fixes).
- mmc: sdio: Fix potential NULL pointer error in mmc_sdio_init_card() (git-fixes).
- mmc: sdio: Fix several potential memory leaks in mmc_sdio_init_card() (git-fixes).
- mmc: tmio: Further fixup runtime PM management at remove (git-fixes).
- mmc: uniphier-sd: call devm_request_irq() after tmio_mmc_host_probe() (git-fixes).
- mmc: via-sdmmc: Respect the cmd->busy_timeout from the mmc core (git-fixes).
- mm: do not prepare anon_vma if vma has VM_WIPEONFORK (bsc#1169681).
- mm: fix NUMA node file count error in replace_page_cache() (bsc#1173844).
- mm: memcontrol: fix memory.low proportional distribution (bsc#1168230).
- mm/memory_hotplug: refrain from adding memory into an impossible node (bsc#1173552).
- mm/memremap: drop unused SECTION_SIZE and SECTION_MASK (bsc#1162400 bsc#1170895 ltc#184375 ltc#185686).
- mm/memremap_pages: Introduce memremap_compat_align() (bsc#1162400).
- mm/memremap_pages: Kill unused __devm_memremap_pages() (bsc#1162400).
- mm/util.c: make vm_memory_committed() more accurate (bnc#1173271).
- Move an upstreamed sound patch into sorted section
- Move upstreamed IMA patches into sorted section
- mt76: mt76x02u: Add support for newer versions of the XBox One wifi adapter (git-fixes).
- mtd: Fix mtd not registered due to nvmem name collision (git-fixes).
- mtd: rawnand: brcmnand: correctly verify erased pages (git-fixes).
- mtd: rawnand: brcmnand: fix CS0 layout (git-fixes).
- mtd: rawnand: brcmnand: fix hamming oob layout (git-fixes).
- mtd: rawnand: diskonchip: Fix the probe error path (git-fixes).
- mtd: rawnand: Fix nand_gpio_waitrdy() (git-fixes).
- mtd: rawnand: ingenic: Fix the probe error path (git-fixes).
- mtd: rawnand: marvell: Fix probe error path (git-fixes).
- mtd: rawnand: marvell: Fix the condition on a return code (git-fixes).
- mtd: rawnand: marvell: Use nand_cleanup() when the device is not yet registered (git-fixes).
- mtd: rawnand: mtk: Fix the probe error path (git-fixes).
- mtd: rawnand: onfi: Fix redundancy detection check (git-fixes).
- mtd: rawnand: orion: Fix the probe error path (git-fixes).
- mtd: rawnand: oxnas: Keep track of registered devices (git-fixes).
- mtd: rawnand: oxnas: Release all devices in the _remove() path (git-fixes).
- mtd: rawnand: pasemi: Fix the probe error path (git-fixes).
- mtd: rawnand: plat_nand: Fix the probe error path (git-fixes).
- mtd: rawnand: sharpsl: Fix the probe error path (git-fixes).
- mtd: rawnand: socrates: Fix the probe error path (git-fixes).
- mtd: rawnand: sunxi: Fix the probe error path (git-fixes).
- mtd: rawnand: timings: Fix default tR_max and tCCS_min timings (git-fixes).
- mtd: rawnand: tmio: Fix the probe error path (git-fixes).
- mtd: rawnand: xway: Fix the probe error path (git-fixes).
- mtd: spinand: Propagate ECC information to the MTD structure (git-fixes).
- mtd: spi-nor: intel-spi: Add support for Intel Tiger Lake SPI serial flash (jsc#SLE-12737).
- mvpp2: remove module bugfix (bsc#1154353).
- mwifiex: avoid -Wstringop-overflow warning (git-fixes).
- mwifiex: Fix memory corruption in dump_station (git-fixes).
- namei: only return -ECHILD from follow_dotdot_rcu() (bsc#1173824).
- neigh: send protocol value in neighbor create notification (networking-stable-20_05_12).
- net: bcmgenet: correct per TX/RX ring statistics (networking-stable-20_04_27).
- net: core: device_rename: Use rwsem instead of a seqcount (bsc#1162702).
- net: do not return invalid table id error when we fall back to PF_UNSPEC (networking-stable-20_05_27).
- net: dsa: b53: b53_arl_rw_op() needs to select IVL or SVL (networking-stable-20_04_27).
- net: dsa: b53: Fix ARL register definitions (networking-stable-20_04_27).
- net: dsa: b53: Lookup VID in ARL searches when VLAN is enabled (networking-stable-20_04_27).
- net: dsa: b53: Rework ARL bin logic (networking-stable-20_04_27).
- net: dsa: declare lockless TX feature for slave ports (bsc#1154353).
- net: dsa: Do not leave DSA master with NULL netdev_ops (networking-stable-20_05_12).
- net: dsa: loop: Add module soft dependency (networking-stable-20_05_16).
- net: dsa: mt7530: fix roaming from DSA user ports (networking-stable-20_05_27).
- net: dsa: mt7530: fix tagged frames pass-through in VLAN-unaware mode (networking-stable-20_04_17).
- net: ena: xdp: update napi budget for DROP and ABORTED (bsc#1154492).
- net: ena: xdp: XDP_TX: fix memory leak (bsc#1154492).
- net: ethernet: ti: cpsw: fix ASSERT_RTNL() warning during suspend (networking-stable-20_05_27).
- netfilter: connlabels: prefer static lock initialiser (git-fixes).
- netfilter: nf_queue: enqueue skbs with NULL dst (git-fixes).
- netfilter: nf_tables_offload: return EOPNOTSUPP if rule specifies no actions (git-fixes).
- netfilter: nft_tproxy: Fix port selector on Big Endian (git-fixes).
- netfilter: nft_tunnel: add the missing ERSPAN_VERSION nla_policy (git-fixes).
- netfilter: not mark a spinlock as __read_mostly (git-fixes).
- net: fix a potential recursive NETDEV_FEAT_CHANGE (networking-stable-20_05_16).
- __netif_receive_skb_core: pass skb by reference (networking-stable-20_05_27).
- net: inet_csk: Fix so_reuseport bind-address cache in tb->fast* (networking-stable-20_05_27).
- net: ipip: fix wrong address family in init error path (networking-stable-20_05_27).
- net: ipv4: devinet: Fix crash when add/del multicast IP with autojoin (networking-stable-20_04_17).
- net: ipv6: do not consider routes via gateways for anycast address check (networking-stable-20_04_17).
- net: macb: fix an issue about leak related system resources (networking-stable-20_05_12).
- net: macsec: preserve ingress frame ordering (networking-stable-20_05_12).
- net/mlx4_core: Fix use of ENOSPC around mlx4_counter_alloc() (networking-stable-20_05_12).
- net/mlx4_en: avoid indirect call in TX completion (networking-stable-20_04_27).
- net/mlx5: Add command entry handling completion (networking-stable-20_05_27).
- net/mlx5: Disable reload while removing the device (jsc#SLE-8464).
- net/mlx5: DR, Fix freeing in dr_create_rc_qp() (jsc#SLE-8464).
- net/mlx5e: Add missing release firmware call (networking-stable-20_04_17).
- net/mlx5e: Fix inner tirs handling (networking-stable-20_05_27).
- net/mlx5e: Fix pfnum in devlink port attribute (networking-stable-20_04_17).
- net/mlx5e: Fix stats update for matchall classifier (jsc#SLE-8464).
- net/mlx5e: kTLS, Destroy key object after destroying the TIS (networking-stable-20_05_27).
- net/mlx5e: replace EINVAL in mlx5e_flower_parse_meta() (jsc#SLE-8464).
- net/mlx5e: Update netdev txq on completions during closure (networking-stable-20_05_27).
- net/mlx5: Fix cleaning unmanaged flow tables (jsc#SLE-8464).
- net/mlx5: Fix command entry leak in Internal Error State (networking-stable-20_05_12).
- net/mlx5: Fix crash upon suspend/resume (bsc#1172365).
- net/mlx5: Fix error flow in case of function_setup failure (networking-stable-20_05_27).
- net/mlx5: Fix forced completion access non initialized command entry (networking-stable-20_05_12).
- net/mlx5: Fix frequent ioread PCI access during recovery (networking-stable-20_04_17).
- net/mlx5: Fix memory leak in mlx5_events_init (networking-stable-20_05_27).
- net: mvpp2: cls: Prevent buffer overflow in mvpp2_ethtool_cls_rule_del() (networking-stable-20_05_12).
- net: mvpp2: fix RX hashing for non-10G ports (networking-stable-20_05_27).
- net: mvpp2: prevent buffer overflow in mvpp22_rss_ctx() (networking-stable-20_05_12).
- net: netrom: Fix potential nr_neigh refcnt leak in nr_add_node (networking-stable-20_04_27).
- net: nlmsg_cancel() if put fails for nhmsg (networking-stable-20_05_27).
- net: openvswitch: ovs_ct_exit to be done under ovs_lock (networking-stable-20_04_27).
- net: phy: fix aneg restart in phy_ethtool_set_eee (networking-stable-20_05_16).
- net: phy: propagate an error back to the callers of phy_sfp_probe (bsc#1154353).
- netprio_cgroup: Fix unlimited memory leak of v2 cgroups (networking-stable-20_05_16).
- net: qrtr: Fix passing invalid reference to qrtr_local_enqueue() (networking-stable-20_05_27).
- net: qrtr: send msgs from local of same id as broadcast (networking-stable-20_04_17).
- net: revert default NAPI poll timeout to 2 jiffies (networking-stable-20_04_17).
- net: revert 'net: get rid of an signed integer overflow in ip_idents_reserve()' (bnc#1158748 (network regression)).
- net sched: fix reporting the first-time use timestamp (networking-stable-20_05_27).
- net_sched: sch_skbprio: add message validation to skbprio_change() (networking-stable-20_05_12).
- net/smc: tolerate future SMCD versions (bsc#1172543 LTC#186069).
- net: stmmac: fix num_por initialization (networking-stable-20_05_16).
- net: stricter validation of untrusted gso packets (networking-stable-20_05_12).
- net: tc35815: Fix phydev supported/advertising mask (networking-stable-20_05_12).
- net: tcp: fix rx timestamp behavior for tcp_recvmsg (networking-stable-20_05_16).
- net/tls: fix race condition causing kernel panic (networking-stable-20_05_27).
- net/tls: Fix sk_psock refcnt leak in bpf_exec_tx_verdict() (networking-stable-20_05_12).
- net/tls: Fix sk_psock refcnt leak when in tls_data_ready() (networking-stable-20_05_12).
- net: tun: record RX queue in skb before do_xdp_generic() (networking-stable-20_04_17).
- net: usb: qmi_wwan: add support for DW5816e (networking-stable-20_05_12).
- net: vmxnet3: fix possible buffer overflow caused by bad DMA value in vmxnet3_get_rss() (bsc#1172484).
- net/x25: Fix x25_neigh refcnt leak when receiving frame (networking-stable-20_04_27).
- nexthop: Fix attribute checking for groups (networking-stable-20_05_27).
- NFC: st21nfca: add missed kfree_skb() in an error path (git-fixes).
- nfp: abm: fix a memory leak bug (networking-stable-20_05_12).
- nfp: abm: fix error return code in nfp_abm_vnic_alloc() (networking-stable-20_05_16).
- nfs: add minor version to nfs_server_key for fscache (bsc#1172467).
- nfsd4: fix nfsdfs reference count loop (git-fixes).
- nfsd4: make drc_slab global, not per-net (git-fixes).
- nfsd: always check return value of find_any_file (bsc#1172208).
- nfsd: apply umask on fs without ACL support (git-fixes).
- nfsd: fix nfsdfs inode reference count leak (git-fixes).
- NFS: Fix fscache super_cookie index_key from changing after umount (git-fixes).
- nfs: fix NULL deference in nfs4_get_valid_delegation.
- nfs: fscache: use timespec64 in inode auxdata (git-fixes).
- nfs: set invalid blocks after NFSv4 writes (git-fixes).
- NFSv4.1 fix rpc_call_done assignment for BIND_CONN_TO_SESSION (git-fixes).
- NFSv4 fix CLOSE not waiting for direct IO compeletion (git-fixes).
- NFSv4: Fix fscache cookie aux_data to ensure change_attr is included (git-fixes).
- ntb: intel: add hw workaround for NTB BAR alignment (jsc#SLE-12710).
- ntb: intel: Add Icelake (gen4) support for Intel NTB (jsc#SLE-12710).
- ntb: intel: fix static declaration (jsc#SLE-12710).
- nvdimm: Avoid race between probe and reading device attributes (bsc#1170442).
- nvme-fc: avoid gcc-10 zero-length-bounds warning (bsc#1173206).
- nvme-fc: do not call nvme_cleanup_cmd() for AENs (bsc#1171688).
- nvme-fc: print proper nvme-fc devloss_tmo value (bsc#1172391).
- objtool: Allow no-op CFI ops in alternatives (bsc#1169514).
- objtool: Clean instruction state before each function validation (bsc#1169514).
- objtool: Fix !CFI insn_state propagation (bsc#1169514).
- objtool: Fix ORC vs alternatives (bsc#1169514).
- objtool: Ignore empty alternatives (bsc#1169514).
- objtool: Remove check preventing branches within alternative (bsc#1169514).
- objtool: Rename struct cfi_state (bsc#1169514).
- objtool: Uniquely identify alternative instruction groups (bsc#1169514).
- p54usb: add AirVasT USB stick device-id (git-fixes).
- panic: do not print uninitialized taint_flags (bsc#1172814).
- PCI: aardvark: Do not blindly enable ASPM L0s and do not write to read-only register (git-fixes).
- PCI: Add ACS quirk for Intel Root Complex Integrated Endpoints (git-fixes).
- PCI: Add Loongson vendor ID (git-fixes).
- PCI: Allow pci_resize_resource() for devices on root bus (git-fixes).
- PCI: amlogic: meson: Do not use FAST_LINK_MODE to set up link (git-fixes).
- PCI/ASPM: Allow ASPM on links to PCIe-to-PCI/PCI-X Bridges (git-fixes).
- PCI: Avoid FLR for AMD Matisse HD Audio & USB 3.0 (git-fixes).
- PCI: Avoid FLR for AMD Starship USB 3.0 (git-fixes).
- PCI: brcmstb: Assert fundamental reset on initialization (git-fixes).
- PCI: brcmstb: Assert fundamental reset on initialization (git-fixes).
- PCI: brcmstb: Fix window register offset from 4 to 8 (git-fixes).
- PCI: brcmstb: Fix window register offset from 4 to 8 (git-fixes).
- PCI: Do not disable decoding when mmio_always_on is set (git-fixes).
- PCI: dwc: Fix inner MSI IRQ domain registration (git-fixes).
- pcie: mobiveil: remove patchset v9 Prepare to backport upstream version.
- PCI: Fix pci_register_host_bridge() device_register() error handling (git-fixes).
- PCI: hv: Change pci_protocol_version to per-hbus (bsc#1172871).
- PCI: hv: Decouple the func definition in hv_dr_state from VSP message (bsc#1172871).
- PCI: hv: Fix the PCI HyperV probe failure path to release resource properly (bsc#1172871).
- PCI: hv: Introduce hv_msi_entry (bsc#1172871).
- PCI: hv: Move hypercall related definitions into tlfs header (bsc#1172871).
- PCI: hv: Move retarget related structures into tlfs header (bsc#1172871).
- PCI: hv: Reorganize the code in preparation of hibernation (bsc#1172871).
- PCI: hv: Retry PCI bus D0 entry on invalid device state (bsc#1172871).
- PCI: mobiveil: Add 8-bit and 16-bit CSR register accessors (bsc#1161495).
- PCI: mobiveil: Add callback function for interrupt initialization (bsc#1161495).
- PCI: mobiveil: Add callback function for link up check (bsc#1161495).
- PCI: mobiveil: Add Header Type field check (bsc#1161495).
- PCI: mobiveil: Add PCIe Gen4 RC driver for Layerscape SoCs (bsc#1161495).
- PCI: mobiveil: Allow mobiveil_host_init() to be used to re-init host (bsc#1161495).
- PCI: mobiveil: Collect the interrupt related operations into a function (bsc#1161495).
- PCI: mobiveil: Fix sparse different address space warnings (bsc#1161495).
- PCI: mobiveil: Fix unmet dependency warning for PCIE_MOBIVEIL_PLAT (bsc#1161495).
- PCI: mobiveil: Introduce a new structure mobiveil_root_port (bsc#1161495).
- PCI: mobiveil: ls_pcie_g4: add Workaround for A-011451 (bsc#1161495).
- PCI: mobiveil: ls_pcie_g4: add Workaround for A-011577 (bsc#1161495).
- PCI: mobiveil: ls_pcie_g4: fix SError when accessing config space (bsc#1161495).
- PCI: mobiveil: Modularize the Mobiveil PCIe Host Bridge IP driver (bsc#1161495).
- PCI: mobiveil: Move the host initialization into a function (bsc#1161495).
- PCI: pci-bridge-emul: Fix PCIe bit conflicts (git-fixes).
- PCI/PM: Adjust pcie_wait_for_link_delay() for caller delay (git-fixes).
- PCI/PM: Call .bridge_d3() hook only if non-NULL (git-fixes).
- PCI: Program MPS for RCiEP devices (git-fixes).
- PCI/PTM: Inherit Switch Downstream Port PTM settings from Upstream Port (git-fixes).
- PCI: rcar: Fix incorrect programming of OB windows (git-fixes).
- PCI: v3-semi: Fix a memory leak in v3_pci_probe() error handling paths (git-fixes).
- PCI: vmd: Add device id for VMD device 8086:9A0B (git-fixes).
- PCI: vmd: Filter resource type bits from shadow register (git-fixes).
- pcm_native: result of put_user() needs to be checked (git-fixes).
- perf/core: Fix endless multiplex timer (git-fixes).
- perf/core: fix parent pid/tid in task exit events (git-fixes).
- pinctrl: freescale: imx: Fix an error handling path in 'imx_pinctrl_probe()' (git-fixes).
- pinctrl: freescale: imx: Use 'devm_of_iomap()' to avoid a resource leak in case of error in 'imx_pinctrl_probe()' (git-fixes).
- pinctrl: imxl: Fix an error handling path in 'imx1_pinctrl_core_probe()' (git-fixes).
- pinctrl: intel: Add Intel Tiger Lake pin controller support (jsc#SLE-12737).
- pinctrl: ocelot: Fix GPIO interrupt decoding on Jaguar2 (git-fixes).
- pinctrl: rockchip: fix memleak in rockchip_dt_node_to_map (git-fixes).
- pinctrl: rza1: Fix wrong array assignment of rza1l_swio_entries (git-fixes).
- pinctrl: samsung: Correct setting of eint wakeup mask on s5pv210 (git-fixes).
- pinctrl: samsung: Save/restore eint_mask over suspend for EINT_TYPE GPIOs (git-fixes).
- pinctrl: sprd: Fix the incorrect pull-up definition (git-fixes).
- pinctrl: stmfx: stmfx_pinconf_set does not require to get direction anymore (git-fixes).
- pinctrl: tegra: Use noirq suspend/resume callbacks (git-fixes).
- pinctrl: tigerlake: Tiger Lake uses _HID enumeration (jsc#SLE-12737).
- platform/x86: asus-nb-wmi: Do not load on Asus T100TA and T200TA (git-fixes).
- platform/x86: asus_wmi: Reserve more space for struct bias_args (git-fixes).
- platform/x86: dell-laptop: do not register micmute LED if there is no token (git-fixes).
- platform/x86: hp-wmi: Convert simple_strtoul() to kstrtou32() (git-fixes).
- platform/x86: intel-hid: Add a quirk to support HP Spectre X2 (2015) (git-fixes).
- platform/x86: intel-vbtn: Also handle tablet-mode switch on 'Detachable' and 'Portable' chassis-types (git-fixes).
- platform/x86: intel-vbtn: Do not advertise switches to userspace if they are not there (git-fixes).
- platform/x86: intel-vbtn: Only blacklist SW_TABLET_MODE on the 9 / 'Laptop' chasis-type (git-fixes).
- platform/x86: intel-vbtn: Split keymap into buttons and switches parts (git-fixes).
- platform/x86: intel-vbtn: Use acpi_evaluate_integer() (git-fixes).
- PM: runtime: clk: Fix clk_pm_runtime_get() error path (git-fixes).
- pNFS/flexfiles: Fix list corruption if the mirror count changes (git-fixes).
- pnp: Use list_for_each_entry() instead of open coding (git-fixes).
- powerpc/64s: Do not let DT CPU features set FSCR_DSCR (bsc#1065729).
- powerpc/64s/exception: Fix machine check no-loss idle wakeup (bsc#1156395).
- powerpc/64s/kuap: Restore AMR in system reset exception (bsc#1156395).
- powerpc/64s: Save FSCR to init_task.thread.fscr after feature init (bsc#1065729).
- powerpc/book3s64: Export has_transparent_hugepage() related functions (bsc#1171759).
- powerpc/bpf: Enable bpf_probe_read{, str}() on powerpc again (bsc#1172344).
- powerpc/fadump: Account for memory_limit while reserving memory (jsc#SLE-9099 git-fixes).
- powerpc/fadump: consider reserved ranges while reserving memory (jsc#SLE-9099 git-fixes).
- powerpc/fadump: use static allocation for reserved memory ranges (jsc#SLE-9099 git-fixes).
- powerpc/kuap: PPC_KUAP_DEBUG should depend on PPC_KUAP (bsc#1156395).
- powerpc/powernv: Fix a warning message (bsc#1156395).
- powerpc/setup_64: Set cache-line-size based on cache-block-size (bsc#1065729).
- powerpc/xive: Clear the page tables for the ESB IO mapping (bsc#1085030).
- power: reset: qcom-pon: reg write mask depends on pon generation (git-fixes).
- power: supply: bq24257_charger: Replace depends on REGMAP_I2C with select (git-fixes).
- power: supply: core: fix HWMON temperature labels (git-fixes).
- power: supply: core: fix memory leak in HWMON error path (git-fixes).
- power: supply: lp8788: Fix an error handling path in 'lp8788_charger_probe()' (git-fixes).
- power: supply: smb347-charger: IRQSTAT_D is volatile (git-fixes).
- pppoe: only process PADT targeted at local interfaces (networking-stable-20_05_16).
- printk: queue wake_up_klogd irq_work only if per-CPU areas are ready (bsc#1172095).
- proc/meminfo: avoid open coded reading of vm_committed_as (bnc#1173271).
- proc: Use new_inode not new_inode_pseudo (bsc#1173830).
- pwm: img: Call pm_runtime_put() in pm_runtime_get_sync() failed case (git-fixes).
- pwm: sun4i: Move pwm_calculate() out of spin_lock() (git-fixes).
- r8152: support additional Microsoft Surface Ethernet Adapter variant (git-fixes).
- r8169: Revive default chip version for r8168 (bsc#1173085).
- raid5: remove gfp flags from scribble_alloc() (bsc#1166985).
- random: fix data races at timer_rand_state (bsc#1173438).
- rcu: Avoid data-race in rcu_gp_fqs_check_wake() (bsc#1171828).
- rcu: Fix data-race due to atomic_t copy-by-value (bsc#1171828).
- rcu: Make rcu_read_unlock_special() checks match raise_softirq_irqoff() (bsc#1172046).
- rcu: Simplify rcu_read_unlock_special() deferred wakeups (bsc#1172046).
- rcutorture: Add 100-CPU configuration (bsc#1173068).
- rcutorture: Add worst-case call_rcu() forward-progress results (bsc#1173068).
- rcutorture: Dispense with Dracut for initrd creation (bsc#1173068).
- rcutorture: Make kvm-find-errors.sh abort on bad directory (bsc#1173068).
- rcutorture: Remove CONFIG_HOTPLUG_CPU=n from scenarios (bsc#1173068).
- rcutorture: Summarize summary of build and run results (bsc#1173068).
- rcutorture: Test TREE03 with the threadirqs kernel boot parameter (bsc#1173068).
- rcu: Use *_ONCE() to protect lockless ->expmask accesses (bsc#1171828).
- rcu: Use WRITE_ONCE() for assignments to ->pprev for hlist_nulls (bsc#1173438).
- RDMA/bnxt_re: Remove dead code from rcfw (bsc#1170774).
- RDMA/core: Check that type_attrs is not NULL prior access (jsc#SLE-8449).
- RDMA/core: Move and rename trace_cm_id_create() (jsc#SLE-8449).
- RDMA/mlx5: Fix NULL pointer dereference in destroy_prefetch_work (jsc#SLE-8446).
- RDMA/nl: Do not permit empty devices names during RDMA_NLDEV_CMD_NEWLINK/SET (bsc#1172841).
- RDMA/srpt: Fix disabling device management (jsc#SLE-8449).
- RDMA/uverbs: Make the event_queue fds return POLLERR when disassociated (jsc#SLE-8449).
- regualtor: pfuze100: correct sw1a/sw2 on pfuze3000 (git-fixes).
- remoteproc: Add missing '\n' in log messages (git-fixes).
- remoteproc: Fall back to using parent memory pool if no dedicated available (git-fixes).
- remoteproc: Fix and restore the parenting hierarchy for vdev (git-fixes).
- remoteproc: Fix IDR initialisation in rproc_alloc() (git-fixes).
- remoteproc: qcom_q6v5_mss: map/unmap mpss segments before/after use (git-fixes).
- Revert commit e918e570415c ('tpm_tis: Remove the HID IFX0102') (git-fixes).
- Revert 'drm/amd/display: disable dcn20 abm feature for bring up' (git-fixes).
- Revert 'fs/seq_file.c: seq_read(): add info message about buggy .next functions' (bsc#1172751)
- Revert 'i2c: tegra: Fix suspending in active runtime PM state' (git-fixes).
- Revert 'pinctrl: freescale: imx: Use 'devm_of_iomap()' to avoid a resource leak in case of error in 'imx_pinctrl_probe()'' (git-fixes).
- ring-buffer: Zero out time extend if it is nested and not absolute (git-fixes).
- rpm/modules.fips: * add aes-ce-ccm, des3_ede-x86_64, aes_ti and aes_neon_bsk
- rtc: mc13xxx: fix a double-unlock issue (git-fixes).
- rtc: rv3028: Add missed check for devm_regmap_init_i2c() (git-fixes).
- rtlwifi: Fix a double free in _rtl_usb_tx_urb_setup() (git-fixes).
- rtw88: fix an issue about leak system resources (git-fixes).
- rxrpc: Fix call RCU cleanup using non-bh-safe locks (git-fixes).
- s390/bpf: Maintain 8-byte stack alignment (bsc#1169194, LTC#185911).
- s390/pci: Log new handle in clp_disable_fh() (git-fixes).
- sata_rcar: handle pm_runtime_get_sync failure cases (git-fixes).
- sch_choke: avoid potential panic in choke_reset() (networking-stable-20_05_12).
- sched/cfs: change initial value of runnable_avg (bsc#1158765).
- sched/core: Check cpus_mask, not cpus_ptr in __set_cpus_allowed_ptr(), to fix mask corruption (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/core: Fix PI boosting between RT and DEADLINE tasks (bsc#1172823).
- sched/core: Fix ttwu() race (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/core: s/WF_ON_RQ/WQ_ON_CPU/ (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/cpuacct: Fix charge cpuacct.usage_sys (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/deadline: Initialize ->dl_boosted (bsc#1172823).
- sched/deadline: Initialize ->dl_boosted (git fixes (sched)).
- sched: etf: do not assume all sockets are full blown (networking-stable-20_04_27).
- sched/fair: find_idlest_group(): Remove unused sd_flag parameter (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Fix enqueue_task_fair() warning some more (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: fix nohz next idle balance (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Optimize dequeue_task_fair() (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Optimize enqueue_task_fair() (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Simplify the code of should_we_balance() (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched: Fix loadavg accounting race (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched: Make newidle_balance() static again (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched: Offload wakee task activation if it the wakee is descheduling (bnc#1158748, bnc#1159781).
- sched: Optimize ttwu() spinning on p->on_cpu (bnc#1158748, bnc#1159781).
- sched/pelt: Sync util/runnable_sum with PELT window when propagating (bnc#1155798 (CPU scheduler functional and performance backports)).
- sch_sfq: validate silly quantum values (networking-stable-20_05_12).
- scripts/decodecode: fix trapping instruction formatting (bsc#1065729).
- scsi: ibmvscsi: Do not send host info in adapter info MAD after LPM (bsc#1172759 ltc#184814).
- scsi: lpfc: Add an internal trace log buffer (bsc#1172687 bsc#1171530).
- scsi: lpfc: Add blk_io_poll support for latency improvment (bsc#1172687 bsc#1171530).
- scsi: lpfc: Add support to display if adapter dumps are available (bsc#1172687 bsc#1171530).
- scsi: lpfc: Allow applications to issue Common Set Features mailbox command (bsc#1172687 bsc#1171530).
- scsi: lpfc: Change default queue allocation for reduced memory consumption (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: fix build failure with DEBUGFS disabled (bsc#1171530).
- scsi: lpfc: Fix incomplete NVME discovery when target (bsc#1171530).
- scsi: lpfc: Fix inconsistent indenting (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix interrupt assignments when multiple vectors are supported on same CPU (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix kdump hang on PPC (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix language in 0373 message to reflect non-error message (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix less-than-zero comparison of unsigned value (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix lpfc_nodelist leak when processing unsolicited event (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Fix MDS Diagnostic Enablement definition (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Fix memory leak on lpfc_bsg_write_ebuf_set func (bsc#1171530).
- scsi: lpfc: Fix missing MDS functionality (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix negation of else clause in lpfc_prep_node_fc4type (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Fix noderef and address space warnings (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Fix NVMe rport deregister and registration during ADISC (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix oops due to overrun when reading SLI3 data (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix shost refcount mismatch when deleting vport (bsc#1172687 bsc#1171530).
- scsi: lpfc: fix spelling mistakes of asynchronous (bsc#1171530).
- scsi: lpfc: Fix stack trace seen while setting rrq active (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix unused assignment in lpfc_sli4_bsg_link_diag_test (bsc#1172687 bsc#1171530).
- scsi: lpfc: Maintain atomic consistency of queue_claimed flag (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Make lpfc_defer_acc_rsp static (bsc#1171530).
- scsi: lpfc: remove duplicate unloading checks (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Remove re-binding of nvme rport during registration (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Remove redundant initialization to variable rc (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Remove unnecessary lockdep_assert_held calls (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Update lpfc version to 12.8.0.1 (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Update lpfc version to 12.8.0.2 (bsc#1172687 bsc#1171530).
- scsi: megaraid_sas: Replace undefined MFI_BIG_ENDIAN macro with __BIG_ENDIAN_BITFIELD macro (bsc#1173206).
- scsi: qla2xxx: Delete all sessions before unregister local nvme port (jsc#SLE-9714 jsc#SLE-10327 jsc#SLE-10334 bsc#1157169).
- scsi: qla2xxx: Do not log message when reading port speed via sysfs (jsc#SLE-9714 jsc#SLE-10327 jsc#SLE-10334 bsc#1157169).
- scsi: qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV (jsc#SLE-9714 jsc#SLE-10327 jsc#SLE-10334 bsc#1157169).
- scsi: qla2xxx: Set NVMe status code for failed NVMe FCP request (bsc#1158983).
- scsi: sd_zbc: Fix sd_zbc_complete() (bsc#1173206).
- scsi: smartpqi: Update attribute name to `driver_version` (bsc#1173206).
- scsi: zfcp: add diagnostics buffer for exchange config data (bsc#1158050).
- scsi: zfcp: auto variables for dereferenced structs in open port handler (bsc#1158050).
- scsi: zfcp: diagnostics buffer caching and use for exchange port data (bsc#1158050).
- scsi: zfcp: enhance handling of FC Endpoint Security errors (bsc#1158050).
- scsi: zfcp: expose fabric name as common fc_host sysfs attribute (bsc#1158050).
- scsi: zfcp: Fence adapter status propagation for common statuses (bsc#1158050).
- scsi: zfcp: Fence early sysfs interfaces for accesses of shost objects (bsc#1158050).
- scsi: zfcp: Fence fc_host updates during link-down handling (bsc#1158050).
- scsi: zfcp: fix fc_host attributes that should be unknown on local link down (bsc#1158050).
- scsi: zfcp: fix wrong data and display format of SFP+ temperature (bsc#1158050).
- scsi: zfcp: implicitly refresh config-data diagnostics when reading sysfs (bsc#1158050).
- scsi: zfcp: implicitly refresh port-data diagnostics when reading sysfs (bsc#1158050).
- scsi: zfcp: introduce sysfs interface for diagnostics of local SFP transceiver (bsc#1158050).
- scsi: zfcp: introduce sysfs interface to read the local B2B-Credit (bsc#1158050).
- scsi: zfcp: log FC Endpoint Security errors (bsc#1158050).
- scsi: zfcp: log FC Endpoint Security of connections (bsc#1158050).
- scsi: zfcp: Move allocation of the shost object to after xconf- and xport-data (bsc#1158050).
- scsi: zfcp: Move fc_host updates during xport data handling into fenced function (bsc#1158050).
- scsi: zfcp: move maximum age of diagnostic buffers into a per-adapter variable (bsc#1158050).
- scsi: zfcp: Move p-t-p port allocation to after xport data (bsc#1158050).
- scsi: zfcp: Move shost modification after QDIO (re-)open into fenced function (bsc#1158050).
- scsi: zfcp: Move shost updates during xconfig data handling into fenced function (bsc#1158050).
- scsi: zfcp: proper indentation to reduce confusion in zfcp_erp_required_act (bsc#1158050).
- scsi: zfcp: report FC Endpoint Security in sysfs (bsc#1158050).
- scsi: zfcp: signal incomplete or error for sync exchange config/port data (bsc#1158050).
- scsi: zfcp: support retrieval of SFP Data via Exchange Port Data (bsc#1158050).
- scsi: zfcp: trace FC Endpoint Security of FCP devices and connections (bsc#1158050).
- scsi: zfcp: wire previously driver-specific sysfs attributes also to fc_host (bsc#1158050).
- sctp: Do not add the shutdown timer if its already been added (networking-stable-20_05_27).
- sctp: Start shutdown on association restart if in SHUTDOWN-SENT state and socket is closed (networking-stable-20_05_27).
- selftests/bpf: CONFIG_IPV6_SEG6_BPF required for test_seg6_loop.o (bsc#1155518).
- selftests/bpf: CONFIG_LIRC required for test_lirc_mode2.sh (bsc#1155518).
- selftests/bpf: Fix invalid memory reads in core_relo selftest (bsc#1155518).
- selftests/bpf: Fix memory leak in extract_build_id() (bsc#1155518).
- selftests/bpf, flow_dissector: Close TAP device FD after the test (bsc#1155518).
- selftests/bpf: Make sure optvals > PAGE_SIZE are bypassed (bsc#1155518).
- selftests/timens: handle a case when alarm clocks are not supported (bsc#1164648,jsc#SLE-11493).
- serial: 8250: Fix max baud limit in generic 8250 port (git-fixes).
- signal: Avoid corrupting si_pid and si_uid in do_notify_parent (bsc#1171529).
- slimbus: core: Fix mismatch in of_node_get/put (git-fixes).
- slimbus: ngd: get drvdata from correct device (git-fixes).
- socionext: account for napi_gro_receive never returning GRO_DROP (bsc#1154353).
- soc: mediatek: cmdq: return send msg error code (git-fixes).
- soc: qcom: rpmh: Dirt can only make you dirtier, not cleaner (git-fixes).
- soc: qcom: rpmh: Invalidate SLEEP and WAKE TCSes before flushing new data (git-fixes).
- soc: qcom: rpmh-rsc: Allow using free WAKE TCS for active request (git-fixes).
- soc: qcom: rpmh-rsc: Clear active mode configuration for wake TCS (git-fixes).
- soc: qcom: rpmh: Update dirty flag only when data changes (git-fixes).
- soc/tegra: pmc: Select GENERIC_PINCONF (git-fixes).
- spi: bcm2835aux: Fix controller unregister order (git-fixes).
- spi: bcm2835: Fix controller unregister order (git-fixes).
- spi: bcm-qspi: Handle clock probe deferral (git-fixes).
- spi: bcm-qspi: when tx/rx buffer is NULL set to 0 (git-fixes).
- SPI: designware: pci: Switch over to MSI interrupts (jsc#SLE-12735).
- spi: dt-bindings: spi-controller: Fix #address-cells for slave mode (git-fixes).
- spi: dw: Add SPI Rx-done wait method to DMA-based transfer (git-fixes).
- spi: dw: Add SPI Tx-done wait method to DMA-based transfer (git-fixes).
- spi: dw: Enable interrupts in accordance with DMA xfer mode (git-fixes).
- spi: dw: Fix controller unregister order (git-fixes).
- spi: dw: Fix native CS being unset (git-fixes).
- spi: dw: Fix Rx-only DMA transfers (git-fixes).
- spi: dw-pci: Add MODULE_DEVICE_TABLE (jsc#SLE-12735).
- spi: dw-pci: Add runtime power management support (jsc#SLE-12735).
- spi: dw-pci: Add support for Intel Elkhart Lake PSE SPI (jsc#SLE-12735).
- spi: dw-pci: Fix Chip Select amount on Intel Elkhart Lake PSE SPI (jsc#SLE-12735).
- spi: dw: Return any value retrieved from the dma_transfer callback (git-fixes).
- spi: dw: use 'smp_mb()' to avoid sending spi data error (git-fixes).
- spi: dw: Zero DMA Tx and Rx configurations on stack (git-fixes).
- spi: Fix controller unregister order (git-fixes).
- spi: fsl: do not map irq during probe (git-fixes).
- spi: fsl: use platform_get_irq() instead of of_irq_to_resource() (git-fixes).
- spi: pxa2xx: Apply CS clk quirk to BXT (git-fixes).
- spi: pxa2xx: Fix controller unregister order (git-fixes).
- spi: pxa2xx: Fix runtime PM ref imbalance on probe error (git-fixes).
- spi: Respect DataBitLength field of SpiSerialBusV2() ACPI resource (git-fixes).
- spi: spi-fsl-dspi: Change usage pattern of SPI_MCR_* and SPI_CTAR_* macros (git-fixes).
- spi: spi-fsl-dspi: Do not access reserved fields in SPI_MCR (git-fixes).
- spi: spi-fsl-dspi: Fix 16-bit word order in 32-bit XSPI mode (git-fixes).
- spi: spi-fsl-dspi: Replace interruptible wait queue with a simple completion (git-fixes).
- spi: spi-mem: Fix Dual/Quad modes on Octal-capable devices (git-fixes).
- spi: sprd: switch the sequence of setting WDG_LOAD_LOW and _HIGH (git-fixes).
- staging: iio: ad2s1210: Fix SPI reading (git-fixes).
- staging: kpc2000: fix error return code in kp2000_pcie_probe() (git-fixes).
- staging: rtl8712: Fix IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK (git-fixes).
- Staging: rtl8723bs: prevent buffer overflow in update_sta_support_rate() (git-fixes).
- staging: sm750fb: add missing case while setting FB_VISUAL (git-fixes).
- sun6i: dsi: fix gcc-4.8 (bsc#1152489)
- sunrpc: fixed rollback in rpc_gssd_dummy_populate() (git-fixes).
- SUNRPC: Properly set the @subbuf parameter of xdr_buf_subsegment() (git-fixes).
- SUNRPC: Signalled ASYNC tasks need to exit (git-fixes).
- supported.conf: Add pinctrl-tigerlake as supported
- supported.conf: Mark two hwtracing helper modules as externally supported (bsc#1170879)
- svcrdma: Fix leak of svc_rdma_recv_ctxt objects (git-fixes).
- tcp: cache line align MAX_TCP_HEADER (networking-stable-20_04_27).
- tcp: fix error recovery in tcp_zerocopy_receive() (networking-stable-20_05_16).
- tcp: fix SO_RCVLOWAT hangs with fat skbs (networking-stable-20_05_16).
- team: fix hang in team_mode_get() (networking-stable-20_04_27).
- tg3: driver sleeps indefinitely when EEH errors exceed eeh_max_freezes (bsc#1173284).
- thermal/drivers/mediatek: Fix bank number settings on mt8183 (git-fixes).
- thermal/drivers/rcar_gen3: Fix undefined temperature if negative (git-fixes).
- thermal/drivers/ti-soc-thermal: Avoid dereferencing ERR_PTR (git-fixes).
- thermal: intel: intel_pch_thermal: Add Comet Lake (CML) platform support (jsc#SLE-12668).
- tick/sched: Annotate lockless access to last_jiffies_update (bsc#1173438).
- timer: Use hlist_unhashed_lockless() in timer_pending() (bsc#1173438).
- tipc: block BH before using dst_cache (networking-stable-20_05_27).
- tipc: fix partial topology connection closure (networking-stable-20_05_12).
- torture: Allow 'CFLIST' to specify default list of scenarios (bsc#1173068).
- torture: Expand last_ts variable in kvm-test-1-run.sh (bsc#1173068).
- torture: Handle jitter for CPUs that cannot be offlined (bsc#1173068).
- torture: Handle systems lacking the mpstat command (bsc#1173068).
- torture: Hoist calls to lscpu to higher-level kvm.sh script (bsc#1173068).
- torture: Make results-directory date format completion-friendly (bsc#1173068).
- torture: Use gawk instead of awk for systime() function (bsc#1173068).
- tpm: Fix TIS locality timeout problems (git-fixes).
- tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send() (bsc#1065729).
- tpm_tis: Remove the HID IFX0102 (git-fixes).
- tracing: Fix event trigger to accept redundant spaces (git-fixes).
- tty: n_gsm: Fix bogus i++ in gsm_data_kick (git-fixes).
- tty: n_gsm: Fix SOF skipping (git-fixes).
- tty: n_gsm: Fix waking up upper tty layer when room available (git-fixes).
- tty: serial: add missing spin_lock_init for SiFive serial console (git-fixes).
- tun: correct header offsets in napi frags mode (git-fixes).
- tunnel: Propagate ECT(1) when decapsulating as recommended by RFC6040 (networking-stable-20_05_12).
- ubifs: fix wrong use of crypto_shash_descsize() (bsc#1173827).
- ubifs: remove broken lazytime support (bsc#1173826).
- Update patch reference for intel_th patch (jsc#SLE-12705)
- Update patch reference tag for ACPI lockdown fix (bsc#1173573)
- Update the patch reference for ish-hid fix (jsc#SLE-12683)
- usb: add USB_QUIRK_DELAY_INIT for Logitech C922 (git-fixes).
- USB: core: Fix misleading driver bug report (git-fixes).
- usb: core: hub: limit HUB_QUIRK_DISABLE_AUTOSUSPEND to USB5534B (git-fixes).
- usb: dwc2: gadget: move gadget resume after the core is in L0 state (git-fixes).
- usb: dwc3: gadget: Properly handle ClearFeature(halt) (git-fixes).
- usb: dwc3: gadget: Properly handle failed kick_transfer (git-fixes).
- usb: dwc3: pci: Enable extcon driver for Intel Merrifield (git-fixes).
- usb/ehci-platform: Set PM runtime as active on resume (git-fixes).
- USB: ehci: reopen solution for Synopsys HC bug (git-fixes).
- usb: gadget: audio: Fix a missing error return value in audio_bind() (git-fixes).
- USB: gadget: fix illegal array access in binding with UDC (git-fixes).
- usb: gadget: fix potential double-free in m66592_probe (git-fixes).
- usb: gadget: legacy: fix error return code in cdc_bind() (git-fixes).
- usb: gadget: legacy: fix error return code in gncm_bind() (git-fixes).
- usb: gadget: legacy: fix redundant initialization warnings (git-fixes).
- usb: gadget: lpc32xx_udc: do not dereference ep pointer before null check (git-fixes).
- usb: gadget: net2272: Fix a memory leak in an error handling path in 'net2272_plat_probe()' (git-fixes).
- usb: gadget: udc: atmel: Make some symbols static (git-fixes).
- usb: gadget: udc: Potential Oops in error handling code (git-fixes).
- USB: gadget: udc: s3c2410_udc: Remove pointless NULL check in s3c2410_udc_nuke (git-fixes).
- usb: host: ehci-exynos: Fix error check in exynos_ehci_probe() (git-fixes).
- USB: host: ehci-mxc: Add error handling in ehci_mxc_drv_probe() (git-fixes).
- usb: host: ehci-platform: add a quirk to avoid stuck (git-fixes).
- usb: host: xhci-mtk: avoid runtime suspend when removing hcd (git-fixes).
- usb: host: xhci-plat: keep runtime active when removing host (git-fixes).
- usblp: poison URBs upon disconnect (git-fixes).
- usb: musb: Fix runtime PM imbalance on error (git-fixes).
- usb: musb: start session in resume for host port (git-fixes).
- usb/ohci-platform: Fix a warning when hibernating (git-fixes).
- USB: ohci-sm501: Add missed iounmap() in remove (git-fixes).
- USB: ohci-sm501: fix error return code in ohci_hcd_sm501_drv_probe() (git-fixes).
- usb: renesas_usbhs: getting residue from callback_result (git-fixes).
- USB: serial: ch341: add basis for quirk detection (git-fixes).
- USB: serial: option: add Telit LE910C1-EUX compositions (git-fixes).
- USB: serial: qcserial: add DW5816e QDL support (git-fixes).
- USB: serial: usb_wwan: do not resubmit rx urb on fatal errors (git-fixes).
- usb: typec: tcpci_rt1711h: avoid screaming irq causing boot hangs (git-fixes).
- usb: usbfs: correct kernel->user page attribute mismatch (git-fixes).
- USB: usbfs: fix mmap dma mismatch (git-fixes).
- usb/xhci-plat: Set PM runtime as active on resume (git-fixes).
- vfio: avoid possible overflow in vfio_iommu_type1_pin_pages (git-fixes).
- vfio: Ignore -ENODEV when getting MSI cookie (git-fixes).
- vfio/mdev: Fix reference count leak in add_mdev_supported_type (git-fixes).
- vfio/pci: fix memory leaks in alloc_perm_bits() (git-fixes).
- vfio/type1: Fix VA->PA translation for PFNMAP VMAs in vaddr_get_pfn() (git-fixes).
- video: fbdev: w100fb: Fix a potential double free (git-fixes).
- video: vt8500lcdfb: fix fallthrough warning (bsc#1152489)
- virtio-blk: handle block_device_operations callbacks after hot unplug (git fixes (block drivers)).
- virtio_net: fix lockdep warning on 32 bit (networking-stable-20_05_16).
- vmxnet3: add geneve and vxlan tunnel offload support (bsc#1172484).
- vmxnet3: add support to get/set rx flow hash (bsc#1172484).
- vmxnet3: allow rx flow hash ops only when rss is enabled (bsc#1172484).
- vmxnet3: prepare for version 4 changes (bsc#1172484).
- vmxnet3: update to version 4 (bsc#1172484).
- vmxnet3: use correct hdr reference when packet is encapsulated (bsc#1172484).
- vrf: Check skb for XFRM_TRANSFORMED flag (networking-stable-20_04_27).
- vrf: Fix IPv6 with qdisc and xfrm (networking-stable-20_04_27).
- vsprintf: do not obfuscate NULL and error pointers (bsc#1172086).
- vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console (git-fixes).
- vt: vt_ioctl: remove unnecessary console allocation checks (git-fixes).
- vxlan: use the correct nlattr array in NL_SET_ERR_MSG_ATTR (networking-stable-20_04_27).
- w1: omap-hdq: cleanup to add missing newline for some dev_dbg (git-fixes).
- watchdog: da9062: No need to ping manually before setting timeout (git-fixes).
- watchdog: imx_sc_wdt: Fix reboot on crash (git-fixes).
- wcn36xx: Fix error handling path in 'wcn36xx_probe()' (git-fixes).
- wil6210: account for napi_gro_receive never returning GRO_DROP (bsc#1154353).
- wil6210: add wil_netif_rx() helper function (bsc#1154353).
- wil6210: use after free in wil_netif_rx_any() (bsc#1154353).
- wireguard: device: avoid circular netns references (git-fixes).
- wireguard: noise: do not assign initiation time in if condition (git-fixes).
- wireguard: noise: read preshared key while taking lock (bsc#1169021 jsc#SLE-12250).
- wireguard: noise: separate receive counter from send counter (bsc#1169021 jsc#SLE-12250).
- wireguard: queueing: preserve flow hash across packet scrubbing (bsc#1169021 jsc#SLE-12250).
- wireguard: receive: account for napi_gro_receive never returning GRO_DROP (git-fixes).
- wireguard: selftests: initalize ipv6 members to NULL to squelch clang warning (git-fixes).
- wireguard: selftests: use newer iproute2 for gcc-10 (bsc#1169021 jsc#SLE-12250).
- work around mvfs bug (bsc#1162063).
- workqueue: do not use wq_select_unbound_cpu() for bound works (git-fixes).
- workqueue: Remove the warning in wq_worker_sleeping() (git-fixes).
- x86/amd_nb: Add AMD family 17h model 60h PCI IDs (git-fixes).
- x86/cpu/amd: Make erratum #1054 a legacy erratum (bsc#1152489).
- x86: Fix early boot crash on gcc-10, third try (bsc#1152489).
- x86/mm/cpa: Flush direct map alias during cpa (bsc#1152489).
- x86/PCI: Mark Intel C620 MROMs as having non-compliant BARs (git-fixes).
- x86/reboot/quirks: Add MacBook6,1 reboot quirk (git-fixes).
- x86/resctrl: Fix invalid attempt at removing the default resource group (bsc#1152489).
- x86/resctrl: Preserve CDP enable over CPU hotplug (bsc#1152489).
- x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks (bsc#1058115).
- xfrm: Always set XFRM_TRANSFORMED in xfrm{4,6}_output_finish (networking-stable-20_04_27).
- xfrm: fix error in comment (git fixes (block drivers)).
- xfs: clean up the error handling in xfs_swap_extents (git-fixes).
- xfs: do not commit sunit/swidth updates to disk if that would cause repair failures (bsc#1172169).
- xfs: do not fail unwritten extent conversion on writeback due to edquot (bsc#1158242).
- xfs: fix duplicate verification from xfs_qm_dqflush() (git-fixes).
- xfs: force writes to delalloc regions to unwritten (bsc#1158242).
- xfs: measure all contiguous previous extents for prealloc size (bsc#1158242).
- xfs: preserve default grace interval during quotacheck (bsc#1172170).
- xfs: refactor agfl length computation function (bsc#1172169).
- xfs: split the sunit parameter update into two parts (bsc#1172169).
- xhci: Fix enumeration issue when setting max packet size for FS devices (git-fixes).
- xhci: Fix incorrect EP_STATE_MASK (git-fixes).
- xhci: Poll for U0 after disabling USB2 LPM (git-fixes).
- xhci: Return if xHCI does not support LPM (git-fixes).
- xprtrdma: Fix handling of RDMA_ERROR replies (git-fixes).
Patchnames
SUSE-2020-2027,SUSE-SLE-Module-Public-Cloud-15-SP2-2020-2027
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 15 SP2 Azure kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2020-15780: A lockdown bypass for loading unsigned modules using ACPI table injection was fixed. (bsc#1173573)\n- CVE-2020-15393: Fixed a memory leak in usbtest_disconnect (bnc#1173514).\n- CVE-2020-12771: An issue was discovered in btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails (bnc#1171732).\n- CVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).\n- CVE-2020-10773: Fixed a memory leak on s390/s390x, in the cmm_timeout_hander in file arch/s390/mm/cmm.c (bnc#1172999).\n- CVE-2020-14416: Fixed a race condition in tty-\u003edisc_data handling in the slip and slcan line discipline could lead to a use-after-free. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).\n- CVE-2020-10768: Fixed an issue with the prctl() function, where indirect branch speculation could be enabled even though it was diabled before (bnc#1172783).\n- CVE-2020-10766: Fixed an issue which allowed an attacker with a local account to disable SSBD protection (bnc#1172781).\n- CVE-2020-10767: Fixed an issue where Indirect Branch Prediction Barrier was disabled in certain circumstances, leaving the system open to a spectre v2 style attack (bnc#1172782).\n- CVE-2020-13974: Fixed a integer overflow in drivers/tty/vt/keyboard.c, if k_ascii is called several times in a row (bnc#1172775).\n- CVE-2019-20810: Fixed a memory leak in go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c because it did not call snd_card_free for a failure path (bnc#1172458).\n- CVE-2019-20812: An issue was discovered in the prb_calc_retire_blk_tmo() function in net/packet/af_packet.c could result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3 (bnc#1172453).\n- CVE-2019-19462: relay_open in kernel/relay.c in the Linux kernel allowed local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result (bnc#1158265).\n- CVE-2020-10732: A flaw was found in the implementation of Userspace core dumps. This flaw allowed an attacker with a local account to crash a trivial program and exfiltrate private kernel data (bnc#1171220).\n- CVE-2020-12656: Fixed a memory leak in gss_mech_free in the rpcsec_gss_krb5 implementation, caused by a lack of certain domain_release calls (bnc#1171219).\n- CVE-2020-10751: A flaw was found in the SELinux LSM hook implementation, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing (bnc#1171189).\n- CVE-2020-10711: A NULL pointer dereference flaw was found in the SELinux subsystem in versions This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol\u0027s category bitmap into the SELinux extensible bitmap via the\u0027 ebitmap_netlbl_import\u0027 routine. This flaw allowed a remote network user to crash the system kernel, resulting in a denial of service (bnc#1171191).\n- CVE-2020-12769: An issue was discovered in drivers/spi/spi-dw.c allowed attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one (bnc#1171983).\n- CVE-2020-13143: gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c relies on kstrdup without considering the possibility of an internal \u0027\\0\u0027 value, which allowed attackers to trigger an out-of-bounds read (bnc#1171982).\n\nThe following non-security bugs were fixed:\n\n- ACPICA: Fixes for acpiExec namespace init file (git-fixes).\n- ACPI: configfs: Disallow loading ACPI tables when locked down (git-fixes).\n- ACPI: CPPC: Fix reference count leak in acpi_cppc_processor_probe() (git-fixes).\n- ACPI: GED: add support for _Exx / _Lxx handler methods (git-fixes).\n- ACPI: GED: use correct trigger type field in _Exx / _Lxx handling (git-fixes).\n- ACPI: PM: Avoid using power resources if there are none for D0 (git-fixes).\n- ACPI: sysfs: Fix pm_profile_attr type (git-fixes).\n- ACPI: sysfs: Fix reference count leak in acpi_sysfs_add_hotplug_profile() (git-fixes).\n- Add a GIT commit ID of already cherry-picked x86/platform patch\n- Add cherry-picked ID to the already applied pinctrl patch\n- af_unix: add compat_ioctl support (git-fixes).\n- agp/intel: Reinforce the barrier after GTT updates (git-fixes).\n- aio: fix async fsync creds (bsc#1173828).\n- ALSA: emu10k1: delete an unnecessary condition (git-fixes).\n- ALSA: es1688: Add the missed snd_card_free() (git-fixes).\n- ALSA: fireface: fix configuration error for nominal sampling transfer frequency (git-fixes).\n- ALSA: firewire-lib: fix invalid assignment to union data for directional parameter (git-fixes).\n- ALSA: hda: Add ElkhartLake HDMI codec vid (git-fixes).\n- ALSA: hda: add member to store ratio for stripe control (git-fixes).\n- ALSA: hda: Add NVIDIA codec IDs 9a \u0026 9d through a0 to patch table (git-fixes).\n- ALSA: hda: add sienna_cichlid audio asic id for sienna_cichlid up (git-fixes).\n- ALSA: hda: Fix potential race in unsol event handler (git-fixes).\n- ALSA: hda/hdmi: fix failures at PCM open on Intel ICL and later (git-fixes).\n- ALSA: hda/hdmi: improve debug traces for stream lookups (git-fixes).\n- ALSA: hda - let hs_mic be picked ahead of hp_mic (git-fixes).\n- ALSA: hda/realtek - Add a model for Thinkpad T570 without DAC workaround (bsc#1172017).\n- ALSA: hda/realtek - add a pintbl quirk for several Lenovo machines (git-fixes).\n- ALSA: hda/realtek - Add LED class support for micmute LED (git-fixes).\n- ALSA: hda/realtek - Add more fixup entries for Clevo machines (git-fixes).\n- ALSA: hda/realtek: Add mute LED and micmute LED support for HP systems (git-fixes).\n- ALSA: hda/realtek - Add new codec supported for ALC287 (git-fixes).\n- ALSA: hda/realtek - Add quirk for MSI GE63 laptop (git-fixes).\n- ALSA: hda/realtek - Enable audio jacks of Acer vCopperbox with ALC269VC (git-fixes).\n- ALSA: hda/realtek: Enable headset mic of Acer C20-820 with ALC269VC (git-fixes).\n- ALSA: hda/realtek: Enable headset mic of Acer Veriton N4660G with ALC269VC (git-fixes).\n- ALSA: hda/realtek - Enable micmute LED on and HP system (git-fixes).\n- ALSA: hda/realtek - Fix Lenovo Thinkpad X1 Carbon 7th quirk subdevice id (git-fixes).\n- ALSA: hda/realtek - Fix silent output on Gigabyte X570 Aorus Xtreme (git-fixes).\n- ALSA: hda/realtek - Fix unused variable warning w/o CONFIG_LEDS_TRIGGER_AUDIO (git-fixes).\n- ALSA: hda/realtek - Introduce polarity for micmute LED GPIO (git-fixes).\n- ALSA: hda/tegra: correct number of SDO lines for Tegra194 (git-fixes).\n- ALSA: hda/tegra: workaround playback failure on Tegra194 (git-fixes).\n- ALSA: hwdep: fix a left shifting 1 by 31 UB bug (git-fixes).\n- ALSA: iec1712: Initialize STDSP24 properly when using the model=staudio option (git-fixes).\n- ALSA: isa/wavefront: prevent out of bounds write in ioctl (git-fixes).\n- ALSA: opl3: fix infoleak in opl3 (git-fixes).\n- ALSA: pcm: disallow linking stream to itself (git-fixes).\n- ALSA: pcm: fix incorrect hw_base increase (git-fixes).\n- ALSA: pcm: fix snd_pcm_link() lockdep splat (git-fixes).\n- ALSA: usb-audio: Add duplex sound support for USB devices using implicit feedback (git-fixes).\n- ALSA: usb-audio: Add implicit feedback quirk for RTX6001 (git-fixes).\n- ALSA: usb-audio: Add implicit feedback quirk for SSL2+ (git-fixes).\n- ALSA: usb-audio: Add Pioneer DJ DJM-900NXS2 support (git-fixes).\n- ALSA: usb-audio: add quirk for Denon DCD-1500RE (git-fixes).\n- ALSA: usb-audio: add quirk for MacroSilicon MS2109 (git-fixes).\n- ALSA: usb-audio: add quirk for Samsung USBC Headset (AKG) (git-fixes).\n- ALSA: usb-audio: Add vendor, product and profile name for HP Thunderbolt Dock (git-fixes).\n- ALSA: usb-audio: Clean up quirk entries with macros (git-fixes).\n- ALSA: usb-audio: Fix a limit check in proc_dump_substream_formats() (git-fixes).\n- ALSA: usb-audio: Fix inconsistent card PM state after resume (git-fixes).\n- ALSA: usb-audio: fixing upper volume limit for RME Babyface Pro routing crosspoints (git-fixes).\n- ALSA: usb-audio: Fixing usage of plain int instead of NULL (git-fixes).\n- ALSA: usb-audio: Fix OOB access of mixer element list (git-fixes).\n- ALSA: usb-audio: Fix packet size calculation (bsc#1173847).\n- ALSA: usb-audio: Fix potential use-after-free of streams (git-fixes).\n- ALSA: usb-audio: Fix racy list management in output queue (git-fixes).\n- ALSA: usb-audio: Improve frames size computation (git-fixes).\n- ALSA: usb-audio: Manage auto-pm of all bundled interfaces (git-fixes).\n- ALSA: usb-audio: mixer: volume quirk for ESS Technology Asus USB DAC (git-fixes).\n- ALSA: usb-audio: Print more information in stream proc files (git-fixes).\n- ALSA: usb-audio: Quirks for Gigabyte TRX40 Aorus Master onboard audio (git-fixes).\n- ALSA: usb-audio: Remove async workaround for Scarlett 2nd gen (git-fixes).\n- ALSA: usb-audio: Replace s/frame/packet/ where appropriate (git-fixes).\n- ALSA: usb-audio: RME Babyface Pro mixer patch (git-fixes).\n- ALSA: usb-audio: Use the new macro for HP Dock rename quirks (git-fixes).\n- amdgpu: a NULL -\u003emm does not mean a thread is a kthread (git-fixes).\n- amd-xgbe: Use __napi_schedule() in BH context (networking-stable-20_04_17).\n- arm64: map FDT as RW for early_init_dt_scan() (jsc#SLE-12424).\n- ARM: oxnas: make ox820_boot_secondary static (git-fixes).\n- asm-gemeric/tlb: remove stray function declarations (bsc#1156395).\n- ASoC: core: only convert non DPCM link to DPCM link (git-fixes).\n- ASoC: davinci-mcasp: Fix dma_chan refcnt leak when getting dma type (git-fixes).\n- ASoC: fix incomplete error-handling in img_i2s_in_probe (git-fixes).\n- ASoC: fsl_asrc_dma: Fix dma_chan leak when config DMA channel failed (git-fixes).\n- ASoC: fsl_ssi: Fix bclk calculation for mono channel (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for Toshiba Encore WT10-A tablet (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Add quirk for Toshiba Encore WT8-A tablet (git-fixes).\n- ASoC: intel: cht_bsw_max98090_ti: Add all Chromebooks that need pmc_plt_clk_0 quirk (bsc#1171246).\n- ASoC: intel - fix the card names (git-fixes).\n- ASoC: max98373: reorder max98373_reset() in resume (git-fixes).\n- ASoC: max9867: fix volume controls (git-fixes).\n- ASoC: meson: add missing free_irq() in error path (git-fixes).\n- ASoc: q6afe: add support to get port direction (git-fixes).\n- ASoC: q6asm: handle EOS correctly (git-fixes).\n- ASoC: qcom: q6asm-dai: kCFI fix (git-fixes).\n- ASoC: rockchip: Fix a reference count leak (git-fixes).\n- ASoC: rt5645: Add platform-data for Asus T101HA (git-fixes).\n- ASoC: SOF: core: fix error return code in sof_probe_continue() (git-fixes).\n- ASoC: SOF: Do nothing when DSP PM callbacks are not set (git-fixes).\n- ASoC: SOF: nocodec: conditionally set dpcm_capture/dpcm_playback flags (git-fixes).\n- ASoC: tegra: tegra_wm8903: Support nvidia, headset property (git-fixes).\n- ASoC: ti: omap-mcbsp: Fix an error handling path in \u0027asoc_mcbsp_probe()\u0027 (git-fixes).\n- ASoC: ux500: mop500: Fix some refcounted resources issues (git-fixes).\n- ata/libata: Fix usage of page address by page_address in ata_scsi_mode_select_xlat function (git-fixes).\n- ath10k: fix kernel null pointer dereference (git-fixes).\n- ath10k: Fix the race condition in firmware dump work queue (git-fixes).\n- ath10k: Remove ath10k_qmi_register_service_notifier() declaration (git-fixes).\n- ath10k: remove the max_sched_scan_reqs value (git-fixes).\n- ath10k: Skip handling del_server during driver exit (git-fixes).\n- ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb (git-fixes).\n- ath9k: Fix use-after-free Read in ath9k_wmi_ctrl_rx (git-fixes).\n- ath9k: Fix use-after-free Read in htc_connect_service (git-fixes).\n- ath9k: Fix use-after-free Write in ath9k_htc_rx_msg (git-fixes).\n- ath9k_htc: Silence undersized packet warnings (git-fixes).\n- ath9x: Fix stack-out-of-bounds Write in ath9k_hif_usb_rx_cb (git-fixes).\n- ax25: fix setsockopt(SO_BINDTODEVICE) (git-fixes).\n- b43: Fix connection problem with WPA3 (git-fixes).\n- b43legacy: Fix case where channel status is corrupted (git-fixes).\n- b43_legacy: Fix connection problem with WPA3 (git-fixes).\n- backlight: lp855x: Ensure regulators are disabled on probe failure (git-fixes).\n- batman-adv: Revert \u0027disable ethtool link speed detection when auto negotiation off\u0027 (git-fixes).\n- bfq: Avoid false bfq queue merging (bsc#1171513).\n- bfq: Fix check detecting whether waker queue should be selected (bsc#1168838).\n- bfq: Use only idle IO periods for think time calculations (bsc#1171513).\n- bfq: Use \u0027ttime\u0027 local variable (bsc#1171513).\n- blk-iocost: Fix error on iocost_ioc_vrate_adj (bsc#1173206).\n- blk-iocost: fix incorrect vtime comparison in iocg_is_idle() (bsc#1173206).\n- block/bio-integrity: do not free \u0027buf\u0027 if bio_integrity_add_page() failed (bsc#1173817).\n- block: Fix use-after-free in blkdev_get() (bsc#1173834).\n- block: nr_sects_write(): Disable preemption on seqcount write (bsc#1173818).\n- Bluetooth: Add SCO fallback for invalid LMP parameters error (git-fixes).\n- Bluetooth: btbcm: Add 2 missing models to subver tables (git-fixes).\n- Bluetooth: btmtkuart: Improve exception handling in btmtuart_probe() (git-fixes).\n- Bluetooth: hci_bcm: fix freeing not-requested IRQ (git-fixes).\n- bnxt_en: Fix AER reset logic on 57500 chips (bsc#1171150).\n- bnxt_en: fix firmware message length endianness (bsc#1173894).\n- bnxt_en: Fix return code to \u0027flash_device\u0027 (bsc#1173894).\n- bnxt_en: Improve TQM ring context memory sizing formulas (jsc#SLE-8371 bsc#1153274).\n- bnxt_en: Re-enable SRIOV during resume (jsc#SLE-8371 bsc#1153274).\n- bnxt_en: Return from timer if interface is not in open state (jsc#SLE-8371 bsc#1153274).\n- bnxt_en: Simplify bnxt_resume() (jsc#SLE-8371 bsc#1153274).\n- bpf: Document optval \u003e PAGE_SIZE behavior for sockopt hooks (bsc#1155518).\n- bpf: Do not return EINVAL from {get,set}sockopt when optlen \u003e PAGE_SIZE (bsc#1155518).\n- bpf: Fix an error code in check_btf_func() (bsc#1154353).\n- bpf: Fix map permissions check (bsc#1155518).\n- bpf: Prevent mmap()\u0027ing read-only maps as writable (bsc#1155518).\n- bpf: Restrict bpf_probe_read{, str}() only to archs where they work (bsc#1172344).\n- bpf: Restrict bpf_trace_printk()\u0027s %s usage and add %pks, %pus specifier (bsc#1172344).\n- bpf, sockhash: Synchronize_rcu before free\u0027ing map (git-fixes).\n- bpf, sockmap: Check update requirements after locking (git-fixes).\n- bpf: Undo internal BPF_PROBE_MEM in BPF insns dump (bsc#1155518).\n- bpf, xdp, samples: Fix null pointer dereference in *_user code (bsc#1155518).\n- brcmfmac: expose RPi firmware config files through modinfo (bsc#1169094).\n- brcmfmac: fix wrong location to get firmware feature (git-fixes).\n- btrfs: fix log context list corruption after rename whiteout error (bsc#1172342).\n- btrfs: fix partial loss of prealloc extent past i_size after fsync (bsc#1172343).\n- btrfs: reloc: clear DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417 bsc#1160947 bsc#1172366).\n- btrfs: reloc: fix reloc root leak and NULL pointer dereference (bsc#1171417 bsc#1160947 bsc#1172366).\n- bus: ti-sysc: Ignore clockactivity unless specified as a quirk (git-fixes).\n- carl9170: remove P2P_GO support (git-fixes).\n- cdc-acm: Add DISABLE_ECHO quirk for Microchip/SMSC chip (git-fixes).\n- CDC-ACM: heed quirk also in error handling (git-fixes).\n- CDC-ACM: heed quirk also in error handling (git-fixes).\n- ceph: add comments for handle_cap_flush_ack logic (bsc#1172940).\n- ceph: allow rename operation under different quota realms (bsc#1172988).\n- ceph: ceph_kick_flushing_caps needs the s_mutex (bsc#1172986).\n- ceph: convert mdsc-\u003ecap_dirty to a per-session list (bsc#1172984 bsc#1167104).\n- ceph: document what protects i_dirty_item and i_flushing_item (bsc#1172940).\n- ceph: do not release i_ceph_lock in handle_cap_trunc (bsc#1172940).\n- ceph: do not return -ESTALE if there\u0027s still an open file (bsc#1171915).\n- ceph: do not take i_ceph_lock in handle_cap_import (bsc#1172940).\n- ceph: fix potential race in ceph_check_caps (bsc#1172940).\n- ceph: flush release queue when handling caps for unknown inode (bsc#1172939).\n- ceph: make sure mdsc-\u003emutex is nested in s-\u003es_mutex to fix dead lock (bsc#1172989).\n- ceph: normalize \u0027delta\u0027 parameter usage in check_quota_exceeded (bsc#1172987).\n- ceph: reorganize __send_cap for less spinlock abuse (bsc#1172940).\n- ceph: request expedited service on session\u0027s last cap flush (bsc#1172985 bsc#1167104).\n- ceph: reset i_requested_max_size if file write is not wanted (bsc#1172983).\n- ceph: skip checking caps when session reconnecting and releasing reqs (bsc#1172990).\n- ceph: split up __finish_cap_flush (bsc#1172940).\n- ceph: throw a warning if we destroy session with mutex still locked (bsc#1172940).\n- char/random: Add a newline at the end of the file (jsc#SLE-12424).\n- clk: bcm2835: Fix return type of bcm2835_register_gate (git-fixes).\n- clk: bcm2835: Remove casting to bcm2835_clk_register (git-fixes).\n- clk: clk-flexgen: fix clock-critical handling (git-fixes).\n- clk: mediatek: assign the initial value to clk_init_data of mtk_mux (git-fixes).\n- clk: meson: meson8b: Do not rely on u-boot to init all GP_PLL registers (git-fixes).\n- clk: meson: meson8b: Fix the polarity of the RESET_N lines (git-fixes).\n- clk: meson: meson8b: Fix the vclk_div{1, 2, 4, 6, 12}_en gate bits (git-fixes).\n- clk: qcom: Add missing msm8998 ufs_unipro_core_clk_src (git-fixes).\n- clk: qcom: msm8916: Fix the address location of pll-\u003econfig_reg (git-fixes).\n- clk: renesas: cpg-mssr: Fix STBCR suspend/resume handling (git-fixes).\n- clk: samsung: exynos5433: Add IGNORE_UNUSED flag to sclk_i2s1 (git-fixes).\n- clk: samsung: Mark top ISP and CAM clocks on Exynos542x as critical (git-fixes).\n- clk: sifive: allocate sufficient memory for struct __prci_data (git-fixes).\n- clk: sprd: return correct type of value for _sprd_pll_recalc_rate (git-fixes).\n- clk: sunxi: Fix incorrect usage of round_down() (git-fixes).\n- clk: ti: am33xx: fix RTC clock parent (git-fixes).\n- clk: ti: composite: fix memory leak (git-fixes).\n- clk: zynqmp: fix memory leak in zynqmp_register_clocks (git-fixes).\n- clocksource: dw_apb_timer: Make CPU-affiliation being optional (git-fixes).\n- clocksource: dw_apb_timer_of: Fix missing clockevent timers (git-fixes).\n- component: Silence bind error on -EPROBE_DEFER (git-fixes).\n- config: arm64: enable CONFIG_IOMMU_DEFAULT_PASSTHROUGH References: bsc#1172739\n- coredump: fix crash when umh is disabled (git-fixes).\n- coredump: fix null pointer dereference on coredump (git-fixes).\n- cpufreq: Fix up cpufreq_boost_set_sw() (git-fixes).\n- cpufreq: intel_pstate: Only mention the BIOS disabling turbo mode once (git-fixes).\n- cpufreq: powernv: Fix frame-size-overflow in powernv_cpufreq_work_fn (git-fixes).\n- cpuidle: Fix three reference count leaks (git-fixes).\n- crypto: algapi - Avoid spurious modprobe on LOADED (git-fixes).\n- crypto: algboss - do not wait during notifier callback (git-fixes).\n- crypto: algif_skcipher - Cap recv SG list at ctx-\u003eused (git-fixes).\n- crypto - Avoid free() namespace collision (git-fixes).\n- crypto: cavium/nitrox - Fix \u0027nitrox_get_first_device()\u0027 when ndevlist is fully iterated (git-fixes).\n- crypto: ccp -- do not \u0027select\u0027 CONFIG_DMADEVICES (git-fixes).\n- Crypto/chcr: fix for ccm(aes) failed test (git-fixes).\n- crypto: chelsio/chtls: properly set tp-\u003elsndtime (git-fixes).\n- crypto: drbg - fix error return code in drbg_alloc_state() (git-fixes).\n- crypto: omap-sham - add proper load balancing support for multicore (git-fixes).\n- crypto: stm32/crc32 - fix ext4 chksum BUG_ON() (git-fixes).\n- crypto: stm32/crc32 - fix multi-instance (git-fixes).\n- crypto: stm32/crc32 - fix run-time self test issue (git-fixes).\n- cxgb4: fix adapter crash due to wrong MC size (networking-stable-20_04_27).\n- cxgb4: fix large delays in PTP synchronization (networking-stable-20_04_27).\n- debugfs: Check module state before warning in {full/open}_proxy_open() (bsc#1173746).\n- devlink: fix return value after hitting end in region read (networking-stable-20_05_12).\n- devmap: Use bpf_map_area_alloc() for allocating hash buckets (bsc#1154353).\n- Disable PINCTRL_TIGERLAKE\n- dma-coherent: fix integer overflow in the reserved-memory dma allocation (git-fixes).\n- dma-debug: fix displaying of dma allocation type (git-fixes).\n- dma-direct: fix data truncation in dma_direct_get_required_mask() (git-fixes).\n- dmaengine: dmatest: Fix process hang when reading \u0027wait\u0027 parameter (git-fixes).\n- dmaengine: dmatest: Restore default for channel (git-fixes).\n- dmaengine: mmp_tdma: Do not ignore slave config validation errors (git-fixes).\n- dmaengine: mmp_tdma: Reset channel error on release (git-fixes).\n- dmaengine: owl: Use correct lock in owl_dma_get_pchan() (git-fixes).\n- dmaengine: pch_dma.c: Avoid data race between probe and irq handler (git-fixes).\n- dmaengine: tegra210-adma: Fix an error handling path in \u0027tegra_adma_probe()\u0027 (git-fixes).\n- dm verity fec: fix hash block number in verity_fec_decode (git fixes (block drivers)).\n- dm writecache: fix data corruption when reloading the target (git fixes (block drivers)).\n- dm writecache: reject asynchronous pmem devices (bsc#1156395).\n- dpaa2-eth: prevent array underflow in update_cls_rule() (networking-stable-20_05_16).\n- dpaa2-eth: properly handle buffer size restrictions (networking-stable-20_05_16).\n- dpaa_eth: fix usage as DSA master, try 3 (networking-stable-20_05_27).\n- drivers: base: Fix NULL pointer exception in __platform_driver_probe() if a driver developer is foolish (git-fixes).\n- Drivers: hv: Change flag to write log level in panic msg to false (bsc#1170617).\n- drivers/net/ibmvnic: Update VNIC protocol version reporting (bsc#1065729).\n- drivers: phy: sr-usb: do not use internal fsm for USB2 phy init (git-fixes).\n- drivers: soc: ti: knav_qmss_queue: Make knav_gp_range_ops static (git-fixes).\n- drm/amd/display: add basic atomic check for cursor plane (git-fixes).\n- drm/amd/display: drop cursor position check in atomic test (git-fixes).\n- drm: amd/display: fix Kconfig help text (bsc#1152489) \t* context changes\n- drm/amd/display: Only revalidate bandwidth on medium and fast updates (git-fixes).\n- drm/amd/display: Prevent dpcd reads with passive dongles (git-fixes).\n- drm/amd/display: Revalidate bandwidth before commiting DC updates (git-fixes).\n- drm/amd: fix potential memleak in err branch (git-fixes).\n- drm/amdgpu: add fw release for sdma v5_0 (git-fixes).\n- drm/amdgpu: drop redundant cg/pg ungate on runpm enter (git-fixes).\n- drm/amdgpu: fix gfx hang during suspend with video playback (v2) (git-fixes).\n- drm/amdgpu: fix the hw hang during perform system reboot and reset (git-fixes).\n- drm/amdgpu: force fbdev into vram (bsc#1152472) \t* context changes\n- drm/amdgpu: Init data to avoid oops while reading pp_num_states (git-fixes).\n- drm/amdgpu: invalidate L2 before SDMA IBs (v2) (git-fixes).\n- drm/amdgpu: move kfd suspend after ip_suspend_phase1 (git-fixes).\n- drm/amdgpu: Replace invalid device ID with a valid device ID (bsc#1152472)\n- drm/amdgpu: simplify padding calculations (v2) (git-fixes).\n- drm/amd/powerpay: Disable gfxoff when setting manual mode on picasso and raven (git-fixes).\n- drm/amd/powerplay: avoid using pm_en before it is initialized revised (git-fixes).\n- drm/amd/powerplay: perform PG ungate prior to CG ungate (git-fixes).\n- drm: bridge: adv7511: Extend list of audio sample rates (git-fixes).\n- drm/connector: notify userspace on hotplug after register complete (bsc#1152489) \t* context changes\n- drm/dp_mst: Increase ACT retry timeout to 3s (bsc#1152472) \t* context changes\n- drm/dp_mst: Reformat drm_dp_check_act_status() a bit (git-fixes).\n- drm/edid: Add Oculus Rift S to non-desktop list (git-fixes).\n- drm: encoder_slave: fix refcouting error for modules (git-fixes).\n- drm/etnaviv: fix perfmon domain interation (git-fixes).\n- drm/etnaviv: rework perfmon query infrastructure (git-fixes).\n- drm/i915: Do not enable WaIncreaseLatencyIPCEnabled when IPC is (bsc#1152489)\n- drm/i915: Do not enable WaIncreaseLatencyIPCEnabled when IPC is disabled (git-fixes).\n- drm/i915: extend audio CDCLK\u003e=2*BCLK constraint to more platforms (git-fixes).\n- drm/i915: Extend WaDisableDARBFClkGating to icl,ehl,tgl (bsc#1152489)\n- drm/i915: fix port checks for MST support on gen \u003e= 11 (git-fixes).\n- drm/i915/gem: Avoid iterating an empty list (git-fixes).\n- drm/i915/gt: Do not schedule normal requests immediately along (bsc#1152489)\n- drm/i915/gvt: Fix kernel oops for 3-level ppgtt guest (bsc#1152489)\n- drm/i915/gvt: Fix kernel oops for 3-level ppgtt guest (git-fixes).\n- drm/i915/gvt: Fix two CFL MMIO handling caused by regression. (bsc#1152489)\n- drm/i915/gvt: Fix two CFL MMIO handling caused by regression (git-fixes).\n- drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of (bsc#1152489)\n- drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of inheritance (git-fixes).\n- drm/i915: HDCP: fix Ri prime check done during link check (bsc#1152489) \t* context changes\n- drm/i915: HDCP: fix Ri prime check done during link check (git-fixes).\n- drm/i915/icl+: Fix hotplug interrupt disabling after storm detection (bsc#1152489)\n- drm/i915: Limit audio CDCLK\u003e=2*BCLK constraint back to GLK only (git-fixes).\n- drm/i915: Propagate error from completed fences (git-fixes).\n- drm/i915: Whitelist context-local timestamp in the gen9 cmdparser (git-fixes).\n- drm/i915: work around false-positive maybe-uninitialized warning (git-fixes).\n- drm/mcde: dsi: Fix return value check in mcde_dsi_bind() (git-fixes).\n- drm/msm: Check for powered down HW in the devfreq callbacks (bsc#1152489)\n- drm/msm/dpu: fix error return code in dpu_encoder_init (bsc#1152489)\n- drm/msm/dpu: fix error return code in dpu_encoder_init (git-fixes).\n- drm/msm/mdp5: Fix mdp5_init error path for failed mdp5_kms allocation (git-fixes).\n- drm/nouveau/disp/gm200-: fix NV_PDISP_SOR_HDMI2_CTRL(n) selection (git-fixes).\n- drm/qxl: lost qxl_bo_kunmap_atomic_page in qxl_image_init_helper() (git-fixes).\n- drm/qxl: Use correct notify port address when creating cursor ring (bsc#1152472)\n- drm/radeon: fix fb_div check in ni_init_smc_spll_table() (bsc#1152472)\n- drm: rcar-du: Fix build error (bsc#1152472)\n- drm/sun4i: hdmi ddc clk: Fix size of m divider (git-fixes).\n- drm: sun4i: hdmi: Remove extra HPD polling (bsc#1152489)\n- drm: sun4i: hdmi: Remove extra HPD polling (git-fixes).\n- drm/vkms: Hold gem object while still in-use (git-fixes).\n- Drop a couple of block layer git-fixes (bsc#1170891 bsc#1173139) \n- dwc3: Remove check for HWO flag in dwc3_gadget_ep_reclaim_trb_sg() (git-fixes).\n- e1000: Distribute switch variables for initialization (git-fixes).\n- e1000e: Disable TSO for buffer overrun workaround (git-fixes).\n- e1000e: Do not wake up the system via WOL if device wakeup is disabled (git-fixes).\n- e1000e: Relax condition to trigger reset for ME workaround (git-fixes).\n- EDAC/amd64: Add PCI device IDs for family 17h, model 70h (bsc#1165975).\n- EDAC/ghes: Setup DIMM label from DMI and use it in error reports (bsc#1168779).\n- EDAC/skx: Use the mcmtr register to retrieve close_pg/bank_xor_enable (bsc#1152489).\n- EDAC/synopsys: Do not dump uninitialized pinf-\u003ecol (bsc#1152489).\n- efi/efivars: Add missing kobject_put() in sysfs entry creation error path (git-fixes).\n- efi/random: Treat EFI_RNG_PROTOCOL output as bootloader randomness (jsc#SLE-12424).\n- efi: READ_ONCE rng seed size before munmap (jsc#SLE-12424).\n- efi/tpm: Verify event log header before parsing (bsc#1173461).\n- eventpoll: fix missing wakeup for ovflist in ep_poll_callback (bsc#1159867).\n- evm: Check also if *tfm is an error pointer in init_desc() (git-fixes).\n- evm: Fix a small race in init_desc() (git-fixes).\n- evm: Fix possible memory leak in evm_calc_hmac_or_hash() (git-fixes).\n- evm: Fix RCU list related warnings (git-fixes).\n- ext4: avoid utf8_strncasecmp() with unstable name (bsc#1173843).\n- ext4: fix error pointer dereference (bsc#1173837).\n- ext4: fix EXT_MAX_EXTENT/INDEX to check for zeroed eh_max (bsc#1173836).\n- ext4: fix partial cluster initialization when splitting extent (bsc#1173839).\n- ext4: fix race between ext4_sync_parent() and rename() (bsc#1173838).\n- ext4, jbd2: ensure panic by fix a race between jbd2 abort and ext4 error handlers (bsc#1173833).\n- ext4: stop overwrite the errcode in ext4_setup_super (bsc#1173841).\n- extcon: adc-jack: Fix an error handling path in \u0027adc_jack_probe()\u0027 (git-fixes).\n- fanotify: fix ignore mask logic for events on child and on dir (bsc#1172719).\n- fat: do not allow to mount if the FAT length == 0 (bsc#1173831).\n- fdt: add support for rng-seed (jsc#SLE-12424).\n- fdt: Update CRC check for rng-seed (jsc#SLE-12424).\n- firmware: imx: scu: Fix corruption of header (git-fixes).\n- firmware: imx: scu: Fix possible memory leak in imx_scu_probe() (git-fixes).\n- firmware: imx-scu: Support one TX and one RX (git-fixes).\n- firmware: imx: warn on unexpected RX (git-fixes).\n- firmware: qcom_scm: fix bogous abuse of dma-direct internals (git-fixes).\n- firmware: xilinx: Fix an error handling path in \u0027zynqmp_firmware_probe()\u0027 (git-fixes).\n- Fix a regression of AF_ALG crypto interface hang with aes_s390 (bsc#1167651)\n- Fix boot crash with MD (bsc#1173860) \n- fix multiplication overflow in copy_fdtable() (bsc#1173825).\n- fork: prevent accidental access to clone3 features (bsc#1174018).\n- fpga: dfl: afu: Corrected error handling levels (git-fixes).\n- fq_codel: fix TCA_FQ_CODEL_DROP_BATCH_SIZE sanity checks (networking-stable-20_05_12).\n- fs: Do not check if there is a fsnotify watcher on pseudo inodes (bsc#1158765).\n- fsnotify: Rearrange fast path to minimise overhead when there is no watcher (bsc#1158765).\n- genetlink: clean up family attributes allocations (git-fixes).\n- genetlink: fix memory leaks in genl_family_rcv_msg_dumpit() (bsc#1154353).\n- geneve: allow changing DF behavior after creation (git-fixes).\n- geneve: change from tx_error to tx_dropped on missing metadata (git-fixes).\n- gfs2: fix glock reference problem in gfs2_trans_remove_revoke (bsc#1173823).\n- gfs2: Multi-block allocations in gfs2_page_mkwrite (bsc#1173822).\n- gpio: bcm-kona: Fix return value of bcm_kona_gpio_probe() (git-fixes).\n- gpio: dwapb: Append MODULE_ALIAS for platform driver (git-fixes).\n- gpio: dwapb: Call acpi_gpiochip_free_interrupts() on GPIO chip de-registration (git-fixes).\n- gpio: exar: Fix bad handling for ida_simple_get error path (git-fixes).\n- gpiolib: Document that GPIO line names are not globally unique (git-fixes).\n- gpio: pca953x: fix handling of automatic address incrementing (git-fixes).\n- gpio: pca953x: Fix pca953x_gpio_set_config (git-fixes).\n- gpio: pxa: Fix return value of pxa_gpio_probe() (git-fixes).\n- gpio: tegra: mask GPIO IRQs during IRQ shutdown (git-fixes).\n- gpu/drm: Ingenic: Fix opaque pointer casted to wrong type (git-fixes).\n- habanalabs: Align protection bits configuration of all TPCs (git-fixes).\n- HID: Add quirks for Trust Panora Graphic Tablet (git-fixes).\n- HID: alps: Add AUI1657 device ID (git-fixes).\n- HID: alps: ALPS_1657 is too specific; use U1_UNICORN_LEGACY instead (git-fixes).\n- HID: i2c-hid: add Schneider SCL142ALM to descriptor override (git-fixes).\n- HID: i2c-hid: reset Synaptics SYNA2393 on resume (git-fixes).\n- HID: intel-ish-hid: avoid bogus uninitialized-variable warning (git-fixes).\n- HID: multitouch: add eGalaxTouch P80H84 support (git-fixes).\n- HID: multitouch: enable multi-input as a quirk for some devices (git-fixes).\n- HID: quirks: Add HID_QUIRK_NO_INIT_REPORTS quirk for Dell K12A keyboard-dock (git-fixes).\n- HID: sony: Fix for broken buttons on DS3 USB dongles (git-fixes).\n- hinic: fix a bug of ndo_stop (networking-stable-20_05_16).\n- hinic: fix wrong para of wait_for_completion_timeout (networking-stable-20_05_16).\n- hsr: check protocol version in hsr_newlink() (networking-stable-20_04_17).\n- hv_netvsc: Fix netvsc_start_xmit\u0027s return type (git-fixes).\n- hwmon: (acpi_power_meter) Fix potential memory leak in acpi_power_meter_add() (git-fixes).\n- hwmon: (k10temp) Add AMD family 17h model 60h PCI match (git-fixes).\n- hwmon: (max6697) Make sure the OVERT mask is set correctly (git-fixes).\n- hwmon: (pmbus) fix a typo in Kconfig SENSORS_IR35221 option (git-fixes).\n- i2c: acpi: put device when verifying client fails (git-fixes).\n- i2c: algo-pca: Add 0x78 as SCL stuck low status for PCA9665 (git-fixes).\n- i2c: altera: Fix race between xfer_msg and isr thread (git-fixes).\n- i2c: core: check returned size of emulated smbus block read (git-fixes).\n- i2c: designware-pci: Add support for Elkhart Lake PSE I2C (jsc#SLE-12734).\n- i2c: designware-pci: Fix BUG_ON during device removal (jsc#SLE-12734).\n- i2c: designware-pci: Switch over to MSI interrupts (jsc#SLE-12734).\n- i2c: dev: Fix the race between the release of i2c_dev and cdev (git-fixes).\n- i2c: fix missing pm_runtime_put_sync in i2c_device_probe (git-fixes).\n- i2c: fsi: Fix the port number field in status register (git-fixes).\n- i2c: mlxcpld: check correct size of maximum RECV_LEN packet (git-fixes).\n- i2c: mux: demux-pinctrl: Fix an error handling path in \u0027i2c_demux_pinctrl_probe()\u0027 (git-fixes).\n- i2c: piix4: Detect secondary SMBus controller on AMD AM4 chipsets (git-fixes).\n- i2c: pxa: clear all master action bits in i2c_pxa_stop_message() (git-fixes).\n- i2c: pxa: fix i2c_pxa_scream_blue_murder() debug output (git-fixes).\n- ibmveth: Fix max MTU limit (bsc#1173428 ltc#186397).\n- ibmvnic: continue to init in CRQ reset returns H_CLOSED (bsc#1173280 ltc#185369).\n- ibmvnic: Flush existing work items before device removal (bsc#1065729).\n- ibmvnic: Harden device login requests (bsc#1170011 ltc#183538).\n- IB/rdmavt: Free kernel completion queue when done (bsc#1173625).\n- ice: Fix error return code in ice_add_prof() (jsc#SLE-7926).\n- ice: Fix inability to set channels when down (jsc#SLE-7926).\n- ieee80211: Fix incorrect mask for default PE duration (git-fixes).\n- iio: adc: stm32-adc: fix device used to request dma (git-fixes).\n- iio: adc: stm32-adc: Use dma_request_chan() instead dma_request_slave_channel() (git-fixes).\n- iio: adc: stm32-dfsdm: fix device used to request dma (git-fixes).\n- iio: adc: stm32-dfsdm: Use dma_request_chan() instead dma_request_slave_channel() (git-fixes).\n- iio: adc: ti-ads8344: Fix channel selection (git-fixes).\n- iio: bmp280: fix compensation of humidity (git-fixes).\n- iio: buffer: Do not allow buffers without any channels enabled to be activated (git-fixes).\n- iio:chemical:pms7003: Fix timestamp alignment and prevent data leak (git-fixes).\n- iio:chemical:sps30: Fix timestamp alignment (git-fixes).\n- iio: dac: vf610: Fix an error handling path in \u0027vf610_dac_probe()\u0027 (git-fixes).\n- iio: pressure: bmp280: Tolerate IRQ before registering (git-fixes).\n- iio: sca3000: Remove an erroneous \u0027get_device()\u0027 (git-fixes).\n- iio: vcnl4000: Fix i2c swapped word reading (git-fixes).\n- ima: Call ima_calc_boot_aggregate() in ima_eventdigest_init() (bsc#1172223).\n- ima: Directly assign the ima_default_policy pointer to ima_rules (bsc#1172223) Delete obsoleted downstream fix\n- ima: Directly free *entry in ima_alloc_init_template() if digests is NULL (bsc#1172223).\n- ima: Remove __init annotation from ima_pcrread() (git-fixes).\n- include/asm-generic/topology.h: guard cpumask_of_node() macro argument (bsc#1148868).\n- Input: dlink-dir685-touchkeys - fix a typo in driver name (git-fixes).\n- Input: edt-ft5x06 - fix get_default register write access (git-fixes).\n- Input: evdev - call input_flush_device() on release(), not flush() (git-fixes).\n- Input: i8042 - add ThinkPad S230u to i8042 reset list (git-fixes).\n- input: i8042 - Remove special PowerPC handling (git-fixes).\n- Input: mms114 - fix handling of mms345l (git-fixes).\n- Input: synaptics - add a second working PNP_ID for Lenovo T470s (git-fixes).\n- Input: synaptics-rmi4 - fix error return code in rmi_driver_probe() (git-fixes).\n- Input: synaptics-rmi4 - really fix attn_data use-after-free (git-fixes).\n- Input: usbtouchscreen - add support for BonXeon TP (git-fixes).\n- Input: xpad - add custom init packet for Xbox One S controllers (git-fixes).\n- iocost: check active_list of all the ancestors in iocg_activate() (bsc#1173206).\n- iocost: do not let vrate run wild while there\u0027s no saturation signal (bsc1173206).\n- iocost: over-budget forced IOs should schedule async delay (bsc#1173206).\n- iommu/amd: Call domain_flush_complete() in update_domain() (bsc#1172061).\n- iommu/amd: Do not flush Device Table in iommu_map_page() (bsc#1172062).\n- iommu/amd: Do not loop forever when trying to increase address space (bsc#1172063).\n- iommu/amd: Fix legacy interrupt remapping for x2APIC-enabled system (bsc#1172393).\n- iommu/amd: Fix over-read of ACPI UID from IVRS table (bsc#1172064).\n- iommu/amd: Fix race in increase_address_space()/fetch_pte() (bsc#1172065).\n- iommu/amd: Update Device Table in increase_address_space() (bsc#1172066).\n- iommu: Fix reference count leak in iommu_group_alloc (bsc#1172394).\n- iommu/qcom: Fix local_base status check (bsc#1172067).\n- iommu/virtio: Reverse arguments to list_add (bsc#1172068).\n- ionic: add pcie_print_link_status (bsc#1167773).\n- ionic: export features for vlans to use (bsc#1167773).\n- ionic: no link check while resetting queues (bsc#1167773).\n- ionic: remove support for mgmt device (bsc#1167773).\n- ionic: tame the watchdog timer on reconfig (bsc#1167773).\n- ionic: wait on queue start until after IFF_UP (bsc#1167773).\n- io_uring: use kvfree() in io_sqe_buffer_register() (bsc#1173832).\n- ipmi: use vzalloc instead of kmalloc for user creation (git-fixes).\n- ipv4: Update fib_select_default to handle nexthop objects (networking-stable-20_04_27).\n- ipv6: fix IPV6_ADDRFORM operation logic (bsc#1171662).\n- ipvs: Improve robustness to the ipvs sysctl (git-fixes).\n- irqchip/al-fic: Add support for irq retrigger (jsc#SLE-10505).\n- irqchip/ti-sci-inta: Fix processing of masked irqs (git-fixes).\n- irqchip/versatile-fpga: Apply clear-mask earlier (git-fixes).\n- irqchip/versatile-fpga: Handle chained IRQs properly (git-fixes).\n- iwlwifi: avoid debug max amsdu config overwriting itself (git-fixes).\n- iwlwifi: mvm: fix aux station leak (git-fixes).\n- iwlwifi: mvm: limit maximum queue appropriately (git-fixes).\n- iwlwifi: pcie: handle QuZ configs with killer NICs as well (bsc#1172374).\n- ixgbe: do not check firmware errors (bsc#1170284).\n- jbd2: avoid leaking transaction credits when unreserving handle (bsc#1173845).\n- jbd2: fix data races at struct journal_head (bsc#1173438).\n- jbd2: Preserve kABI when adding j_abort_mutex (bsc#1173833).\n- kABI fixup mtk-vpu: avoid unaligned access to DTCM buffer (git-fixes).\n- kabi: hv: prevent struct device_node to become defined (bsc#1172871).\n- kabi: ppc64le: prevent struct dma_map_ops to become defined (jsc#SLE-12424).\n- kABI: protect struct fib_dump_filter (kabi).\n- kABI: protect struct mlx5_cmd_work_ent (kabi).\n- kabi/severities: Ingnore get_dev_data() The function is internal to the AMD IOMMU driver and must not be called by any third party.\n- kABI workaround for struct hdac_bus changes (git-fixes).\n- ktest: Add timeout for ssh sync testing (git-fixes).\n- KVM: Check validity of resolved slot when searching memslots (bsc#1172069).\n- KVM: x86/mmu: Set mmio_value to \u00270\u0027 if reserved #PF can\u0027t be generated (bsc#1171904).\n- KVM: x86: only do L1TF workaround on affected processors (bsc#1171904).\n- l2tp: Allow management of tunnels and session in user namespace (networking-stable-20_04_17).\n- libbpf: Fix perf_buffer__free() API for sparse allocs (bsc#1155518).\n- libceph: do not omit recovery_deletes in target_copy() (git-fixes).\n- libceph: ignore pool overlay and cache logic on redirects (bsc#1172938).\n- lib: devres: add a helper function for ioremap_uc (git-fixes).\n- libertas_tf: avoid a null dereference in pointer priv (git-fixes).\n- lib/lzo: fix ambiguous encoding bug in lzo-rle (git-fixes).\n- libnvdimm/btt: fix variable \u0027rc\u0027 set but not used (bsc#1162400).\n- libnvdimm: cover up nd_pfn_sb changes (bsc#1171759).\n- libnvdimm: cover up nd_region changes (bsc#1162400).\n- libnvdimm/dax: Pick the right alignment default when creating dax devices (bsc#1171759).\n- libnvdimm/label: Remove the dpa align check (bsc#1171759).\n- libnvdimm/namespace: Enforce memremap_compat_align() (bsc#1162400).\n- libnvdimm/namsepace: Do not set claim_class on error (bsc#1162400).\n- libnvdimm/of_pmem: Provide a unique name for bus provider (bsc#1171739).\n- libnvdimm: Out of bounds read in __nd_ioctl() (bsc#1065729).\n- libnvdimm/pfn_dev: Add a build check to make sure we notice when struct page size change (bsc#1171743).\n- libnvdimm/pfn_dev: Add page size and struct page size to pfn superblock (bsc#1171759).\n- libnvdimm/pfn: Prevent raw mode fallback if pfn-infoblock valid (bsc#1171743).\n- libnvdimm/pmem: Advance namespace seed for specific probe errors (bsc#1171743).\n- libnvdimm/region: Fix build error (bsc#1162400).\n- libnvdimm/region: Introduce an \u0027align\u0027 attribute (bsc#1162400).\n- libnvdimm/region: Introduce NDD_LABELING (bsc#1162400).\n- libnvdimm/region: Rewrite _probe_success() to _advance_seeds() (bsc#1171743).\n- libnvdimm: Use PAGE_SIZE instead of SZ_4K for align check (bsc#1171759).\n- lib: Uplevel the pmem \u0027region\u0027 ida to a global allocator (bc#1162400).\n- list: Add hlist_unhashed_lockless() (bsc#1173438).\n- livepatch: Apply vmlinux-specific KLP relocations early (bsc#1071995).\n- livepatch: Disallow vmlinux.ko (bsc#1071995).\n- livepatch: Make klp_apply_object_relocs static (bsc#1071995).\n- livepatch: Prevent module-specific KLP rela sections from referencing vmlinux symbols (bsc#1071995).\n- livepatch: Remove .klp.arch (bsc#1071995).\n- locktorture: Allow CPU-hotplug to be disabled via --bootargs (bsc#1173068).\n- loop: replace kill_bdev with invalidate_bdev (bsc#1173820).\n- lpfc_debugfs: get rid of pointless access_ok() (bsc#1171530).\n- lpfc: fix axchg pointer reference after free and double frees (bsc#1171530).\n- lpfc: Fix pointer checks and comments in LS receive refactoring (bsc#1171530).\n- lpfc: Fix return value in __lpfc_nvme_ls_abort (bsc#1171530).\n- lpfc: Synchronize NVME transport and lpfc driver devloss_tmo (bcs#1173060).\n- mac80211: mesh: fix discovery timer re-arming issue / crash (git-fixes).\n- mailbox: zynqmp-ipi: Fix NULL vs IS_ERR() check in zynqmp_ipi_mbox_probe() (git-fixes).\n- Make the \u0027Reducing compressed framebufer size\u0027 message be DRM_INFO_ONCE() (git-fixes).\n- mdraid: fix read/write bytes accounting (bsc#1172537).\n- media: cedrus: Program output format during each run (git-fixes).\n- media: dvbdev: Fix tuner-\u003edemod media controller link (git-fixes).\n- media: dvb: return -EREMOTEIO on i2c transfer failure (git-fixes).\n- media: dvbsky: add support for eyeTV Geniatech T2 lite (bsc#1173776).\n- media: dvbsky: add support for Mygica T230C v2 (bsc#1173776).\n- media: imx: imx7-mipi-csis: Cleanup and fix subdev pad format handling (git-fixes).\n- media: mtk-vpu: avoid unaligned access to DTCM buffer (git-fixes).\n- media: ov5640: fix use of destroyed mutex (git-fixes).\n- media: platform: fcp: Set appropriate DMA parameters (git-fixes).\n- media: Revert \u0027staging: imgu: Address a compiler warning on alignment\u0027 (git-fixes).\n- media: si2157: Better check for running tuner in init (git-fixes).\n- media: si2168: add support for Mygica T230C v2 (bsc#1173776).\n- media: staging: imgu: do not hold spinlock during freeing mmu page table (git-fixes).\n- media: staging/intel-ipu3: Implement lock for stream on/off operations (git-fixes).\n- media: staging: ipu3: Fix stale list entries on parameter queue failure (git-fixes).\n- media: staging: ipu3-imgu: Move alignment attribute to field (git-fixes).\n- media: vicodec: Fix error codes in probe function (git-fixes).\n- mei: release me_cl object reference (git-fixes).\n- mfd: intel-lpss: Add Intel Tiger Lake PCI IDs (jsc#SLE-12737).\n- mfd: intel-lpss: Use devm_ioremap_uc for MMIO (git-fixes).\n- mfd: stmfx: Fix stmfx_irq_init error path (git-fixes).\n- mfd: stmfx: Reset chip on resume as supply was disabled (git-fixes).\n- mfd: wm8994: Fix driver operation if loaded as modules (git-fixes).\n- misc: fastrpc: fix potential fastrpc_invoke_ctx leak (git-fixes).\n- misc: rtsx: Add short delay after exit from ASPM (git-fixes).\n- mlxsw: Fix some IS_ERR() vs NULL bugs (networking-stable-20_04_27).\n- mlxsw: spectrum_acl_tcam: Position vchunk in a vregion list properly (networking-stable-20_05_12).\n- mm: adjust vm_committed_as_batch according to vm overcommit policy (bnc#1173271).\n- mmc: block: Fix use-after-free issue for rpmb (git-fixes).\n- mmc: core: Use DEFINE_DEBUGFS_ATTRIBUTE instead of DEFINE_SIMPLE_ATTRIBUTE (git-fixes).\n- mmc: fix compilation of user API (git-fixes).\n- mmc: meson-mx-sdio: trigger a soft reset after a timeout or CRC error (git-fixes).\n- mmc: mmci_sdmmc: fix DMA API warning overlapping mappings (git-fixes).\n- mmc: sdhci-esdhc-imx: fix the mask for tuning start point (git-fixes).\n- mmc: sdhci-msm: Clear tuning done flag while hs400 tuning (git-fixes).\n- mmc: sdhci-msm: Set SDHCI_QUIRK_MULTIBLOCK_READ_ACMD12 quirk (git-fixes).\n- mmc: sdio: Fix potential NULL pointer error in mmc_sdio_init_card() (git-fixes).\n- mmc: sdio: Fix several potential memory leaks in mmc_sdio_init_card() (git-fixes).\n- mmc: tmio: Further fixup runtime PM management at remove (git-fixes).\n- mmc: uniphier-sd: call devm_request_irq() after tmio_mmc_host_probe() (git-fixes).\n- mmc: via-sdmmc: Respect the cmd-\u003ebusy_timeout from the mmc core (git-fixes).\n- mm: do not prepare anon_vma if vma has VM_WIPEONFORK (bsc#1169681).\n- mm: fix NUMA node file count error in replace_page_cache() (bsc#1173844).\n- mm: memcontrol: fix memory.low proportional distribution (bsc#1168230).\n- mm/memory_hotplug: refrain from adding memory into an impossible node (bsc#1173552).\n- mm/memremap: drop unused SECTION_SIZE and SECTION_MASK (bsc#1162400 bsc#1170895 ltc#184375 ltc#185686).\n- mm/memremap_pages: Introduce memremap_compat_align() (bsc#1162400).\n- mm/memremap_pages: Kill unused __devm_memremap_pages() (bsc#1162400).\n- mm/util.c: make vm_memory_committed() more accurate (bnc#1173271).\n- Move an upstreamed sound patch into sorted section\n- Move upstreamed IMA patches into sorted section\n- mt76: mt76x02u: Add support for newer versions of the XBox One wifi adapter (git-fixes).\n- mtd: Fix mtd not registered due to nvmem name collision (git-fixes).\n- mtd: rawnand: brcmnand: correctly verify erased pages (git-fixes).\n- mtd: rawnand: brcmnand: fix CS0 layout (git-fixes).\n- mtd: rawnand: brcmnand: fix hamming oob layout (git-fixes).\n- mtd: rawnand: diskonchip: Fix the probe error path (git-fixes).\n- mtd: rawnand: Fix nand_gpio_waitrdy() (git-fixes).\n- mtd: rawnand: ingenic: Fix the probe error path (git-fixes).\n- mtd: rawnand: marvell: Fix probe error path (git-fixes).\n- mtd: rawnand: marvell: Fix the condition on a return code (git-fixes).\n- mtd: rawnand: marvell: Use nand_cleanup() when the device is not yet registered (git-fixes).\n- mtd: rawnand: mtk: Fix the probe error path (git-fixes).\n- mtd: rawnand: onfi: Fix redundancy detection check (git-fixes).\n- mtd: rawnand: orion: Fix the probe error path (git-fixes).\n- mtd: rawnand: oxnas: Keep track of registered devices (git-fixes).\n- mtd: rawnand: oxnas: Release all devices in the _remove() path (git-fixes).\n- mtd: rawnand: pasemi: Fix the probe error path (git-fixes).\n- mtd: rawnand: plat_nand: Fix the probe error path (git-fixes).\n- mtd: rawnand: sharpsl: Fix the probe error path (git-fixes).\n- mtd: rawnand: socrates: Fix the probe error path (git-fixes).\n- mtd: rawnand: sunxi: Fix the probe error path (git-fixes).\n- mtd: rawnand: timings: Fix default tR_max and tCCS_min timings (git-fixes).\n- mtd: rawnand: tmio: Fix the probe error path (git-fixes).\n- mtd: rawnand: xway: Fix the probe error path (git-fixes).\n- mtd: spinand: Propagate ECC information to the MTD structure (git-fixes).\n- mtd: spi-nor: intel-spi: Add support for Intel Tiger Lake SPI serial flash (jsc#SLE-12737).\n- mvpp2: remove module bugfix (bsc#1154353).\n- mwifiex: avoid -Wstringop-overflow warning (git-fixes).\n- mwifiex: Fix memory corruption in dump_station (git-fixes).\n- namei: only return -ECHILD from follow_dotdot_rcu() (bsc#1173824).\n- neigh: send protocol value in neighbor create notification (networking-stable-20_05_12).\n- net: bcmgenet: correct per TX/RX ring statistics (networking-stable-20_04_27).\n- net: core: device_rename: Use rwsem instead of a seqcount (bsc#1162702).\n- net: do not return invalid table id error when we fall back to PF_UNSPEC (networking-stable-20_05_27).\n- net: dsa: b53: b53_arl_rw_op() needs to select IVL or SVL (networking-stable-20_04_27).\n- net: dsa: b53: Fix ARL register definitions (networking-stable-20_04_27).\n- net: dsa: b53: Lookup VID in ARL searches when VLAN is enabled (networking-stable-20_04_27).\n- net: dsa: b53: Rework ARL bin logic (networking-stable-20_04_27).\n- net: dsa: declare lockless TX feature for slave ports (bsc#1154353).\n- net: dsa: Do not leave DSA master with NULL netdev_ops (networking-stable-20_05_12).\n- net: dsa: loop: Add module soft dependency (networking-stable-20_05_16).\n- net: dsa: mt7530: fix roaming from DSA user ports (networking-stable-20_05_27).\n- net: dsa: mt7530: fix tagged frames pass-through in VLAN-unaware mode (networking-stable-20_04_17).\n- net: ena: xdp: update napi budget for DROP and ABORTED (bsc#1154492).\n- net: ena: xdp: XDP_TX: fix memory leak (bsc#1154492).\n- net: ethernet: ti: cpsw: fix ASSERT_RTNL() warning during suspend (networking-stable-20_05_27).\n- netfilter: connlabels: prefer static lock initialiser (git-fixes).\n- netfilter: nf_queue: enqueue skbs with NULL dst (git-fixes).\n- netfilter: nf_tables_offload: return EOPNOTSUPP if rule specifies no actions (git-fixes).\n- netfilter: nft_tproxy: Fix port selector on Big Endian (git-fixes).\n- netfilter: nft_tunnel: add the missing ERSPAN_VERSION nla_policy (git-fixes).\n- netfilter: not mark a spinlock as __read_mostly (git-fixes).\n- net: fix a potential recursive NETDEV_FEAT_CHANGE (networking-stable-20_05_16).\n- __netif_receive_skb_core: pass skb by reference (networking-stable-20_05_27).\n- net: inet_csk: Fix so_reuseport bind-address cache in tb-\u003efast* (networking-stable-20_05_27).\n- net: ipip: fix wrong address family in init error path (networking-stable-20_05_27).\n- net: ipv4: devinet: Fix crash when add/del multicast IP with autojoin (networking-stable-20_04_17).\n- net: ipv6: do not consider routes via gateways for anycast address check (networking-stable-20_04_17).\n- net: macb: fix an issue about leak related system resources (networking-stable-20_05_12).\n- net: macsec: preserve ingress frame ordering (networking-stable-20_05_12).\n- net/mlx4_core: Fix use of ENOSPC around mlx4_counter_alloc() (networking-stable-20_05_12).\n- net/mlx4_en: avoid indirect call in TX completion (networking-stable-20_04_27).\n- net/mlx5: Add command entry handling completion (networking-stable-20_05_27).\n- net/mlx5: Disable reload while removing the device (jsc#SLE-8464).\n- net/mlx5: DR, Fix freeing in dr_create_rc_qp() (jsc#SLE-8464).\n- net/mlx5e: Add missing release firmware call (networking-stable-20_04_17).\n- net/mlx5e: Fix inner tirs handling (networking-stable-20_05_27).\n- net/mlx5e: Fix pfnum in devlink port attribute (networking-stable-20_04_17).\n- net/mlx5e: Fix stats update for matchall classifier (jsc#SLE-8464).\n- net/mlx5e: kTLS, Destroy key object after destroying the TIS (networking-stable-20_05_27).\n- net/mlx5e: replace EINVAL in mlx5e_flower_parse_meta() (jsc#SLE-8464).\n- net/mlx5e: Update netdev txq on completions during closure (networking-stable-20_05_27).\n- net/mlx5: Fix cleaning unmanaged flow tables (jsc#SLE-8464).\n- net/mlx5: Fix command entry leak in Internal Error State (networking-stable-20_05_12).\n- net/mlx5: Fix crash upon suspend/resume (bsc#1172365).\n- net/mlx5: Fix error flow in case of function_setup failure (networking-stable-20_05_27).\n- net/mlx5: Fix forced completion access non initialized command entry (networking-stable-20_05_12).\n- net/mlx5: Fix frequent ioread PCI access during recovery (networking-stable-20_04_17).\n- net/mlx5: Fix memory leak in mlx5_events_init (networking-stable-20_05_27).\n- net: mvpp2: cls: Prevent buffer overflow in mvpp2_ethtool_cls_rule_del() (networking-stable-20_05_12).\n- net: mvpp2: fix RX hashing for non-10G ports (networking-stable-20_05_27).\n- net: mvpp2: prevent buffer overflow in mvpp22_rss_ctx() (networking-stable-20_05_12).\n- net: netrom: Fix potential nr_neigh refcnt leak in nr_add_node (networking-stable-20_04_27).\n- net: nlmsg_cancel() if put fails for nhmsg (networking-stable-20_05_27).\n- net: openvswitch: ovs_ct_exit to be done under ovs_lock (networking-stable-20_04_27).\n- net: phy: fix aneg restart in phy_ethtool_set_eee (networking-stable-20_05_16).\n- net: phy: propagate an error back to the callers of phy_sfp_probe (bsc#1154353).\n- netprio_cgroup: Fix unlimited memory leak of v2 cgroups (networking-stable-20_05_16).\n- net: qrtr: Fix passing invalid reference to qrtr_local_enqueue() (networking-stable-20_05_27).\n- net: qrtr: send msgs from local of same id as broadcast (networking-stable-20_04_17).\n- net: revert default NAPI poll timeout to 2 jiffies (networking-stable-20_04_17).\n- net: revert \u0027net: get rid of an signed integer overflow in ip_idents_reserve()\u0027 (bnc#1158748 (network regression)).\n- net sched: fix reporting the first-time use timestamp (networking-stable-20_05_27).\n- net_sched: sch_skbprio: add message validation to skbprio_change() (networking-stable-20_05_12).\n- net/smc: tolerate future SMCD versions (bsc#1172543 LTC#186069).\n- net: stmmac: fix num_por initialization (networking-stable-20_05_16).\n- net: stricter validation of untrusted gso packets (networking-stable-20_05_12).\n- net: tc35815: Fix phydev supported/advertising mask (networking-stable-20_05_12).\n- net: tcp: fix rx timestamp behavior for tcp_recvmsg (networking-stable-20_05_16).\n- net/tls: fix race condition causing kernel panic (networking-stable-20_05_27).\n- net/tls: Fix sk_psock refcnt leak in bpf_exec_tx_verdict() (networking-stable-20_05_12).\n- net/tls: Fix sk_psock refcnt leak when in tls_data_ready() (networking-stable-20_05_12).\n- net: tun: record RX queue in skb before do_xdp_generic() (networking-stable-20_04_17).\n- net: usb: qmi_wwan: add support for DW5816e (networking-stable-20_05_12).\n- net: vmxnet3: fix possible buffer overflow caused by bad DMA value in vmxnet3_get_rss() (bsc#1172484).\n- net/x25: Fix x25_neigh refcnt leak when receiving frame (networking-stable-20_04_27).\n- nexthop: Fix attribute checking for groups (networking-stable-20_05_27).\n- NFC: st21nfca: add missed kfree_skb() in an error path (git-fixes).\n- nfp: abm: fix a memory leak bug (networking-stable-20_05_12).\n- nfp: abm: fix error return code in nfp_abm_vnic_alloc() (networking-stable-20_05_16).\n- nfs: add minor version to nfs_server_key for fscache (bsc#1172467).\n- nfsd4: fix nfsdfs reference count loop (git-fixes).\n- nfsd4: make drc_slab global, not per-net (git-fixes).\n- nfsd: always check return value of find_any_file (bsc#1172208).\n- nfsd: apply umask on fs without ACL support (git-fixes).\n- nfsd: fix nfsdfs inode reference count leak (git-fixes).\n- NFS: Fix fscache super_cookie index_key from changing after umount (git-fixes).\n- nfs: fix NULL deference in nfs4_get_valid_delegation.\n- nfs: fscache: use timespec64 in inode auxdata (git-fixes).\n- nfs: set invalid blocks after NFSv4 writes (git-fixes).\n- NFSv4.1 fix rpc_call_done assignment for BIND_CONN_TO_SESSION (git-fixes).\n- NFSv4 fix CLOSE not waiting for direct IO compeletion (git-fixes).\n- NFSv4: Fix fscache cookie aux_data to ensure change_attr is included (git-fixes).\n- ntb: intel: add hw workaround for NTB BAR alignment (jsc#SLE-12710).\n- ntb: intel: Add Icelake (gen4) support for Intel NTB (jsc#SLE-12710).\n- ntb: intel: fix static declaration (jsc#SLE-12710).\n- nvdimm: Avoid race between probe and reading device attributes (bsc#1170442).\n- nvme-fc: avoid gcc-10 zero-length-bounds warning (bsc#1173206).\n- nvme-fc: do not call nvme_cleanup_cmd() for AENs (bsc#1171688).\n- nvme-fc: print proper nvme-fc devloss_tmo value (bsc#1172391).\n- objtool: Allow no-op CFI ops in alternatives (bsc#1169514).\n- objtool: Clean instruction state before each function validation (bsc#1169514).\n- objtool: Fix !CFI insn_state propagation (bsc#1169514).\n- objtool: Fix ORC vs alternatives (bsc#1169514).\n- objtool: Ignore empty alternatives (bsc#1169514).\n- objtool: Remove check preventing branches within alternative (bsc#1169514).\n- objtool: Rename struct cfi_state (bsc#1169514).\n- objtool: Uniquely identify alternative instruction groups (bsc#1169514).\n- p54usb: add AirVasT USB stick device-id (git-fixes).\n- panic: do not print uninitialized taint_flags (bsc#1172814).\n- PCI: aardvark: Do not blindly enable ASPM L0s and do not write to read-only register (git-fixes).\n- PCI: Add ACS quirk for Intel Root Complex Integrated Endpoints (git-fixes).\n- PCI: Add Loongson vendor ID (git-fixes).\n- PCI: Allow pci_resize_resource() for devices on root bus (git-fixes).\n- PCI: amlogic: meson: Do not use FAST_LINK_MODE to set up link (git-fixes).\n- PCI/ASPM: Allow ASPM on links to PCIe-to-PCI/PCI-X Bridges (git-fixes).\n- PCI: Avoid FLR for AMD Matisse HD Audio \u0026 USB 3.0 (git-fixes).\n- PCI: Avoid FLR for AMD Starship USB 3.0 (git-fixes).\n- PCI: brcmstb: Assert fundamental reset on initialization (git-fixes).\n- PCI: brcmstb: Assert fundamental reset on initialization (git-fixes).\n- PCI: brcmstb: Fix window register offset from 4 to 8 (git-fixes).\n- PCI: brcmstb: Fix window register offset from 4 to 8 (git-fixes).\n- PCI: Do not disable decoding when mmio_always_on is set (git-fixes).\n- PCI: dwc: Fix inner MSI IRQ domain registration (git-fixes).\n- pcie: mobiveil: remove patchset v9 Prepare to backport upstream version.\n- PCI: Fix pci_register_host_bridge() device_register() error handling (git-fixes).\n- PCI: hv: Change pci_protocol_version to per-hbus (bsc#1172871).\n- PCI: hv: Decouple the func definition in hv_dr_state from VSP message (bsc#1172871).\n- PCI: hv: Fix the PCI HyperV probe failure path to release resource properly (bsc#1172871).\n- PCI: hv: Introduce hv_msi_entry (bsc#1172871).\n- PCI: hv: Move hypercall related definitions into tlfs header (bsc#1172871).\n- PCI: hv: Move retarget related structures into tlfs header (bsc#1172871).\n- PCI: hv: Reorganize the code in preparation of hibernation (bsc#1172871).\n- PCI: hv: Retry PCI bus D0 entry on invalid device state (bsc#1172871).\n- PCI: mobiveil: Add 8-bit and 16-bit CSR register accessors (bsc#1161495).\n- PCI: mobiveil: Add callback function for interrupt initialization (bsc#1161495).\n- PCI: mobiveil: Add callback function for link up check (bsc#1161495).\n- PCI: mobiveil: Add Header Type field check (bsc#1161495).\n- PCI: mobiveil: Add PCIe Gen4 RC driver for Layerscape SoCs (bsc#1161495).\n- PCI: mobiveil: Allow mobiveil_host_init() to be used to re-init host (bsc#1161495).\n- PCI: mobiveil: Collect the interrupt related operations into a function (bsc#1161495).\n- PCI: mobiveil: Fix sparse different address space warnings (bsc#1161495).\n- PCI: mobiveil: Fix unmet dependency warning for PCIE_MOBIVEIL_PLAT (bsc#1161495).\n- PCI: mobiveil: Introduce a new structure mobiveil_root_port (bsc#1161495).\n- PCI: mobiveil: ls_pcie_g4: add Workaround for A-011451 (bsc#1161495).\n- PCI: mobiveil: ls_pcie_g4: add Workaround for A-011577 (bsc#1161495).\n- PCI: mobiveil: ls_pcie_g4: fix SError when accessing config space (bsc#1161495).\n- PCI: mobiveil: Modularize the Mobiveil PCIe Host Bridge IP driver (bsc#1161495).\n- PCI: mobiveil: Move the host initialization into a function (bsc#1161495).\n- PCI: pci-bridge-emul: Fix PCIe bit conflicts (git-fixes).\n- PCI/PM: Adjust pcie_wait_for_link_delay() for caller delay (git-fixes).\n- PCI/PM: Call .bridge_d3() hook only if non-NULL (git-fixes).\n- PCI: Program MPS for RCiEP devices (git-fixes).\n- PCI/PTM: Inherit Switch Downstream Port PTM settings from Upstream Port (git-fixes).\n- PCI: rcar: Fix incorrect programming of OB windows (git-fixes).\n- PCI: v3-semi: Fix a memory leak in v3_pci_probe() error handling paths (git-fixes).\n- PCI: vmd: Add device id for VMD device 8086:9A0B (git-fixes).\n- PCI: vmd: Filter resource type bits from shadow register (git-fixes).\n- pcm_native: result of put_user() needs to be checked (git-fixes).\n- perf/core: Fix endless multiplex timer (git-fixes).\n- perf/core: fix parent pid/tid in task exit events (git-fixes).\n- pinctrl: freescale: imx: Fix an error handling path in \u0027imx_pinctrl_probe()\u0027 (git-fixes).\n- pinctrl: freescale: imx: Use \u0027devm_of_iomap()\u0027 to avoid a resource leak in case of error in \u0027imx_pinctrl_probe()\u0027 (git-fixes).\n- pinctrl: imxl: Fix an error handling path in \u0027imx1_pinctrl_core_probe()\u0027 (git-fixes).\n- pinctrl: intel: Add Intel Tiger Lake pin controller support (jsc#SLE-12737).\n- pinctrl: ocelot: Fix GPIO interrupt decoding on Jaguar2 (git-fixes).\n- pinctrl: rockchip: fix memleak in rockchip_dt_node_to_map (git-fixes).\n- pinctrl: rza1: Fix wrong array assignment of rza1l_swio_entries (git-fixes).\n- pinctrl: samsung: Correct setting of eint wakeup mask on s5pv210 (git-fixes).\n- pinctrl: samsung: Save/restore eint_mask over suspend for EINT_TYPE GPIOs (git-fixes).\n- pinctrl: sprd: Fix the incorrect pull-up definition (git-fixes).\n- pinctrl: stmfx: stmfx_pinconf_set does not require to get direction anymore (git-fixes).\n- pinctrl: tegra: Use noirq suspend/resume callbacks (git-fixes).\n- pinctrl: tigerlake: Tiger Lake uses _HID enumeration (jsc#SLE-12737).\n- platform/x86: asus-nb-wmi: Do not load on Asus T100TA and T200TA (git-fixes).\n- platform/x86: asus_wmi: Reserve more space for struct bias_args (git-fixes).\n- platform/x86: dell-laptop: do not register micmute LED if there is no token (git-fixes).\n- platform/x86: hp-wmi: Convert simple_strtoul() to kstrtou32() (git-fixes).\n- platform/x86: intel-hid: Add a quirk to support HP Spectre X2 (2015) (git-fixes).\n- platform/x86: intel-vbtn: Also handle tablet-mode switch on \u0027Detachable\u0027 and \u0027Portable\u0027 chassis-types (git-fixes).\n- platform/x86: intel-vbtn: Do not advertise switches to userspace if they are not there (git-fixes).\n- platform/x86: intel-vbtn: Only blacklist SW_TABLET_MODE on the 9 / \u0027Laptop\u0027 chasis-type (git-fixes).\n- platform/x86: intel-vbtn: Split keymap into buttons and switches parts (git-fixes).\n- platform/x86: intel-vbtn: Use acpi_evaluate_integer() (git-fixes).\n- PM: runtime: clk: Fix clk_pm_runtime_get() error path (git-fixes).\n- pNFS/flexfiles: Fix list corruption if the mirror count changes (git-fixes).\n- pnp: Use list_for_each_entry() instead of open coding (git-fixes).\n- powerpc/64s: Do not let DT CPU features set FSCR_DSCR (bsc#1065729).\n- powerpc/64s/exception: Fix machine check no-loss idle wakeup (bsc#1156395).\n- powerpc/64s/kuap: Restore AMR in system reset exception (bsc#1156395).\n- powerpc/64s: Save FSCR to init_task.thread.fscr after feature init (bsc#1065729).\n- powerpc/book3s64: Export has_transparent_hugepage() related functions (bsc#1171759).\n- powerpc/bpf: Enable bpf_probe_read{, str}() on powerpc again (bsc#1172344).\n- powerpc/fadump: Account for memory_limit while reserving memory (jsc#SLE-9099 git-fixes).\n- powerpc/fadump: consider reserved ranges while reserving memory (jsc#SLE-9099 git-fixes).\n- powerpc/fadump: use static allocation for reserved memory ranges (jsc#SLE-9099 git-fixes).\n- powerpc/kuap: PPC_KUAP_DEBUG should depend on PPC_KUAP (bsc#1156395).\n- powerpc/powernv: Fix a warning message (bsc#1156395).\n- powerpc/setup_64: Set cache-line-size based on cache-block-size (bsc#1065729).\n- powerpc/xive: Clear the page tables for the ESB IO mapping (bsc#1085030).\n- power: reset: qcom-pon: reg write mask depends on pon generation (git-fixes).\n- power: supply: bq24257_charger: Replace depends on REGMAP_I2C with select (git-fixes).\n- power: supply: core: fix HWMON temperature labels (git-fixes).\n- power: supply: core: fix memory leak in HWMON error path (git-fixes).\n- power: supply: lp8788: Fix an error handling path in \u0027lp8788_charger_probe()\u0027 (git-fixes).\n- power: supply: smb347-charger: IRQSTAT_D is volatile (git-fixes).\n- pppoe: only process PADT targeted at local interfaces (networking-stable-20_05_16).\n- printk: queue wake_up_klogd irq_work only if per-CPU areas are ready (bsc#1172095).\n- proc/meminfo: avoid open coded reading of vm_committed_as (bnc#1173271).\n- proc: Use new_inode not new_inode_pseudo (bsc#1173830).\n- pwm: img: Call pm_runtime_put() in pm_runtime_get_sync() failed case (git-fixes).\n- pwm: sun4i: Move pwm_calculate() out of spin_lock() (git-fixes).\n- r8152: support additional Microsoft Surface Ethernet Adapter variant (git-fixes).\n- r8169: Revive default chip version for r8168 (bsc#1173085).\n- raid5: remove gfp flags from scribble_alloc() (bsc#1166985).\n- random: fix data races at timer_rand_state (bsc#1173438).\n- rcu: Avoid data-race in rcu_gp_fqs_check_wake() (bsc#1171828).\n- rcu: Fix data-race due to atomic_t copy-by-value (bsc#1171828).\n- rcu: Make rcu_read_unlock_special() checks match raise_softirq_irqoff() (bsc#1172046).\n- rcu: Simplify rcu_read_unlock_special() deferred wakeups (bsc#1172046).\n- rcutorture: Add 100-CPU configuration (bsc#1173068).\n- rcutorture: Add worst-case call_rcu() forward-progress results (bsc#1173068).\n- rcutorture: Dispense with Dracut for initrd creation (bsc#1173068).\n- rcutorture: Make kvm-find-errors.sh abort on bad directory (bsc#1173068).\n- rcutorture: Remove CONFIG_HOTPLUG_CPU=n from scenarios (bsc#1173068).\n- rcutorture: Summarize summary of build and run results (bsc#1173068).\n- rcutorture: Test TREE03 with the threadirqs kernel boot parameter (bsc#1173068).\n- rcu: Use *_ONCE() to protect lockless -\u003eexpmask accesses (bsc#1171828).\n- rcu: Use WRITE_ONCE() for assignments to -\u003epprev for hlist_nulls (bsc#1173438).\n- RDMA/bnxt_re: Remove dead code from rcfw (bsc#1170774).\n- RDMA/core: Check that type_attrs is not NULL prior access (jsc#SLE-8449).\n- RDMA/core: Move and rename trace_cm_id_create() (jsc#SLE-8449).\n- RDMA/mlx5: Fix NULL pointer dereference in destroy_prefetch_work (jsc#SLE-8446).\n- RDMA/nl: Do not permit empty devices names during RDMA_NLDEV_CMD_NEWLINK/SET (bsc#1172841).\n- RDMA/srpt: Fix disabling device management (jsc#SLE-8449).\n- RDMA/uverbs: Make the event_queue fds return POLLERR when disassociated (jsc#SLE-8449).\n- regualtor: pfuze100: correct sw1a/sw2 on pfuze3000 (git-fixes).\n- remoteproc: Add missing \u0027\\n\u0027 in log messages (git-fixes).\n- remoteproc: Fall back to using parent memory pool if no dedicated available (git-fixes).\n- remoteproc: Fix and restore the parenting hierarchy for vdev (git-fixes).\n- remoteproc: Fix IDR initialisation in rproc_alloc() (git-fixes).\n- remoteproc: qcom_q6v5_mss: map/unmap mpss segments before/after use (git-fixes).\n- Revert commit e918e570415c (\u0027tpm_tis: Remove the HID IFX0102\u0027) (git-fixes).\n- Revert \u0027drm/amd/display: disable dcn20 abm feature for bring up\u0027 (git-fixes).\n- Revert \u0027fs/seq_file.c: seq_read(): add info message about buggy .next functions\u0027 (bsc#1172751)\n- Revert \u0027i2c: tegra: Fix suspending in active runtime PM state\u0027 (git-fixes).\n- Revert \u0027pinctrl: freescale: imx: Use \u0027devm_of_iomap()\u0027 to avoid a resource leak in case of error in \u0027imx_pinctrl_probe()\u0027\u0027 (git-fixes).\n- ring-buffer: Zero out time extend if it is nested and not absolute (git-fixes).\n- rpm/modules.fips: * add aes-ce-ccm, des3_ede-x86_64, aes_ti and aes_neon_bsk\n- rtc: mc13xxx: fix a double-unlock issue (git-fixes).\n- rtc: rv3028: Add missed check for devm_regmap_init_i2c() (git-fixes).\n- rtlwifi: Fix a double free in _rtl_usb_tx_urb_setup() (git-fixes).\n- rtw88: fix an issue about leak system resources (git-fixes).\n- rxrpc: Fix call RCU cleanup using non-bh-safe locks (git-fixes).\n- s390/bpf: Maintain 8-byte stack alignment (bsc#1169194, LTC#185911).\n- s390/pci: Log new handle in clp_disable_fh() (git-fixes).\n- sata_rcar: handle pm_runtime_get_sync failure cases (git-fixes).\n- sch_choke: avoid potential panic in choke_reset() (networking-stable-20_05_12).\n- sched/cfs: change initial value of runnable_avg (bsc#1158765).\n- sched/core: Check cpus_mask, not cpus_ptr in __set_cpus_allowed_ptr(), to fix mask corruption (bnc#1155798 (CPU scheduler functional and performance backports)).\n- sched/core: Fix PI boosting between RT and DEADLINE tasks (bsc#1172823).\n- sched/core: Fix ttwu() race (bnc#1155798 (CPU scheduler functional and performance backports)).\n- sched/core: s/WF_ON_RQ/WQ_ON_CPU/ (bnc#1155798 (CPU scheduler functional and performance backports)).\n- sched/cpuacct: Fix charge cpuacct.usage_sys (bnc#1155798 (CPU scheduler functional and performance backports)).\n- sched/deadline: Initialize -\u003edl_boosted (bsc#1172823).\n- sched/deadline: Initialize -\u003edl_boosted (git fixes (sched)).\n- sched: etf: do not assume all sockets are full blown (networking-stable-20_04_27).\n- sched/fair: find_idlest_group(): Remove unused sd_flag parameter (bnc#1155798 (CPU scheduler functional and performance backports)).\n- sched/fair: Fix enqueue_task_fair() warning some more (bnc#1155798 (CPU scheduler functional and performance backports)).\n- sched/fair: fix nohz next idle balance (bnc#1155798 (CPU scheduler functional and performance backports)).\n- sched/fair: Optimize dequeue_task_fair() (bnc#1155798 (CPU scheduler functional and performance backports)).\n- sched/fair: Optimize enqueue_task_fair() (bnc#1155798 (CPU scheduler functional and performance backports)).\n- sched/fair: Simplify the code of should_we_balance() (bnc#1155798 (CPU scheduler functional and performance backports)).\n- sched: Fix loadavg accounting race (bnc#1155798 (CPU scheduler functional and performance backports)).\n- sched: Make newidle_balance() static again (bnc#1155798 (CPU scheduler functional and performance backports)).\n- sched: Offload wakee task activation if it the wakee is descheduling (bnc#1158748, bnc#1159781).\n- sched: Optimize ttwu() spinning on p-\u003eon_cpu (bnc#1158748, bnc#1159781).\n- sched/pelt: Sync util/runnable_sum with PELT window when propagating (bnc#1155798 (CPU scheduler functional and performance backports)).\n- sch_sfq: validate silly quantum values (networking-stable-20_05_12).\n- scripts/decodecode: fix trapping instruction formatting (bsc#1065729).\n- scsi: ibmvscsi: Do not send host info in adapter info MAD after LPM (bsc#1172759 ltc#184814).\n- scsi: lpfc: Add an internal trace log buffer (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Add blk_io_poll support for latency improvment (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Add support to display if adapter dumps are available (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Allow applications to issue Common Set Features mailbox command (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Change default queue allocation for reduced memory consumption (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n- scsi: lpfc: fix build failure with DEBUGFS disabled (bsc#1171530).\n- scsi: lpfc: Fix incomplete NVME discovery when target (bsc#1171530).\n- scsi: lpfc: Fix inconsistent indenting (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix interrupt assignments when multiple vectors are supported on same CPU (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix kdump hang on PPC (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix language in 0373 message to reflect non-error message (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix less-than-zero comparison of unsigned value (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix lpfc_nodelist leak when processing unsolicited event (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n- scsi: lpfc: Fix MDS Diagnostic Enablement definition (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n- scsi: lpfc: Fix memory leak on lpfc_bsg_write_ebuf_set func (bsc#1171530).\n- scsi: lpfc: Fix missing MDS functionality (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix negation of else clause in lpfc_prep_node_fc4type (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n- scsi: lpfc: Fix noderef and address space warnings (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n- scsi: lpfc: Fix NVMe rport deregister and registration during ADISC (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix oops due to overrun when reading SLI3 data (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix shost refcount mismatch when deleting vport (bsc#1172687 bsc#1171530).\n- scsi: lpfc: fix spelling mistakes of asynchronous (bsc#1171530).\n- scsi: lpfc: Fix stack trace seen while setting rrq active (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix unused assignment in lpfc_sli4_bsg_link_diag_test (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Maintain atomic consistency of queue_claimed flag (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n- scsi: lpfc: Make lpfc_defer_acc_rsp static (bsc#1171530).\n- scsi: lpfc: remove duplicate unloading checks (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n- scsi: lpfc: Remove re-binding of nvme rport during registration (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n- scsi: lpfc: Remove redundant initialization to variable rc (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n- scsi: lpfc: Remove unnecessary lockdep_assert_held calls (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n- scsi: lpfc: Update lpfc version to 12.8.0.1 (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n- scsi: lpfc: Update lpfc version to 12.8.0.2 (bsc#1172687 bsc#1171530).\n- scsi: megaraid_sas: Replace undefined MFI_BIG_ENDIAN macro with __BIG_ENDIAN_BITFIELD macro (bsc#1173206).\n- scsi: qla2xxx: Delete all sessions before unregister local nvme port (jsc#SLE-9714 jsc#SLE-10327 jsc#SLE-10334 bsc#1157169).\n- scsi: qla2xxx: Do not log message when reading port speed via sysfs (jsc#SLE-9714 jsc#SLE-10327 jsc#SLE-10334 bsc#1157169).\n- scsi: qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV (jsc#SLE-9714 jsc#SLE-10327 jsc#SLE-10334 bsc#1157169).\n- scsi: qla2xxx: Set NVMe status code for failed NVMe FCP request (bsc#1158983).\n- scsi: sd_zbc: Fix sd_zbc_complete() (bsc#1173206).\n- scsi: smartpqi: Update attribute name to `driver_version` (bsc#1173206).\n- scsi: zfcp: add diagnostics buffer for exchange config data (bsc#1158050).\n- scsi: zfcp: auto variables for dereferenced structs in open port handler (bsc#1158050).\n- scsi: zfcp: diagnostics buffer caching and use for exchange port data (bsc#1158050).\n- scsi: zfcp: enhance handling of FC Endpoint Security errors (bsc#1158050).\n- scsi: zfcp: expose fabric name as common fc_host sysfs attribute (bsc#1158050).\n- scsi: zfcp: Fence adapter status propagation for common statuses (bsc#1158050).\n- scsi: zfcp: Fence early sysfs interfaces for accesses of shost objects (bsc#1158050).\n- scsi: zfcp: Fence fc_host updates during link-down handling (bsc#1158050).\n- scsi: zfcp: fix fc_host attributes that should be unknown on local link down (bsc#1158050).\n- scsi: zfcp: fix wrong data and display format of SFP+ temperature (bsc#1158050).\n- scsi: zfcp: implicitly refresh config-data diagnostics when reading sysfs (bsc#1158050).\n- scsi: zfcp: implicitly refresh port-data diagnostics when reading sysfs (bsc#1158050).\n- scsi: zfcp: introduce sysfs interface for diagnostics of local SFP transceiver (bsc#1158050).\n- scsi: zfcp: introduce sysfs interface to read the local B2B-Credit (bsc#1158050).\n- scsi: zfcp: log FC Endpoint Security errors (bsc#1158050).\n- scsi: zfcp: log FC Endpoint Security of connections (bsc#1158050).\n- scsi: zfcp: Move allocation of the shost object to after xconf- and xport-data (bsc#1158050).\n- scsi: zfcp: Move fc_host updates during xport data handling into fenced function (bsc#1158050).\n- scsi: zfcp: move maximum age of diagnostic buffers into a per-adapter variable (bsc#1158050).\n- scsi: zfcp: Move p-t-p port allocation to after xport data (bsc#1158050).\n- scsi: zfcp: Move shost modification after QDIO (re-)open into fenced function (bsc#1158050).\n- scsi: zfcp: Move shost updates during xconfig data handling into fenced function (bsc#1158050).\n- scsi: zfcp: proper indentation to reduce confusion in zfcp_erp_required_act (bsc#1158050).\n- scsi: zfcp: report FC Endpoint Security in sysfs (bsc#1158050).\n- scsi: zfcp: signal incomplete or error for sync exchange config/port data (bsc#1158050).\n- scsi: zfcp: support retrieval of SFP Data via Exchange Port Data (bsc#1158050).\n- scsi: zfcp: trace FC Endpoint Security of FCP devices and connections (bsc#1158050).\n- scsi: zfcp: wire previously driver-specific sysfs attributes also to fc_host (bsc#1158050).\n- sctp: Do not add the shutdown timer if its already been added (networking-stable-20_05_27).\n- sctp: Start shutdown on association restart if in SHUTDOWN-SENT state and socket is closed (networking-stable-20_05_27).\n- selftests/bpf: CONFIG_IPV6_SEG6_BPF required for test_seg6_loop.o (bsc#1155518).\n- selftests/bpf: CONFIG_LIRC required for test_lirc_mode2.sh (bsc#1155518).\n- selftests/bpf: Fix invalid memory reads in core_relo selftest (bsc#1155518).\n- selftests/bpf: Fix memory leak in extract_build_id() (bsc#1155518).\n- selftests/bpf, flow_dissector: Close TAP device FD after the test (bsc#1155518).\n- selftests/bpf: Make sure optvals \u003e PAGE_SIZE are bypassed (bsc#1155518).\n- selftests/timens: handle a case when alarm clocks are not supported (bsc#1164648,jsc#SLE-11493).\n- serial: 8250: Fix max baud limit in generic 8250 port (git-fixes).\n- signal: Avoid corrupting si_pid and si_uid in do_notify_parent (bsc#1171529).\n- slimbus: core: Fix mismatch in of_node_get/put (git-fixes).\n- slimbus: ngd: get drvdata from correct device (git-fixes).\n- socionext: account for napi_gro_receive never returning GRO_DROP (bsc#1154353).\n- soc: mediatek: cmdq: return send msg error code (git-fixes).\n- soc: qcom: rpmh: Dirt can only make you dirtier, not cleaner (git-fixes).\n- soc: qcom: rpmh: Invalidate SLEEP and WAKE TCSes before flushing new data (git-fixes).\n- soc: qcom: rpmh-rsc: Allow using free WAKE TCS for active request (git-fixes).\n- soc: qcom: rpmh-rsc: Clear active mode configuration for wake TCS (git-fixes).\n- soc: qcom: rpmh: Update dirty flag only when data changes (git-fixes).\n- soc/tegra: pmc: Select GENERIC_PINCONF (git-fixes).\n- spi: bcm2835aux: Fix controller unregister order (git-fixes).\n- spi: bcm2835: Fix controller unregister order (git-fixes).\n- spi: bcm-qspi: Handle clock probe deferral (git-fixes).\n- spi: bcm-qspi: when tx/rx buffer is NULL set to 0 (git-fixes).\n- SPI: designware: pci: Switch over to MSI interrupts (jsc#SLE-12735).\n- spi: dt-bindings: spi-controller: Fix #address-cells for slave mode (git-fixes).\n- spi: dw: Add SPI Rx-done wait method to DMA-based transfer (git-fixes).\n- spi: dw: Add SPI Tx-done wait method to DMA-based transfer (git-fixes).\n- spi: dw: Enable interrupts in accordance with DMA xfer mode (git-fixes).\n- spi: dw: Fix controller unregister order (git-fixes).\n- spi: dw: Fix native CS being unset (git-fixes).\n- spi: dw: Fix Rx-only DMA transfers (git-fixes).\n- spi: dw-pci: Add MODULE_DEVICE_TABLE (jsc#SLE-12735).\n- spi: dw-pci: Add runtime power management support (jsc#SLE-12735).\n- spi: dw-pci: Add support for Intel Elkhart Lake PSE SPI (jsc#SLE-12735).\n- spi: dw-pci: Fix Chip Select amount on Intel Elkhart Lake PSE SPI (jsc#SLE-12735).\n- spi: dw: Return any value retrieved from the dma_transfer callback (git-fixes).\n- spi: dw: use \u0027smp_mb()\u0027 to avoid sending spi data error (git-fixes).\n- spi: dw: Zero DMA Tx and Rx configurations on stack (git-fixes).\n- spi: Fix controller unregister order (git-fixes).\n- spi: fsl: do not map irq during probe (git-fixes).\n- spi: fsl: use platform_get_irq() instead of of_irq_to_resource() (git-fixes).\n- spi: pxa2xx: Apply CS clk quirk to BXT (git-fixes).\n- spi: pxa2xx: Fix controller unregister order (git-fixes).\n- spi: pxa2xx: Fix runtime PM ref imbalance on probe error (git-fixes).\n- spi: Respect DataBitLength field of SpiSerialBusV2() ACPI resource (git-fixes).\n- spi: spi-fsl-dspi: Change usage pattern of SPI_MCR_* and SPI_CTAR_* macros (git-fixes).\n- spi: spi-fsl-dspi: Do not access reserved fields in SPI_MCR (git-fixes).\n- spi: spi-fsl-dspi: Fix 16-bit word order in 32-bit XSPI mode (git-fixes).\n- spi: spi-fsl-dspi: Replace interruptible wait queue with a simple completion (git-fixes).\n- spi: spi-mem: Fix Dual/Quad modes on Octal-capable devices (git-fixes).\n- spi: sprd: switch the sequence of setting WDG_LOAD_LOW and _HIGH (git-fixes).\n- staging: iio: ad2s1210: Fix SPI reading (git-fixes).\n- staging: kpc2000: fix error return code in kp2000_pcie_probe() (git-fixes).\n- staging: rtl8712: Fix IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK (git-fixes).\n- Staging: rtl8723bs: prevent buffer overflow in update_sta_support_rate() (git-fixes).\n- staging: sm750fb: add missing case while setting FB_VISUAL (git-fixes).\n- sun6i: dsi: fix gcc-4.8 (bsc#1152489)\n- sunrpc: fixed rollback in rpc_gssd_dummy_populate() (git-fixes).\n- SUNRPC: Properly set the @subbuf parameter of xdr_buf_subsegment() (git-fixes).\n- SUNRPC: Signalled ASYNC tasks need to exit (git-fixes).\n- supported.conf: Add pinctrl-tigerlake as supported\n- supported.conf: Mark two hwtracing helper modules as externally supported (bsc#1170879)\n- svcrdma: Fix leak of svc_rdma_recv_ctxt objects (git-fixes).\n- tcp: cache line align MAX_TCP_HEADER (networking-stable-20_04_27).\n- tcp: fix error recovery in tcp_zerocopy_receive() (networking-stable-20_05_16).\n- tcp: fix SO_RCVLOWAT hangs with fat skbs (networking-stable-20_05_16).\n- team: fix hang in team_mode_get() (networking-stable-20_04_27).\n- tg3: driver sleeps indefinitely when EEH errors exceed eeh_max_freezes (bsc#1173284).\n- thermal/drivers/mediatek: Fix bank number settings on mt8183 (git-fixes).\n- thermal/drivers/rcar_gen3: Fix undefined temperature if negative (git-fixes).\n- thermal/drivers/ti-soc-thermal: Avoid dereferencing ERR_PTR (git-fixes).\n- thermal: intel: intel_pch_thermal: Add Comet Lake (CML) platform support (jsc#SLE-12668).\n- tick/sched: Annotate lockless access to last_jiffies_update (bsc#1173438).\n- timer: Use hlist_unhashed_lockless() in timer_pending() (bsc#1173438).\n- tipc: block BH before using dst_cache (networking-stable-20_05_27).\n- tipc: fix partial topology connection closure (networking-stable-20_05_12).\n- torture: Allow \u0027CFLIST\u0027 to specify default list of scenarios (bsc#1173068).\n- torture: Expand last_ts variable in kvm-test-1-run.sh (bsc#1173068).\n- torture: Handle jitter for CPUs that cannot be offlined (bsc#1173068).\n- torture: Handle systems lacking the mpstat command (bsc#1173068).\n- torture: Hoist calls to lscpu to higher-level kvm.sh script (bsc#1173068).\n- torture: Make results-directory date format completion-friendly (bsc#1173068).\n- torture: Use gawk instead of awk for systime() function (bsc#1173068).\n- tpm: Fix TIS locality timeout problems (git-fixes).\n- tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send() (bsc#1065729).\n- tpm_tis: Remove the HID IFX0102 (git-fixes).\n- tracing: Fix event trigger to accept redundant spaces (git-fixes).\n- tty: n_gsm: Fix bogus i++ in gsm_data_kick (git-fixes).\n- tty: n_gsm: Fix SOF skipping (git-fixes).\n- tty: n_gsm: Fix waking up upper tty layer when room available (git-fixes).\n- tty: serial: add missing spin_lock_init for SiFive serial console (git-fixes).\n- tun: correct header offsets in napi frags mode (git-fixes).\n- tunnel: Propagate ECT(1) when decapsulating as recommended by RFC6040 (networking-stable-20_05_12).\n- ubifs: fix wrong use of crypto_shash_descsize() (bsc#1173827).\n- ubifs: remove broken lazytime support (bsc#1173826).\n- Update patch reference for intel_th patch (jsc#SLE-12705)\n- Update patch reference tag for ACPI lockdown fix (bsc#1173573)\n- Update the patch reference for ish-hid fix (jsc#SLE-12683)\n- usb: add USB_QUIRK_DELAY_INIT for Logitech C922 (git-fixes).\n- USB: core: Fix misleading driver bug report (git-fixes).\n- usb: core: hub: limit HUB_QUIRK_DISABLE_AUTOSUSPEND to USB5534B (git-fixes).\n- usb: dwc2: gadget: move gadget resume after the core is in L0 state (git-fixes).\n- usb: dwc3: gadget: Properly handle ClearFeature(halt) (git-fixes).\n- usb: dwc3: gadget: Properly handle failed kick_transfer (git-fixes).\n- usb: dwc3: pci: Enable extcon driver for Intel Merrifield (git-fixes).\n- usb/ehci-platform: Set PM runtime as active on resume (git-fixes).\n- USB: ehci: reopen solution for Synopsys HC bug (git-fixes).\n- usb: gadget: audio: Fix a missing error return value in audio_bind() (git-fixes).\n- USB: gadget: fix illegal array access in binding with UDC (git-fixes).\n- usb: gadget: fix potential double-free in m66592_probe (git-fixes).\n- usb: gadget: legacy: fix error return code in cdc_bind() (git-fixes).\n- usb: gadget: legacy: fix error return code in gncm_bind() (git-fixes).\n- usb: gadget: legacy: fix redundant initialization warnings (git-fixes).\n- usb: gadget: lpc32xx_udc: do not dereference ep pointer before null check (git-fixes).\n- usb: gadget: net2272: Fix a memory leak in an error handling path in \u0027net2272_plat_probe()\u0027 (git-fixes).\n- usb: gadget: udc: atmel: Make some symbols static (git-fixes).\n- usb: gadget: udc: Potential Oops in error handling code (git-fixes).\n- USB: gadget: udc: s3c2410_udc: Remove pointless NULL check in s3c2410_udc_nuke (git-fixes).\n- usb: host: ehci-exynos: Fix error check in exynos_ehci_probe() (git-fixes).\n- USB: host: ehci-mxc: Add error handling in ehci_mxc_drv_probe() (git-fixes).\n- usb: host: ehci-platform: add a quirk to avoid stuck (git-fixes).\n- usb: host: xhci-mtk: avoid runtime suspend when removing hcd (git-fixes).\n- usb: host: xhci-plat: keep runtime active when removing host (git-fixes).\n- usblp: poison URBs upon disconnect (git-fixes).\n- usb: musb: Fix runtime PM imbalance on error (git-fixes).\n- usb: musb: start session in resume for host port (git-fixes).\n- usb/ohci-platform: Fix a warning when hibernating (git-fixes).\n- USB: ohci-sm501: Add missed iounmap() in remove (git-fixes).\n- USB: ohci-sm501: fix error return code in ohci_hcd_sm501_drv_probe() (git-fixes).\n- usb: renesas_usbhs: getting residue from callback_result (git-fixes).\n- USB: serial: ch341: add basis for quirk detection (git-fixes).\n- USB: serial: option: add Telit LE910C1-EUX compositions (git-fixes).\n- USB: serial: qcserial: add DW5816e QDL support (git-fixes).\n- USB: serial: usb_wwan: do not resubmit rx urb on fatal errors (git-fixes).\n- usb: typec: tcpci_rt1711h: avoid screaming irq causing boot hangs (git-fixes).\n- usb: usbfs: correct kernel-\u003euser page attribute mismatch (git-fixes).\n- USB: usbfs: fix mmap dma mismatch (git-fixes).\n- usb/xhci-plat: Set PM runtime as active on resume (git-fixes).\n- vfio: avoid possible overflow in vfio_iommu_type1_pin_pages (git-fixes).\n- vfio: Ignore -ENODEV when getting MSI cookie (git-fixes).\n- vfio/mdev: Fix reference count leak in add_mdev_supported_type (git-fixes).\n- vfio/pci: fix memory leaks in alloc_perm_bits() (git-fixes).\n- vfio/type1: Fix VA-\u003ePA translation for PFNMAP VMAs in vaddr_get_pfn() (git-fixes).\n- video: fbdev: w100fb: Fix a potential double free (git-fixes).\n- video: vt8500lcdfb: fix fallthrough warning (bsc#1152489)\n- virtio-blk: handle block_device_operations callbacks after hot unplug (git fixes (block drivers)).\n- virtio_net: fix lockdep warning on 32 bit (networking-stable-20_05_16).\n- vmxnet3: add geneve and vxlan tunnel offload support (bsc#1172484).\n- vmxnet3: add support to get/set rx flow hash (bsc#1172484).\n- vmxnet3: allow rx flow hash ops only when rss is enabled (bsc#1172484).\n- vmxnet3: prepare for version 4 changes (bsc#1172484).\n- vmxnet3: update to version 4 (bsc#1172484).\n- vmxnet3: use correct hdr reference when packet is encapsulated (bsc#1172484).\n- vrf: Check skb for XFRM_TRANSFORMED flag (networking-stable-20_04_27).\n- vrf: Fix IPv6 with qdisc and xfrm (networking-stable-20_04_27).\n- vsprintf: do not obfuscate NULL and error pointers (bsc#1172086).\n- vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console (git-fixes).\n- vt: vt_ioctl: remove unnecessary console allocation checks (git-fixes).\n- vxlan: use the correct nlattr array in NL_SET_ERR_MSG_ATTR (networking-stable-20_04_27).\n- w1: omap-hdq: cleanup to add missing newline for some dev_dbg (git-fixes).\n- watchdog: da9062: No need to ping manually before setting timeout (git-fixes).\n- watchdog: imx_sc_wdt: Fix reboot on crash (git-fixes).\n- wcn36xx: Fix error handling path in \u0027wcn36xx_probe()\u0027 (git-fixes).\n- wil6210: account for napi_gro_receive never returning GRO_DROP (bsc#1154353).\n- wil6210: add wil_netif_rx() helper function (bsc#1154353).\n- wil6210: use after free in wil_netif_rx_any() (bsc#1154353).\n- wireguard: device: avoid circular netns references (git-fixes).\n- wireguard: noise: do not assign initiation time in if condition (git-fixes).\n- wireguard: noise: read preshared key while taking lock (bsc#1169021 jsc#SLE-12250).\n- wireguard: noise: separate receive counter from send counter (bsc#1169021 jsc#SLE-12250).\n- wireguard: queueing: preserve flow hash across packet scrubbing (bsc#1169021 jsc#SLE-12250).\n- wireguard: receive: account for napi_gro_receive never returning GRO_DROP (git-fixes).\n- wireguard: selftests: initalize ipv6 members to NULL to squelch clang warning (git-fixes).\n- wireguard: selftests: use newer iproute2 for gcc-10 (bsc#1169021 jsc#SLE-12250).\n- work around mvfs bug (bsc#1162063).\n- workqueue: do not use wq_select_unbound_cpu() for bound works (git-fixes).\n- workqueue: Remove the warning in wq_worker_sleeping() (git-fixes).\n- x86/amd_nb: Add AMD family 17h model 60h PCI IDs (git-fixes).\n- x86/cpu/amd: Make erratum #1054 a legacy erratum (bsc#1152489).\n- x86: Fix early boot crash on gcc-10, third try (bsc#1152489).\n- x86/mm/cpa: Flush direct map alias during cpa (bsc#1152489).\n- x86/PCI: Mark Intel C620 MROMs as having non-compliant BARs (git-fixes).\n- x86/reboot/quirks: Add MacBook6,1 reboot quirk (git-fixes).\n- x86/resctrl: Fix invalid attempt at removing the default resource group (bsc#1152489).\n- x86/resctrl: Preserve CDP enable over CPU hotplug (bsc#1152489).\n- x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks (bsc#1058115).\n- xfrm: Always set XFRM_TRANSFORMED in xfrm{4,6}_output_finish (networking-stable-20_04_27).\n- xfrm: fix error in comment (git fixes (block drivers)).\n- xfs: clean up the error handling in xfs_swap_extents (git-fixes).\n- xfs: do not commit sunit/swidth updates to disk if that would cause repair failures (bsc#1172169).\n- xfs: do not fail unwritten extent conversion on writeback due to edquot (bsc#1158242).\n- xfs: fix duplicate verification from xfs_qm_dqflush() (git-fixes).\n- xfs: force writes to delalloc regions to unwritten (bsc#1158242).\n- xfs: measure all contiguous previous extents for prealloc size (bsc#1158242).\n- xfs: preserve default grace interval during quotacheck (bsc#1172170).\n- xfs: refactor agfl length computation function (bsc#1172169).\n- xfs: split the sunit parameter update into two parts (bsc#1172169).\n- xhci: Fix enumeration issue when setting max packet size for FS devices (git-fixes).\n- xhci: Fix incorrect EP_STATE_MASK (git-fixes).\n- xhci: Poll for U0 after disabling USB2 LPM (git-fixes).\n- xhci: Return if xHCI does not support LPM (git-fixes).\n- xprtrdma: Fix handling of RDMA_ERROR replies (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-2027,SUSE-SLE-Module-Public-Cloud-15-SP2-2020-2027", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2027-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:2027-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20202027-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:2027-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" }, { "category": "self", "summary": "SUSE Bug 1058115", "url": "https://bugzilla.suse.com/1058115" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1085030", "url": "https://bugzilla.suse.com/1085030" }, { "category": "self", "summary": "SUSE Bug 1148868", "url": "https://bugzilla.suse.com/1148868" }, { "category": "self", "summary": "SUSE Bug 1152472", "url": "https://bugzilla.suse.com/1152472" }, { "category": "self", "summary": "SUSE Bug 1152489", "url": "https://bugzilla.suse.com/1152489" }, { "category": "self", "summary": "SUSE Bug 1153274", "url": "https://bugzilla.suse.com/1153274" }, { "category": "self", "summary": "SUSE Bug 1154353", "url": "https://bugzilla.suse.com/1154353" }, { "category": "self", "summary": "SUSE Bug 1154492", "url": "https://bugzilla.suse.com/1154492" }, { "category": "self", "summary": "SUSE Bug 1155518", "url": "https://bugzilla.suse.com/1155518" }, { "category": "self", "summary": "SUSE Bug 1155798", "url": "https://bugzilla.suse.com/1155798" }, { "category": "self", "summary": "SUSE Bug 1156395", "url": "https://bugzilla.suse.com/1156395" }, { "category": "self", "summary": "SUSE Bug 1157169", "url": "https://bugzilla.suse.com/1157169" }, { "category": "self", "summary": "SUSE Bug 1158050", "url": "https://bugzilla.suse.com/1158050" }, { "category": "self", "summary": "SUSE Bug 1158242", "url": "https://bugzilla.suse.com/1158242" }, { "category": "self", "summary": "SUSE Bug 1158265", "url": "https://bugzilla.suse.com/1158265" }, { "category": "self", "summary": "SUSE Bug 1158748", "url": "https://bugzilla.suse.com/1158748" }, { "category": "self", "summary": "SUSE Bug 1158765", "url": "https://bugzilla.suse.com/1158765" }, { "category": "self", "summary": "SUSE Bug 1158983", "url": "https://bugzilla.suse.com/1158983" }, { "category": "self", "summary": "SUSE Bug 1159781", "url": "https://bugzilla.suse.com/1159781" }, { "category": "self", "summary": "SUSE Bug 1159867", "url": "https://bugzilla.suse.com/1159867" }, { "category": "self", "summary": "SUSE Bug 1160947", "url": "https://bugzilla.suse.com/1160947" }, { "category": "self", "summary": "SUSE Bug 1161495", "url": "https://bugzilla.suse.com/1161495" }, { "category": "self", "summary": "SUSE Bug 1162002", "url": "https://bugzilla.suse.com/1162002" }, { "category": "self", "summary": "SUSE Bug 1162063", "url": "https://bugzilla.suse.com/1162063" }, { "category": "self", "summary": "SUSE Bug 1162400", "url": "https://bugzilla.suse.com/1162400" }, { "category": "self", "summary": "SUSE Bug 1162702", "url": "https://bugzilla.suse.com/1162702" }, { "category": "self", "summary": "SUSE Bug 1164648", "url": "https://bugzilla.suse.com/1164648" }, { "category": "self", "summary": "SUSE Bug 1164777", "url": "https://bugzilla.suse.com/1164777" }, { "category": "self", "summary": "SUSE Bug 1164780", "url": "https://bugzilla.suse.com/1164780" }, { "category": "self", "summary": "SUSE Bug 1165211", "url": "https://bugzilla.suse.com/1165211" }, { "category": "self", "summary": "SUSE Bug 1165975", "url": "https://bugzilla.suse.com/1165975" }, { "category": "self", "summary": "SUSE Bug 1166985", "url": "https://bugzilla.suse.com/1166985" }, { "category": "self", "summary": "SUSE Bug 1167104", "url": "https://bugzilla.suse.com/1167104" }, { "category": "self", "summary": "SUSE Bug 1167651", "url": "https://bugzilla.suse.com/1167651" }, { "category": "self", "summary": "SUSE Bug 1167773", "url": "https://bugzilla.suse.com/1167773" }, { "category": "self", "summary": "SUSE Bug 1168230", "url": "https://bugzilla.suse.com/1168230" }, { "category": "self", "summary": "SUSE Bug 1168779", "url": "https://bugzilla.suse.com/1168779" }, { "category": "self", "summary": "SUSE Bug 1168838", "url": "https://bugzilla.suse.com/1168838" }, { "category": "self", "summary": "SUSE Bug 1169021", "url": "https://bugzilla.suse.com/1169021" }, { "category": "self", "summary": "SUSE Bug 1169094", "url": "https://bugzilla.suse.com/1169094" }, { "category": "self", "summary": "SUSE Bug 1169194", "url": "https://bugzilla.suse.com/1169194" }, { "category": "self", "summary": "SUSE Bug 1169514", "url": "https://bugzilla.suse.com/1169514" }, { "category": "self", "summary": "SUSE Bug 1169681", "url": "https://bugzilla.suse.com/1169681" }, { "category": "self", "summary": "SUSE Bug 1170011", "url": "https://bugzilla.suse.com/1170011" }, { "category": "self", "summary": "SUSE Bug 1170284", "url": "https://bugzilla.suse.com/1170284" }, { "category": "self", "summary": "SUSE Bug 1170442", "url": "https://bugzilla.suse.com/1170442" }, { "category": "self", "summary": "SUSE Bug 1170617", "url": "https://bugzilla.suse.com/1170617" }, { "category": "self", "summary": "SUSE Bug 1170774", "url": "https://bugzilla.suse.com/1170774" }, { "category": "self", "summary": "SUSE Bug 1170879", "url": "https://bugzilla.suse.com/1170879" }, { "category": "self", "summary": "SUSE Bug 1170891", "url": "https://bugzilla.suse.com/1170891" }, { "category": "self", "summary": "SUSE Bug 1170895", "url": "https://bugzilla.suse.com/1170895" }, { "category": "self", "summary": "SUSE Bug 1171150", "url": "https://bugzilla.suse.com/1171150" }, { "category": "self", "summary": "SUSE Bug 1171189", "url": "https://bugzilla.suse.com/1171189" }, { "category": "self", "summary": "SUSE Bug 1171191", "url": "https://bugzilla.suse.com/1171191" }, { "category": "self", "summary": "SUSE Bug 1171219", "url": "https://bugzilla.suse.com/1171219" }, { "category": "self", "summary": "SUSE Bug 1171220", "url": "https://bugzilla.suse.com/1171220" }, { "category": "self", "summary": "SUSE Bug 1171246", "url": "https://bugzilla.suse.com/1171246" }, { "category": "self", "summary": "SUSE Bug 1171417", "url": "https://bugzilla.suse.com/1171417" }, { "category": "self", "summary": "SUSE Bug 1171513", "url": "https://bugzilla.suse.com/1171513" }, { "category": "self", "summary": "SUSE Bug 1171529", "url": "https://bugzilla.suse.com/1171529" }, { "category": "self", "summary": "SUSE Bug 1171530", "url": "https://bugzilla.suse.com/1171530" }, { "category": "self", "summary": "SUSE Bug 1171662", "url": "https://bugzilla.suse.com/1171662" }, { "category": "self", "summary": "SUSE Bug 1171688", "url": "https://bugzilla.suse.com/1171688" }, { "category": "self", "summary": "SUSE Bug 1171699", "url": "https://bugzilla.suse.com/1171699" }, { "category": "self", "summary": "SUSE Bug 1171732", "url": "https://bugzilla.suse.com/1171732" }, { "category": "self", "summary": "SUSE Bug 1171739", "url": "https://bugzilla.suse.com/1171739" }, { "category": "self", "summary": "SUSE Bug 1171743", "url": "https://bugzilla.suse.com/1171743" }, { "category": "self", "summary": "SUSE Bug 1171759", "url": "https://bugzilla.suse.com/1171759" }, { "category": "self", "summary": "SUSE Bug 1171828", "url": "https://bugzilla.suse.com/1171828" }, { "category": "self", "summary": "SUSE Bug 1171868", "url": "https://bugzilla.suse.com/1171868" }, { "category": "self", "summary": "SUSE Bug 1171904", "url": "https://bugzilla.suse.com/1171904" }, { "category": "self", "summary": "SUSE Bug 1171915", "url": "https://bugzilla.suse.com/1171915" }, { "category": "self", "summary": "SUSE Bug 1171982", "url": "https://bugzilla.suse.com/1171982" }, { "category": "self", "summary": "SUSE Bug 1171983", "url": "https://bugzilla.suse.com/1171983" }, { "category": "self", "summary": "SUSE Bug 1172017", "url": "https://bugzilla.suse.com/1172017" }, { "category": "self", "summary": "SUSE Bug 1172046", "url": "https://bugzilla.suse.com/1172046" }, { "category": "self", "summary": "SUSE Bug 1172061", "url": "https://bugzilla.suse.com/1172061" }, { "category": "self", "summary": "SUSE Bug 1172062", "url": "https://bugzilla.suse.com/1172062" }, { "category": "self", "summary": "SUSE Bug 1172063", "url": "https://bugzilla.suse.com/1172063" }, { "category": "self", "summary": "SUSE Bug 1172064", "url": "https://bugzilla.suse.com/1172064" }, { "category": "self", "summary": "SUSE Bug 1172065", "url": "https://bugzilla.suse.com/1172065" }, { "category": "self", "summary": "SUSE Bug 1172066", "url": "https://bugzilla.suse.com/1172066" }, { "category": "self", "summary": "SUSE Bug 1172067", "url": "https://bugzilla.suse.com/1172067" }, { "category": "self", "summary": "SUSE Bug 1172068", "url": "https://bugzilla.suse.com/1172068" }, { "category": "self", "summary": "SUSE Bug 1172069", "url": "https://bugzilla.suse.com/1172069" }, { "category": "self", "summary": "SUSE Bug 1172073", "url": "https://bugzilla.suse.com/1172073" }, { "category": "self", "summary": "SUSE Bug 1172086", "url": "https://bugzilla.suse.com/1172086" }, { "category": "self", "summary": "SUSE Bug 1172095", "url": "https://bugzilla.suse.com/1172095" }, { "category": "self", "summary": "SUSE Bug 1172169", "url": "https://bugzilla.suse.com/1172169" }, { "category": "self", "summary": "SUSE Bug 1172170", "url": "https://bugzilla.suse.com/1172170" }, { "category": "self", "summary": "SUSE Bug 1172208", "url": "https://bugzilla.suse.com/1172208" }, { "category": "self", "summary": "SUSE Bug 1172223", "url": "https://bugzilla.suse.com/1172223" }, { "category": "self", "summary": "SUSE Bug 1172342", "url": "https://bugzilla.suse.com/1172342" }, { "category": "self", "summary": "SUSE Bug 1172343", "url": "https://bugzilla.suse.com/1172343" }, { "category": "self", "summary": "SUSE Bug 1172344", "url": "https://bugzilla.suse.com/1172344" }, { "category": "self", "summary": "SUSE Bug 1172365", "url": "https://bugzilla.suse.com/1172365" }, { "category": "self", "summary": "SUSE Bug 1172366", "url": "https://bugzilla.suse.com/1172366" }, { "category": "self", "summary": "SUSE Bug 1172374", "url": "https://bugzilla.suse.com/1172374" }, { "category": "self", "summary": "SUSE Bug 1172391", "url": "https://bugzilla.suse.com/1172391" }, { "category": "self", "summary": "SUSE Bug 1172393", "url": "https://bugzilla.suse.com/1172393" }, { "category": "self", "summary": "SUSE Bug 1172394", "url": "https://bugzilla.suse.com/1172394" }, { "category": "self", "summary": "SUSE Bug 1172453", "url": "https://bugzilla.suse.com/1172453" }, { "category": "self", "summary": "SUSE Bug 1172458", "url": "https://bugzilla.suse.com/1172458" }, { "category": "self", "summary": "SUSE Bug 1172467", "url": "https://bugzilla.suse.com/1172467" }, { "category": "self", "summary": "SUSE Bug 1172484", "url": "https://bugzilla.suse.com/1172484" }, { "category": "self", "summary": "SUSE Bug 1172537", "url": "https://bugzilla.suse.com/1172537" }, { "category": "self", "summary": "SUSE Bug 1172543", "url": "https://bugzilla.suse.com/1172543" }, { "category": "self", "summary": "SUSE Bug 1172687", "url": "https://bugzilla.suse.com/1172687" }, { "category": "self", "summary": "SUSE Bug 1172719", "url": "https://bugzilla.suse.com/1172719" }, { "category": "self", "summary": "SUSE Bug 1172739", "url": "https://bugzilla.suse.com/1172739" }, { "category": "self", "summary": "SUSE Bug 1172751", "url": "https://bugzilla.suse.com/1172751" }, { "category": "self", "summary": "SUSE Bug 1172759", "url": "https://bugzilla.suse.com/1172759" }, { "category": "self", "summary": "SUSE Bug 1172775", "url": "https://bugzilla.suse.com/1172775" }, { "category": "self", "summary": "SUSE Bug 1172781", "url": "https://bugzilla.suse.com/1172781" }, { "category": "self", "summary": "SUSE Bug 1172782", "url": "https://bugzilla.suse.com/1172782" }, { "category": "self", "summary": "SUSE Bug 1172783", "url": "https://bugzilla.suse.com/1172783" }, { "category": "self", "summary": "SUSE Bug 1172814", "url": "https://bugzilla.suse.com/1172814" }, { "category": "self", "summary": "SUSE Bug 1172823", "url": "https://bugzilla.suse.com/1172823" }, { "category": "self", "summary": "SUSE Bug 1172841", "url": "https://bugzilla.suse.com/1172841" }, { "category": "self", "summary": "SUSE Bug 1172871", "url": "https://bugzilla.suse.com/1172871" }, { "category": "self", "summary": "SUSE Bug 1172938", "url": "https://bugzilla.suse.com/1172938" }, { "category": "self", "summary": "SUSE Bug 1172939", "url": "https://bugzilla.suse.com/1172939" }, { "category": "self", "summary": "SUSE Bug 1172940", "url": "https://bugzilla.suse.com/1172940" }, { "category": "self", "summary": "SUSE Bug 1172956", "url": "https://bugzilla.suse.com/1172956" }, { "category": "self", "summary": "SUSE Bug 1172983", "url": "https://bugzilla.suse.com/1172983" }, { "category": "self", "summary": "SUSE Bug 1172984", "url": "https://bugzilla.suse.com/1172984" }, { "category": "self", "summary": "SUSE Bug 1172985", "url": "https://bugzilla.suse.com/1172985" }, { "category": "self", "summary": "SUSE Bug 1172986", "url": "https://bugzilla.suse.com/1172986" }, { "category": "self", "summary": "SUSE Bug 1172987", "url": "https://bugzilla.suse.com/1172987" }, { "category": "self", "summary": "SUSE Bug 1172988", "url": "https://bugzilla.suse.com/1172988" }, { "category": "self", "summary": "SUSE Bug 1172989", "url": "https://bugzilla.suse.com/1172989" }, { "category": "self", "summary": "SUSE Bug 1172990", "url": "https://bugzilla.suse.com/1172990" }, { "category": "self", "summary": "SUSE Bug 1172999", "url": "https://bugzilla.suse.com/1172999" }, { "category": "self", "summary": "SUSE Bug 1173060", "url": "https://bugzilla.suse.com/1173060" }, { "category": "self", "summary": "SUSE Bug 1173068", "url": "https://bugzilla.suse.com/1173068" }, { "category": "self", "summary": "SUSE Bug 1173085", "url": "https://bugzilla.suse.com/1173085" }, { "category": "self", "summary": "SUSE Bug 1173139", "url": "https://bugzilla.suse.com/1173139" }, { "category": "self", "summary": "SUSE Bug 1173206", "url": "https://bugzilla.suse.com/1173206" }, { "category": "self", "summary": "SUSE Bug 1173271", "url": "https://bugzilla.suse.com/1173271" }, { "category": "self", "summary": "SUSE Bug 1173280", "url": "https://bugzilla.suse.com/1173280" }, { "category": "self", "summary": "SUSE Bug 1173284", "url": "https://bugzilla.suse.com/1173284" }, { "category": "self", "summary": "SUSE Bug 1173428", "url": "https://bugzilla.suse.com/1173428" }, { "category": "self", "summary": "SUSE Bug 1173438", "url": "https://bugzilla.suse.com/1173438" }, { "category": "self", "summary": "SUSE Bug 1173461", "url": "https://bugzilla.suse.com/1173461" }, { "category": "self", "summary": "SUSE Bug 1173514", "url": "https://bugzilla.suse.com/1173514" }, { "category": "self", "summary": "SUSE Bug 1173552", "url": "https://bugzilla.suse.com/1173552" }, { "category": "self", "summary": "SUSE Bug 1173573", "url": "https://bugzilla.suse.com/1173573" }, { "category": "self", "summary": "SUSE Bug 1173625", "url": "https://bugzilla.suse.com/1173625" }, { "category": "self", "summary": "SUSE Bug 1173746", "url": "https://bugzilla.suse.com/1173746" }, { "category": "self", "summary": "SUSE Bug 1173776", "url": "https://bugzilla.suse.com/1173776" }, { "category": "self", "summary": "SUSE Bug 1173817", "url": "https://bugzilla.suse.com/1173817" }, { "category": "self", "summary": "SUSE Bug 1173818", "url": "https://bugzilla.suse.com/1173818" }, { "category": "self", "summary": "SUSE Bug 1173820", "url": "https://bugzilla.suse.com/1173820" }, { "category": "self", "summary": "SUSE Bug 1173822", "url": "https://bugzilla.suse.com/1173822" }, { "category": "self", "summary": "SUSE Bug 1173823", "url": "https://bugzilla.suse.com/1173823" }, { "category": "self", "summary": "SUSE Bug 1173824", "url": "https://bugzilla.suse.com/1173824" }, { "category": "self", "summary": "SUSE Bug 1173825", "url": "https://bugzilla.suse.com/1173825" }, { "category": "self", "summary": "SUSE Bug 1173826", "url": "https://bugzilla.suse.com/1173826" }, { "category": "self", "summary": "SUSE Bug 1173827", "url": "https://bugzilla.suse.com/1173827" }, { "category": "self", "summary": "SUSE Bug 1173828", "url": "https://bugzilla.suse.com/1173828" }, { "category": "self", "summary": "SUSE Bug 1173830", "url": "https://bugzilla.suse.com/1173830" }, { "category": "self", "summary": "SUSE Bug 1173831", "url": "https://bugzilla.suse.com/1173831" }, { "category": "self", "summary": "SUSE Bug 1173832", "url": "https://bugzilla.suse.com/1173832" }, { "category": "self", "summary": "SUSE Bug 1173833", "url": "https://bugzilla.suse.com/1173833" }, { "category": "self", "summary": "SUSE Bug 1173834", "url": "https://bugzilla.suse.com/1173834" }, { "category": "self", "summary": "SUSE Bug 1173836", "url": "https://bugzilla.suse.com/1173836" }, { "category": "self", "summary": "SUSE Bug 1173837", "url": "https://bugzilla.suse.com/1173837" }, { "category": "self", "summary": "SUSE Bug 1173838", "url": "https://bugzilla.suse.com/1173838" }, { "category": "self", "summary": "SUSE Bug 1173839", "url": "https://bugzilla.suse.com/1173839" }, { "category": "self", "summary": "SUSE Bug 1173841", "url": "https://bugzilla.suse.com/1173841" }, { "category": "self", "summary": "SUSE Bug 1173843", "url": "https://bugzilla.suse.com/1173843" }, { "category": "self", "summary": "SUSE Bug 1173844", "url": "https://bugzilla.suse.com/1173844" }, { "category": "self", "summary": "SUSE Bug 1173845", "url": "https://bugzilla.suse.com/1173845" }, { "category": "self", "summary": "SUSE Bug 1173847", "url": "https://bugzilla.suse.com/1173847" }, { "category": "self", "summary": "SUSE Bug 1173860", "url": "https://bugzilla.suse.com/1173860" }, { "category": "self", "summary": "SUSE Bug 1173894", "url": "https://bugzilla.suse.com/1173894" }, { "category": "self", "summary": "SUSE Bug 1174018", "url": "https://bugzilla.suse.com/1174018" }, { "category": "self", "summary": "SUSE Bug 1174244", "url": "https://bugzilla.suse.com/1174244" }, { "category": "self", "summary": "SUSE Bug 1174345", "url": "https://bugzilla.suse.com/1174345" }, { "category": "self", "summary": "SUSE CVE CVE-2019-19462 page", "url": "https://www.suse.com/security/cve/CVE-2019-19462/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20810 page", "url": "https://www.suse.com/security/cve/CVE-2019-20810/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20812 page", "url": "https://www.suse.com/security/cve/CVE-2019-20812/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10711 page", "url": "https://www.suse.com/security/cve/CVE-2020-10711/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10732 page", "url": "https://www.suse.com/security/cve/CVE-2020-10732/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10751 page", "url": "https://www.suse.com/security/cve/CVE-2020-10751/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10766 page", "url": "https://www.suse.com/security/cve/CVE-2020-10766/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10767 page", "url": "https://www.suse.com/security/cve/CVE-2020-10767/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10768 page", "url": "https://www.suse.com/security/cve/CVE-2020-10768/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10773 page", "url": "https://www.suse.com/security/cve/CVE-2020-10773/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12656 page", "url": "https://www.suse.com/security/cve/CVE-2020-12656/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12769 page", "url": "https://www.suse.com/security/cve/CVE-2020-12769/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12771 page", "url": "https://www.suse.com/security/cve/CVE-2020-12771/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12888 page", "url": "https://www.suse.com/security/cve/CVE-2020-12888/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-13143 page", "url": "https://www.suse.com/security/cve/CVE-2020-13143/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-13974 page", "url": "https://www.suse.com/security/cve/CVE-2020-13974/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14416 page", "url": "https://www.suse.com/security/cve/CVE-2020-14416/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15393 page", "url": "https://www.suse.com/security/cve/CVE-2020-15393/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15780 page", "url": "https://www.suse.com/security/cve/CVE-2020-15780/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-07-23T11:49:37Z", "generator": { "date": "2020-07-23T11:49:37Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:2027-1", "initial_release_date": "2020-07-23T11:49:37Z", "revision_history": [ { "date": "2020-07-23T11:49:37Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-azure-5.3.18-18.5.1.noarch", "product": { "name": "kernel-devel-azure-5.3.18-18.5.1.noarch", "product_id": "kernel-devel-azure-5.3.18-18.5.1.noarch" } }, { "category": "product_version", "name": "kernel-source-azure-5.3.18-18.5.1.noarch", "product": { "name": "kernel-source-azure-5.3.18-18.5.1.noarch", "product_id": "kernel-source-azure-5.3.18-18.5.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-azure-5.3.18-18.5.1.x86_64", "product": { "name": "cluster-md-kmp-azure-5.3.18-18.5.1.x86_64", "product_id": "cluster-md-kmp-azure-5.3.18-18.5.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-azure-5.3.18-18.5.1.x86_64", "product": { "name": "dlm-kmp-azure-5.3.18-18.5.1.x86_64", "product_id": "dlm-kmp-azure-5.3.18-18.5.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-azure-5.3.18-18.5.1.x86_64", "product": { "name": "gfs2-kmp-azure-5.3.18-18.5.1.x86_64", "product_id": "gfs2-kmp-azure-5.3.18-18.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-5.3.18-18.5.1.x86_64", "product": { "name": "kernel-azure-5.3.18-18.5.1.x86_64", "product_id": "kernel-azure-5.3.18-18.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-devel-5.3.18-18.5.1.x86_64", "product": { "name": "kernel-azure-devel-5.3.18-18.5.1.x86_64", "product_id": "kernel-azure-devel-5.3.18-18.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-extra-5.3.18-18.5.1.x86_64", "product": { "name": "kernel-azure-extra-5.3.18-18.5.1.x86_64", "product_id": "kernel-azure-extra-5.3.18-18.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-livepatch-devel-5.3.18-18.5.1.x86_64", "product": { "name": "kernel-azure-livepatch-devel-5.3.18-18.5.1.x86_64", "product_id": "kernel-azure-livepatch-devel-5.3.18-18.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-azure-5.3.18-18.5.1.x86_64", "product": { "name": "kernel-syms-azure-5.3.18-18.5.1.x86_64", "product_id": "kernel-syms-azure-5.3.18-18.5.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-azure-5.3.18-18.5.1.x86_64", "product": { "name": "kselftests-kmp-azure-5.3.18-18.5.1.x86_64", "product_id": "kselftests-kmp-azure-5.3.18-18.5.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-azure-5.3.18-18.5.1.x86_64", "product": { "name": "ocfs2-kmp-azure-5.3.18-18.5.1.x86_64", "product_id": "ocfs2-kmp-azure-5.3.18-18.5.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-azure-5.3.18-18.5.1.x86_64", "product": { "name": "reiserfs-kmp-azure-5.3.18-18.5.1.x86_64", "product_id": "reiserfs-kmp-azure-5.3.18-18.5.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 15 SP2", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 15 SP2", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-5.3.18-18.5.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.5.1.x86_64" }, "product_reference": "kernel-azure-5.3.18-18.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-5.3.18-18.5.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.5.1.x86_64" }, "product_reference": "kernel-azure-devel-5.3.18-18.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-5.3.18-18.5.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.5.1.noarch" }, "product_reference": "kernel-devel-azure-5.3.18-18.5.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-5.3.18-18.5.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.5.1.noarch" }, "product_reference": "kernel-source-azure-5.3.18-18.5.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-5.3.18-18.5.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.5.1.x86_64" }, "product_reference": "kernel-syms-azure-5.3.18-18.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-19462", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-19462" } ], "notes": [ { "category": "general", "text": "relay_open in kernel/relay.c in the Linux kernel through 5.4.1 allows local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-19462", "url": "https://www.suse.com/security/cve/CVE-2019-19462" }, { "category": "external", "summary": "SUSE Bug 1158265 for CVE-2019-19462", "url": "https://bugzilla.suse.com/1158265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-07-23T11:49:37Z", "details": "low" } ], "title": "CVE-2019-19462" }, { "cve": "CVE-2019-20810", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20810" } ], "notes": [ { "category": "general", "text": "go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel before 5.6 does not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20810", "url": "https://www.suse.com/security/cve/CVE-2019-20810" }, { "category": "external", "summary": "SUSE Bug 1172458 for CVE-2019-20810", "url": "https://bugzilla.suse.com/1172458" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-07-23T11:49:37Z", "details": "low" } ], "title": "CVE-2019-20810" }, { "cve": "CVE-2019-20812", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20812" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.4.7. The prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20812", "url": "https://www.suse.com/security/cve/CVE-2019-20812" }, { "category": "external", "summary": "SUSE Bug 1172453 for CVE-2019-20812", "url": "https://bugzilla.suse.com/1172453" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-07-23T11:49:37Z", "details": "moderate" } ], "title": "CVE-2019-20812" }, { "cve": "CVE-2020-10711", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10711" } ], "notes": [ { "category": "general", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s SELinux subsystem in versions before 5.7. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol\u0027s category bitmap into the SELinux extensible bitmap via the\u0027 ebitmap_netlbl_import\u0027 routine. While processing the CIPSO restricted bitmap tag in the \u0027cipso_v4_parsetag_rbm\u0027 routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allows a remote network user to crash the system kernel, resulting in a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10711", "url": "https://www.suse.com/security/cve/CVE-2020-10711" }, { "category": "external", "summary": "SUSE Bug 1171191 for CVE-2020-10711", "url": "https://bugzilla.suse.com/1171191" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-07-23T11:49:37Z", "details": "moderate" } ], "title": "CVE-2020-10711" }, { "cve": "CVE-2020-10732", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10732" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10732", "url": "https://www.suse.com/security/cve/CVE-2020-10732" }, { "category": "external", "summary": "SUSE Bug 1171220 for CVE-2020-10732", "url": "https://bugzilla.suse.com/1171220" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-07-23T11:49:37Z", "details": "low" } ], "title": "CVE-2020-10732" }, { "cve": "CVE-2020-10751", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10751" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10751", "url": "https://www.suse.com/security/cve/CVE-2020-10751" }, { "category": "external", "summary": "SUSE Bug 1171189 for CVE-2020-10751", "url": "https://bugzilla.suse.com/1171189" }, { "category": "external", "summary": "SUSE Bug 1174963 for CVE-2020-10751", "url": "https://bugzilla.suse.com/1174963" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-07-23T11:49:37Z", "details": "moderate" } ], "title": "CVE-2020-10751" }, { "cve": "CVE-2020-10766", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10766" } ], "notes": [ { "category": "general", "text": "A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10766", "url": "https://www.suse.com/security/cve/CVE-2020-10766" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172781 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1172781" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-07-23T11:49:37Z", "details": "moderate" } ], "title": "CVE-2020-10766" }, { "cve": "CVE-2020-10767", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10767" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10767", "url": "https://www.suse.com/security/cve/CVE-2020-10767" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172782 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1172782" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-07-23T11:49:37Z", "details": "moderate" } ], "title": "CVE-2020-10767" }, { "cve": "CVE-2020-10768", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10768" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10768", "url": "https://www.suse.com/security/cve/CVE-2020-10768" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172783 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1172783" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-07-23T11:49:37Z", "details": "moderate" } ], "title": "CVE-2020-10768" }, { "cve": "CVE-2020-10773", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10773" } ], "notes": [ { "category": "general", "text": "A stack information leak flaw was found in s390/s390x in the Linux kernel\u0027s memory manager functionality, where it incorrectly writes to the /proc/sys/vm/cmm_timeout file. This flaw allows a local user to see the kernel data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10773", "url": "https://www.suse.com/security/cve/CVE-2020-10773" }, { "category": "external", "summary": "SUSE Bug 1172999 for CVE-2020-10773", "url": "https://bugzilla.suse.com/1172999" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-07-23T11:49:37Z", "details": "low" } ], "title": "CVE-2020-10773" }, { "cve": "CVE-2020-12656", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12656" } ], "notes": [ { "category": "general", "text": "gss_mech_free in net/sunrpc/auth_gss/gss_mech_switch.c in the rpcsec_gss_krb5 implementation in the Linux kernel through 5.6.10 lacks certain domain_release calls, leading to a memory leak. Note: This was disputed with the assertion that the issue does not grant any access not already available. It is a problem that on unloading a specific kernel module some memory is leaked, but loading kernel modules is a privileged operation. A user could also write a kernel module to consume any amount of memory they like and load that replicating the effect of this bug", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12656", "url": "https://www.suse.com/security/cve/CVE-2020-12656" }, { "category": "external", "summary": "SUSE Bug 1171219 for CVE-2020-12656", "url": "https://bugzilla.suse.com/1171219" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-07-23T11:49:37Z", "details": "low" } ], "title": "CVE-2020-12656" }, { "cve": "CVE-2020-12769", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12769" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 5.4.17. drivers/spi/spi-dw.c allows attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one, aka CID-19b61392c5a8.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12769", "url": "https://www.suse.com/security/cve/CVE-2020-12769" }, { "category": "external", "summary": "SUSE Bug 1171983 for CVE-2020-12769", "url": "https://bugzilla.suse.com/1171983" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-07-23T11:49:37Z", "details": "moderate" } ], "title": "CVE-2020-12769" }, { "cve": "CVE-2020-12771", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12771" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.6.11. btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12771", "url": "https://www.suse.com/security/cve/CVE-2020-12771" }, { "category": "external", "summary": "SUSE Bug 1171732 for CVE-2020-12771", "url": "https://bugzilla.suse.com/1171732" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-07-23T11:49:37Z", "details": "moderate" } ], "title": "CVE-2020-12771" }, { "cve": "CVE-2020-12888", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12888" } ], "notes": [ { "category": "general", "text": "The VFIO PCI driver in the Linux kernel through 5.6.13 mishandles attempts to access disabled memory space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12888", "url": "https://www.suse.com/security/cve/CVE-2020-12888" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1171868 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1171868" }, { "category": "external", "summary": "SUSE Bug 1176979 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1176979" }, { "category": "external", "summary": "SUSE Bug 1179612 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1179612" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-07-23T11:49:37Z", "details": "moderate" } ], "title": "CVE-2020-12888" }, { "cve": "CVE-2020-13143", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-13143" } ], "notes": [ { "category": "general", "text": "gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c in the Linux kernel 3.16 through 5.6.13 relies on kstrdup without considering the possibility of an internal \u0027\\0\u0027 value, which allows attackers to trigger an out-of-bounds read, aka CID-15753588bcd4.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-13143", "url": "https://www.suse.com/security/cve/CVE-2020-13143" }, { "category": "external", "summary": "SUSE Bug 1171982 for CVE-2020-13143", "url": "https://bugzilla.suse.com/1171982" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-07-23T11:49:37Z", "details": "moderate" } ], "title": "CVE-2020-13143" }, { "cve": "CVE-2020-13974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-13974" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel 4.4 through 5.7.1. drivers/tty/vt/keyboard.c has an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. NOTE: Members in the community argue that the integer overflow does not lead to a security issue in this case.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-13974", "url": "https://www.suse.com/security/cve/CVE-2020-13974" }, { "category": "external", "summary": "SUSE Bug 1172775 for CVE-2020-13974", "url": "https://bugzilla.suse.com/1172775" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-07-23T11:49:37Z", "details": "moderate" } ], "title": "CVE-2020-13974" }, { "cve": "CVE-2020-14416", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14416" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.4.16, a race condition in tty-\u003edisc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14416", "url": "https://www.suse.com/security/cve/CVE-2020-14416" }, { "category": "external", "summary": "SUSE Bug 1162002 for CVE-2020-14416", "url": "https://bugzilla.suse.com/1162002" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-07-23T11:49:37Z", "details": "moderate" } ], "title": "CVE-2020-14416" }, { "cve": "CVE-2020-15393", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15393" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.4 through 5.7.6, usbtest_disconnect in drivers/usb/misc/usbtest.c has a memory leak, aka CID-28ebeb8db770.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15393", "url": "https://www.suse.com/security/cve/CVE-2020-15393" }, { "category": "external", "summary": "SUSE Bug 1173514 for CVE-2020-15393", "url": "https://bugzilla.suse.com/1173514" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-07-23T11:49:37Z", "details": "moderate" } ], "title": "CVE-2020-15393" }, { "cve": "CVE-2020-15780", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15780" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15780", "url": "https://www.suse.com/security/cve/CVE-2020-15780" }, { "category": "external", "summary": "SUSE Bug 1173573 for CVE-2020-15780", "url": "https://bugzilla.suse.com/1173573" }, { "category": "external", "summary": "SUSE Bug 1174186 for CVE-2020-15780", "url": "https://bugzilla.suse.com/1174186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.5.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.5.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-07-23T11:49:37Z", "details": "important" } ], "title": "CVE-2020-15780" } ] }
suse-su-2020:2103-1
Vulnerability from csaf_suse
Published
2020-08-03 09:31
Modified
2020-08-03 09:31
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP1 Azure kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-15393: Fixed a memory leak in usbtest_disconnect (bnc#1173514).
- CVE-2020-12771: An issue was discovered in btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails (bnc#1171732).
- CVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).
- CVE-2020-10773: Fixed a memory leak on s390/s390x, in the cmm_timeout_hander in file arch/s390/mm/cmm.c (bnc#1172999).
- CVE-2020-14416: Fixed a race condition in tty->disc_data handling in the slip and slcan line discipline could lead to a use-after-free. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).
- CVE-2020-10768: Fixed an issue with the prctl() function, where indirect branch speculation could be enabled even though it was diabled before (bnc#1172783).
- CVE-2020-10766: Fixed an issue which allowed an attacker with a local account to disable SSBD protection (bnc#1172781).
- CVE-2020-10767: Fixed an issue where Indirect Branch Prediction Barrier was disabled in certain circumstances, leaving the system open to a spectre v2 style attack (bnc#1172782).
- CVE-2020-13974: Fixed a integer overflow in drivers/tty/vt/keyboard.c, if k_ascii is called several times in a row (bnc#1172775).
- CVE-2019-20810: Fixed a memory leak in go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c because it did not call snd_card_free for a failure path (bnc#1172458).
- CVE-2020-10769: A buffer over-read flaw was found in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm's module, authenc. This flaw allowed a local attacker with user privileges to cause a denial of service (bnc#1173265).
- CVE-2020-10781: Fixed a denial of service issue in the ZRAM implementation (bsc#1173074).
- CVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bsc#1174462).
- CVE-2019-20908: An issue was discovered in drivers/firmware/efi/efi.c: incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032 (bsc#1173567).
- CVE-2020-15780: An issue was discovered in drivers/acpi/acpi_configfs.c: injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30 (bsc#1173573).
The following non-security bugs were fixed:
- ACPI: GED: add support for _Exx / _Lxx handler methods (bsc#1111666).
- ACPI: GED: use correct trigger type field in _Exx / _Lxx handling (bsc#1111666).
- ACPI: NFIT: Fix unlock on error in scrub_show() (bsc#1171753).
- ACPI: PM: Avoid using power resources if there are none for D0 (bsc#1051510).
- ACPI: sysfs: Fix pm_profile_attr type (bsc#1111666).
- ACPI: video: Use native backlight on Acer Aspire 5783z (bsc#1111666).
- ACPI: video: Use native backlight on Acer TravelMate 5735Z (bsc#1111666).
- ALSA: es1688: Add the missed snd_card_free() (bsc#1051510).
- ALSA: hda: Add ElkhartLake HDMI codec vid (bsc#1111666).
- ALSA: hda: add sienna_cichlid audio asic id for sienna_cichlid up (bsc#1111666).
- ALSA: hda/hdmi - enable runtime pm for newer AMD display audio (bsc#1111666).
- ALSA: hda - let hs_mic be picked ahead of hp_mic (bsc#1111666).
- ALSA: hda/realtek - add a pintbl quirk for several Lenovo machines (bsc#1111666).
- ALSA: hda/realtek - Add LED class support for micmute LED (bsc#1111666).
- ALSA: hda/realtek - Enable micmute LED on and HP system (bsc#1111666).
- ALSA: hda/realtek - Enable Speaker for ASUS UX533 and UX534 (bsc#1111666).
- ALSA: hda/realtek - Fix unused variable warning w/o CONFIG_LEDS_TRIGGER_AUDIO (bsc#1111666).
- ALSA: hda/realtek - Introduce polarity for micmute LED GPIO (bsc#1111666).
- ALSA: lx6464es - add support for LX6464ESe pci express variant (bsc#1111666).
- ALSA: opl3: fix infoleak in opl3 (bsc#1111666).
- ALSA: pcm: disallow linking stream to itself (bsc#1111666).
- ALSA: usb-audio: Add duplex sound support for USB devices using implicit feedback (bsc#1111666).
- ALSA: usb-audio: Add Pioneer DJ DJM-900NXS2 support (bsc#1111666).
- ALSA: usb-audio: add quirk for MacroSilicon MS2109 (bsc#1111666).
- ALSA: usb-audio: Add vendor, product and profile name for HP Thunderbolt Dock (bsc#1111666).
- ALSA: usb-audio: Clean up quirk entries with macros (bsc#1111666).
- ALSA: usb-audio: Fix inconsistent card PM state after resume (bsc#1111666).
- ALSA: usb-audio: Fix packet size calculation (bsc#1111666).
- ALSA: usb-audio: Fix racy list management in output queue (bsc#1111666).
- ALSA: usb-audio: Improve frames size computation (bsc#1111666).
- ALSA: usb-audio: Manage auto-pm of all bundled interfaces (bsc#1111666).
- ALSA: usb-audio: Use the new macro for HP Dock rename quirks (bsc#1111666).
- amdgpu: a NULL ->mm does not mean a thread is a kthread (git-fixes).
- arm64: map FDT as RW for early_init_dt_scan() (jsc#SLE-12423).
- ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb (bsc#1111666).
- ath9k: Fix use-after-free Read in ath9k_wmi_ctrl_rx (bsc#1111666).
- ath9k: Fix use-after-free Write in ath9k_htc_rx_msg (bsc#1111666).
- ath9x: Fix stack-out-of-bounds Write in ath9k_hif_usb_rx_cb (bsc#1111666).
- ax25: fix setsockopt(SO_BINDTODEVICE) (networking-stable-20_05_27).
- b43: Fix connection problem with WPA3 (bsc#1111666).
- b43_legacy: Fix connection problem with WPA3 (bsc#1111666).
- bcache: Fix an error code in bch_dump_read() (git fixes (block drivers)).
- be2net: fix link failure after ethtool offline test (git-fixes).
- block: nr_sects_write(): Disable preemption on seqcount write (bsc#1173818).
- block: remove QUEUE_FLAG_STACKABLE (git fixes (block drivers)).
- block: sed-opal: fix sparse warning: convert __be64 data (git fixes (block drivers)).
- Bluetooth: Add SCO fallback for invalid LMP parameters error (bsc#1111666).
- bnxt_en: Fix AER reset logic on 57500 chips (git-fixes).
- bnxt_en: Fix ethtool selftest crash under error conditions (git-fixes).
- bnxt_en: Fix handling FRAG_ERR when NVM_INSTALL_UPDATE cmd fails (git-fixes).
- bnxt_en: Fix ipv6 RFS filter matching logic (git-fixes).
- bnxt_en: fix NULL dereference in case SR-IOV configuration fails (git-fixes).
- bnxt_en: Fix VF anti-spoof filter setup (networking-stable-20_05_12).
- bnxt_en: Fix VLAN acceleration handling in bnxt_fix_features() (networking-stable-20_05_12).
- bnxt_en: Improve AER slot reset (networking-stable-20_05_12).
- brcmfmac: fix wrong location to get firmware feature (bsc#1111666).
- brcmfmac: Transform compatible string for FW loading (bsc#1169771).
- btrfs: add assertions for tree == inode->io_tree to extent IO helpers (bsc#1174438).
- btrfs: add new helper btrfs_lock_and_flush_ordered_range (bsc#1174438).
- btrfs: Always use a cached extent_state in btrfs_lock_and_flush_ordered_range (bsc#1174438).
- btrfs: do not zero f_bavail if we have available space (bsc#1168081).
- btrfs: do not zero f_bavail if we have available space (bsc#1168081).
- btrfs: drop argument tree from btrfs_lock_and_flush_ordered_range (bsc#1174438).
- btrfs: fix extent_state leak in btrfs_lock_and_flush_ordered_range (bsc#1174438).
- btrfs: fix failure of RWF_NOWAIT write into prealloc extent beyond eof (bsc#1174438).
- btrfs: fix hang on snapshot creation after RWF_NOWAIT write (bsc#1174438).
- btrfs: fix RWF_NOWAIT write not failling when we need to cow (bsc#1174438).
- btrfs: fix RWF_NOWAIT writes blocking on extent locks and waiting for IO (bsc#1174438).
- btrfs: qgroup: Fix a bug that prevents qgroup to be re-enabled after disable (bsc#1172247).
- btrfs: Return EAGAIN if we can't start no snpashot write in check_can_nocow (bsc#1174438).
- btrfs: use correct count in btrfs_file_write_iter() (bsc#1174438).
- btrfs: Use newly introduced btrfs_lock_and_flush_ordered_range (bsc#1174438).
- btrfs: volumes: Remove ENOSPC-prone btrfs_can_relocate() (bsc#1171124).
- bus: sunxi-rsb: Return correct data when mixing 16-bit and 8-bit reads (bsc#1111666).
- carl9170: remove P2P_GO support (bsc#1111666).
- CDC-ACM: heed quirk also in error handling (git-fixes).
- ceph: convert mdsc->cap_dirty to a per-session list (bsc#1167104).
- ceph: request expedited service on session's last cap flush (bsc#1167104).
- cgroup, blkcg: Prepare some symbols for module and !CONFIG_CGROUP usages (bsc#1173857).
- char/random: Add a newline at the end of the file (jsc#SLE-12423).
- cifs: get rid of unused parameter in reconn_setup_dfs_targets() (bsc#1144333).
- cifs: handle hostnames that resolve to same ip in failover (bsc#1144333 bsc#1161016).
- cifs: set up next DFS target before generic_ip_connect() (bsc#1144333 bsc#1161016).
- clk: bcm2835: Fix return type of bcm2835_register_gate (bsc#1051510).
- clk: clk-flexgen: fix clock-critical handling (bsc#1051510).
- clk: sunxi: Fix incorrect usage of round_down() (bsc#1051510).
- clocksource: dw_apb_timer: Make CPU-affiliation being optional (bsc#1111666).
- compat_ioctl: block: handle BLKREPORTZONE/BLKRESETZONE (git fixes (block drivers)).
- compat_ioctl: block: handle Persistent Reservations (git fixes (block drivers)).
- copy_{to,from}_user(): consolidate object size checks (git fixes).
- crypto: algboss - do not wait during notifier callback (bsc#1111666).
- crypto: algif_skcipher - Cap recv SG list at ctx->used (bsc#1111666).
- crypto: caam - update xts sector size for large input length (bsc#1111666).
- crypto: cavium/nitrox - Fix 'nitrox_get_first_device()' when ndevlist is fully iterated (bsc#1111666).
- crypto: cavium/nitrox - Fix 'nitrox_get_first_device()' when ndevlist is fully iterated (git-fixes).
- Crypto/chcr: fix for ccm(aes) failed test (bsc#1111666).
- crypto: chelsio/chtls: properly set tp->lsndtime (bsc#1111666).
- crypto: talitos - fix IPsec cipher in length (git-fixes).
- crypto: talitos - reorder code in talitos_edesc_alloc() (git-fixes).
- debugfs: Check module state before warning in {full/open}_proxy_open() (bsc#1173746).
- devinet: fix memleak in inetdev_init() (networking-stable-20_06_07).
- /dev/mem: Add missing memory barriers for devmem_inode (git-fixes).
- /dev/mem: Revoke mappings when a driver claims the region (git-fixes).
- dmaengine: tegra210-adma: Fix an error handling path in 'tegra_adma_probe()' (bsc#1111666).
- dm btree: increase rebalance threshold in __rebalance2() (git fixes (block drivers)).
- dm cache: fix a crash due to incorrect work item cancelling (git fixes (block drivers)).
- dm crypt: fix benbi IV constructor crash if used in authenticated mode (git fixes (block drivers)).
- dm: fix potential for q->make_request_fn NULL pointer (git fixes (block drivers)).
- dm space map common: fix to ensure new block isn't already in use (git fixes (block drivers)).
- dm: various cleanups to md->queue initialization code (git fixes).
- dm verity fec: fix hash block number in verity_fec_decode (git fixes (block drivers)).
- dm verity fec: fix memory leak in verity_fec_dtr (git fixes (block drivers)).
- dpaa_eth: fix usage as DSA master, try 3 (networking-stable-20_05_27).
- driver-core, libnvdimm: Let device subsystems add local lockdep coverage (bsc#1171753).
- Drivers: hv: Change flag to write log level in panic msg to false (bsc#1170617, bsc#1170618).
- drivers: soc: ti: knav_qmss_queue: Make knav_gp_range_ops static (bsc#1051510).
- drm: amd/display: fix Kconfig help text (bsc#1113956) * only fix DEBUG_KERNEL_DC
- drm: bridge: adv7511: Extend list of audio sample rates (bsc#1111666).
- drm/dp_mst: Increase ACT retry timeout to 3s (bsc#1113956) * context changes
- drm: encoder_slave: fix refcouting error for modules (bsc#1111666).
- drm: encoder_slave: fix refcouting error for modules (bsc#1114279)
- drm/i915/icl+: Fix hotplug interrupt disabling after storm detection (bsc#1112178)
- drm/i915: Whitelist context-local timestamp in the gen9 cmdparser (bsc#1111666).
- drm/mediatek: Check plane visibility in atomic_update (bsc#1113956) * context changes
- drm/msm/dpu: fix error return code in dpu_encoder_init (bsc#1111666).
- drm: panel-orientation-quirks: Add quirk for Asus T101HA panel (bsc#1111666).
- drm: panel-orientation-quirks: Use generic orientation-data for Acer S1003 (bsc#1111666).
- drm/qxl: Use correct notify port address when creating cursor ring (bsc#1113956)
- drm/radeon: fix double free (bsc#1113956)
- drm/radeon: fix fb_div check in ni_init_smc_spll_table() (bsc#1113956)
- drm/sun4i: hdmi ddc clk: Fix size of m divider (bsc#1111666).
- drm/tegra: hub: Do not enable orphaned window group (bsc#1111666).
- drm/vkms: Hold gem object while still in-use (bsc#1113956) * context changes
- Drop another USB dwc3 gadget patch that broke the build
- Drop USB dwc3 gadget patch that broke the build on openSUSE-15.1 branch
- e1000: Distribute switch variables for initialization (bsc#1111666).
- e1000e: Disable TSO for buffer overrun workaround (bsc#1051510).
- e1000e: Do not wake up the system via WOL if device wakeup is disabled (bsc#1051510).
- e1000e: Relax condition to trigger reset for ME workaround (bsc#1111666).
- EDAC/amd64: Read back the scrub rate PCI register on F15h (bsc#1114279).
- efi/random: Increase size of firmware supplied randomness (jsc#SLE-12423).
- efi/random: Treat EFI_RNG_PROTOCOL output as bootloader randomness (jsc#SLE-12423).
- efi: READ_ONCE rng seed size before munmap (jsc#SLE-12423).
- efi: Reorder pr_notice() with add_device_randomness() call (jsc#SLE-12423).
- evm: Check also if *tfm is an error pointer in init_desc() (bsc#1051510).
- evm: Fix a small race in init_desc() (bsc#1051510).
- ext4: fix a data race at inode->i_blocks (bsc#1171835).
- ext4: fix partial cluster initialization when splitting extent (bsc#1173839).
- ext4: fix race between ext4_sync_parent() and rename() (bsc#1173838).
- ext4, jbd2: ensure panic by fix a race between jbd2 abort and ext4 error handlers (bsc#1173833).
- extcon: adc-jack: Fix an error handling path in 'adc_jack_probe()' (bsc#1051510).
- fanotify: fix ignore mask logic for events on child and on dir (bsc#1172719).
- fdt: add support for rng-seed (jsc#SLE-12423).
- fdt: Update CRC check for rng-seed (jsc#SLE-12423).
- firmware: imx: scu: Fix corruption of header (git-fixes).
- firmware: imx: scu: Fix possible memory leak in imx_scu_probe() (bsc#1111666).
- Fix boot crash with MD (bsc#1174343) Refresh patches.suse/mdraid-fix-read-write-bytes-accounting.patch
- fix multiplication overflow in copy_fdtable() (bsc#1173825).
- Fix Patch-mainline tag in the previous zram fix patch
- fpga: dfl: afu: Corrected error handling levels (git-fixes).
- fq_codel: fix TCA_FQ_CODEL_DROP_BATCH_SIZE sanity checks (networking-stable-20_05_12).
- gpiolib: Document that GPIO line names are not globally unique (bsc#1051510).
- gpu: host1x: Detach driver on unregister (bsc#1111666).
- gpu: ipu-v3: pre: do not trigger update if buffer address does not change (bsc#1111666).
- HID: magicmouse: do not set up autorepeat (git-fixes).
- HID: sony: Fix for broken buttons on DS3 USB dongles (bsc#1051510).
- hv_netvsc: Fix netvsc_start_xmit's return type (git-fixes).
- hwmon: (acpi_power_meter) Fix potential memory leak in acpi_power_meter_add() (bsc#1111666).
- hwmon: (emc2103) fix unable to change fan pwm1_enable attribute (bsc#1111666).
- hwmon: (max6697) Make sure the OVERT mask is set correctly (bsc#1111666).
- i2c: algo-pca: Add 0x78 as SCL stuck low status for PCA9665 (bsc#1111666).
- i2c: eg20t: Load module automatically if ID matches (bsc#1111666).
- i2c: mlxcpld: check correct size of maximum RECV_LEN packet (bsc#1111666).
- i40e: reduce stack usage in i40e_set_fc (git-fixes).
- IB/hfi1: Do not destroy hfi1_wq when the device is shut down (bsc#1174409).
- IB/hfi1: Do not destroy link_wq when the device is shut down (bsc#1174409).
- ibmveth: Fix max MTU limit (bsc#1173428 ltc#186397).
- ibmvnic: continue to init in CRQ reset returns H_CLOSED (bsc#1173280 ltc#185369).
- ibmvnic: Flush existing work items before device removal (bsc#1065729).
- ibmvnic: Harden device login requests (bsc#1170011 ltc#183538).
- iio: buffer: Do not allow buffers without any channels enabled to be activated (bsc#1051510).
- iio:health:afe4404 Fix timestamp alignment and prevent data leak (bsc#1111666).
- iio:humidity:hdc100x Fix alignment and data leak issues (bsc#1111666).
- iio:magnetometer:ak8974: Fix alignment and data leak issues (bsc#1111666).
- iio: mma8452: Add missed iio_device_unregister() call in mma8452_probe() (bsc#1111666).
- iio: pressure: bmp280: Tolerate IRQ before registering (bsc#1051510).
- iio:pressure:ms5611 Fix buffer element alignment (bsc#1111666).
- iio: pressure: zpa2326: handle pm_runtime_get_sync failure (bsc#1111666).
- ima: Directly assign the ima_default_policy pointer to ima_rules (bsc#1051510).
- ima: Fix ima digest hash table key calculation (bsc#1051510).
- include/asm-generic/topology.h: guard cpumask_of_node() macro argument (bsc#1148868).
- Input: i8042 - add Lenovo XiaoXin Air 12 to i8042 nomux list (bsc#1111666).
- input: i8042 - Remove special PowerPC handling (git-fixes).
- Input: synaptics - add a second working PNP_ID for Lenovo T470s (bsc#1111666).
- intel_idle: Graceful probe failure when MWAIT is disabled (bsc#1174115).
- intel_th: Fix a NULL dereference when hub driver is not loaded (bsc#1111666).
- ipvlan: call dev_change_flags when ipvlan mode is reset (git-fixes).
- ixgbevf: Remove limit of 10 entries for unicast filter list (git-fixes).
- jbd2: avoid leaking transaction credits when unreserving handle (bsc#1173845).
- jbd2: Preserve kABI when adding j_abort_mutex (bsc#1173833).
- kabi: hv: prevent struct device_node to become defined (bsc#1172871).
- kabi: ppc64le: prevent struct dma_map_ops to become defined (jsc#SLE-12423).
- kABI: protect struct mlx5_cmd_work_ent (kabi).
- kABI: reintroduce inet_hashtables.h include to l2tp_ip (kabi).
- kernfs: fix barrier usage in __kernfs_new_node() (bsc#1111666).
- KVM: nVMX: Do not reread VMCS-agnostic state when switching VMCS (bsc#1114279).
- KVM: nVMX: Skip IBPB when switching between vmcs01 and vmcs02 (bsc#1114279).
- KVM: x86: Fix APIC page invalidation race (bsc#1174122).
- kvm: x86: Fix L1TF mitigation for shadow MMU (bsc#1171904).
- KVM: x86/mmu: Set mmio_value to '0' if reserved #PF can't be generated (bsc#1171904).
- KVM: x86: only do L1TF workaround on affected processors (bsc#1171904).
- l2tp: add sk_family checks to l2tp_validate_socket (networking-stable-20_06_07).
- l2tp: do not use inet_hash()/inet_unhash() (networking-stable-20_06_07).
- libceph: do not omit recovery_deletes in target_copy() (bsc#1174113).
- libceph: ignore pool overlay and cache logic on redirects (bsc#1173146).
- libnvdimm/bus: Fix wait_nvdimm_bus_probe_idle() ABBA deadlock (bsc#1171753).
- libnvdimm/bus: Prepare the nd_ioctl() path to be re-entrant (bsc#1171753).
- libnvdimm/bus: Stop holding nvdimm_bus_list_mutex over __nd_ioctl() (bsc#1171753).
- libnvdimm: cover up changes in struct nvdimm_bus (bsc#1171753).
- libnvdimm: cover up nd_pfn_sb changes (bsc#1171759).
- libnvdimm/dax: Pick the right alignment default when creating dax devices (bsc#1171759).
- libnvdimm/label: Remove the dpa align check (bsc#1171759).
- libnvdimm/of_pmem: Provide a unique name for bus provider (bsc#1171739).
- libnvdimm/pfn_dev: Add a build check to make sure we notice when struct page size change (bsc#1171743).
- libnvdimm/pfn_dev: Add page size and struct page size to pfn superblock (bsc#1171759).
- libnvdimm/pfn: Prevent raw mode fallback if pfn-infoblock valid (bsc#1171743).
- libnvdimm/pmem: Advance namespace seed for specific probe errors (bsc#1171743).
- libnvdimm/region: Initialize bad block for volatile namespaces (bnc#1151927 5.3.6).
- libnvdimm/region: Rewrite _probe_success() to _advance_seeds() (bsc#1171743).
- libnvdimm: Use PAGE_SIZE instead of SZ_4K for align check (bsc#1171759).
- livepatch: Apply vmlinux-specific KLP relocations early (bsc#1071995).
- livepatch: Disallow vmlinux.ko (bsc#1071995).
- livepatch: Make klp_apply_object_relocs static (bsc#1071995).
- livepatch: Prevent module-specific KLP rela sections from referencing vmlinux symbols (bsc#1071995).
- livepatch: Remove .klp.arch (bsc#1071995).
- loop: replace kill_bdev with invalidate_bdev (bsc#1173820).
- lpfc_debugfs: get rid of pointless access_ok() (bsc#1172687 bsc#1171530).
- lpfc: Synchronize NVME transport and lpfc driver devloss_tmo (bcs#1173060).
- mac80211: add option for setting control flags (bsc#1111666).
- mac80211: set IEEE80211_TX_CTRL_PORT_CTRL_PROTO for nl80211 TX (bsc#1111666).
- mailbox: imx: Disable the clock on devm_mbox_controller_register() failure (git-fixes).
- md: Avoid namespace collision with bitmap API (git fixes (block drivers)).
- mdraid: fix read/write bytes accounting (bsc#1172537).
- md: use memalloc scope APIs in mddev_suspend()/mddev_resume() (bsc#1166985)).
- media: cec: silence shift wrapping warning in __cec_s_log_addrs() (git-fixes).
- media: si2157: Better check for running tuner in init (bsc#1111666).
- mlxsw: core: Do not use WQ_MEM_RECLAIM for mlxsw ordered workqueue (git-fixes).
- mlxsw: core: Do not use WQ_MEM_RECLAIM for mlxsw workqueue (git-fixes).
- mlxsw: pci: Return error on PCI reset timeout (git-fixes).
- mlxsw: spectrum_acl_tcam: Position vchunk in a vregion list properly (networking-stable-20_05_12).
- mlxsw: spectrum: Disallow prio-tagged packets when PVID is removed (git-fixes).
- mlxsw: spectrum_dpipe: Add missing error path (git-fixes).
- mlxsw: spectrum: Prevent force of 56G (git-fixes).
- mlxsw: spectrum_router: Refresh nexthop neighbour when it becomes dead (git-fixes).
- mlxsw: spectrum_router: Remove inappropriate usage of WARN_ON() (git-fixes).
- mlxsw: spectrum_switchdev: Add MDB entries in prepare phase (git-fixes).
- mlxsw: spectrum_switchdev: Do not treat static FDB entries as sticky (git-fixes).
- mmc: block: Fix request completion in the CQE timeout path (bsc#1111666).
- mmc: block: Fix use-after-free issue for rpmb (bsc#1111666).
- mmc: fix compilation of user API (bsc#1051510).
- mmc: sdhci: do not enable card detect interrupt for gpio cd type (bsc#1111666).
- mmc: sdhci-msm: Set SDHCI_QUIRK_MULTIBLOCK_READ_ACMD12 quirk (bsc#1111666).
- Move upstreamed lpfc patches into sorted section
- mvpp2: remove misleading comment (git-fixes).
- net: be more gentle about silly gso requests coming from user (networking-stable-20_06_07).
- net: check untrusted gso_size at kernel entry (networking-stable-20_06_07).
- net/cxgb4: Check the return from t4_query_params properly (git-fixes).
- net: dsa: bcm_sf2: Fix node reference count (git-fixes).
- net: dsa: loop: Add module soft dependency (networking-stable-20_05_16).
- net: dsa: mt7530: fix roaming from DSA user ports (networking-stable-20_05_27).
- net: ena: add intr_moder_rx_interval to struct ena_com_dev and use it (git-fixes).
- net: ena: add missing ethtool TX timestamping indication (git-fixes).
- net: ena: avoid memory access violation by validating req_id properly (git-fixes).
- net: ena: do not wake up tx queue when down (git-fixes).
- net: ena: ena-com.c: prevent NULL pointer dereference (git-fixes).
- net: ena: ethtool: use correct value for crc32 hash (git-fixes).
- net: ena: fix continuous keep-alive resets (git-fixes).
- net: ena: fix corruption of dev_idx_to_host_tbl (git-fixes).
- net: ena: fix default tx interrupt moderation interval (git-fixes).
- net: ena: fix incorrect default RSS key (git-fixes).
- net: ena: fix incorrectly saving queue numbers when setting RSS indirection table (git-fixes).
- net: ena: fix issues in setting interrupt moderation params in ethtool (git-fixes).
- net: ena: fix potential crash when rxfh key is NULL (git-fixes).
- net: ena: fix retrieval of nonadaptive interrupt moderation intervals (git-fixes).
- net: ena: fix uses of round_jiffies() (git-fixes).
- net: ena: make ena rxfh support ETH_RSS_HASH_NO_CHANGE (git-fixes).
- net: ena: reimplement set/get_coalesce() (git-fixes).
- net: ena: rss: do not allocate key when not supported (git-fixes).
- net: ena: rss: fix failure to get indirection table (git-fixes).
- net: ena: rss: store hash function as values and not bits (git-fixes).
- netfilter: connlabels: prefer static lock initialiser (git-fixes).
- netfilter: ctnetlink: netns exit must wait for callbacks (bsc#1169795).
- netfilter: not mark a spinlock as __read_mostly (git-fixes).
- net: fix a potential recursive NETDEV_FEAT_CHANGE (networking-stable-20_05_16).
- net: inet_csk: Fix so_reuseport bind-address cache in tb->fast* (networking-stable-20_05_27).
- net: ipip: fix wrong address family in init error path (networking-stable-20_05_27).
- net: ipvlan: Fix ipvlan device tso disabled while NETIF_F_IP_CSUM is set (git-fixes).
- net: macsec: preserve ingress frame ordering (networking-stable-20_05_12).
- net/mlx4_core: drop useless LIST_HEAD (git-fixes).
- net/mlx4_core: fix a memory leak bug (git-fixes).
- net/mlx4_core: Fix use of ENOSPC around mlx4_counter_alloc() (networking-stable-20_05_12).
- net/mlx5: Add command entry handling completion (networking-stable-20_05_27).
- net/mlx5: Avoid panic when setting vport rate (git-fixes).
- net/mlx5: Continue driver initialization despite debugfs failure (git-fixes).
- net/mlx5e: ethtool, Fix a typo in WOL function names (git-fixes).
- net/mlx5e: Fix traffic duplication in ethtool steering (git-fixes).
- net/mlx5e: Remove unnecessary clear_bit()s (git-fixes).
- net/mlx5e: Update netdev txq on completions during closure (networking-stable-20_05_27).
- net/mlx5: Fix command entry leak in Internal Error State (networking-stable-20_05_12).
- net/mlx5: Fix crash upon suspend/resume (networking-stable-20_06_07).
- net/mlx5: Fix forced completion access non initialized command entry (networking-stable-20_05_12).
- net: mvmdio: allow up to four clocks to be specified for orion-mdio (git-fixes).
- net: mvpp2: prs: Do not override the sign bit in SRAM parser shift (git-fixes).
- net: phy: fix aneg restart in phy_ethtool_set_eee (networking-stable-20_05_16).
- netprio_cgroup: Fix unlimited memory leak of v2 cgroups (networking-stable-20_05_16).
- net: qede: stop adding events on an already destroyed workqueue (git-fixes).
- net: qed: fix excessive QM ILT lines consumption (git-fixes).
- net: qed: fix NVMe login fails over VFs (git-fixes).
- net: qrtr: Fix passing invalid reference to qrtr_local_enqueue() (networking-stable-20_05_27).
- net: revert 'net: get rid of an signed integer overflow in ip_idents_reserve()' (networking-stable-20_05_27).
- net sched: fix reporting the first-time use timestamp (networking-stable-20_05_27).
- net: stricter validation of untrusted gso packets (networking-stable-20_05_12).
- net/tls: Fix sk_psock refcnt leak in bpf_exec_tx_verdict() (networking-stable-20_05_12).
- net/tls: Fix sk_psock refcnt leak when in tls_data_ready() (networking-stable-20_05_12).
- net: usb: qmi_wwan: add support for DW5816e (networking-stable-20_05_12).
- net: usb: qmi_wwan: add Telit 0x1050 composition (networking-stable-20_06_07).
- net: usb: qmi_wwan: add Telit LE910C1-EUX composition (networking-stable-20_06_07).
- net: vmxnet3: fix possible buffer overflow caused by bad DMA value in vmxnet3_get_rss() (bsc#1172484).
- nfp: bpf: fix code-gen bug on BPF_ALU | BPF_XOR | BPF_K (git-fixes).
- NFS: Fix an RCU lock leak in nfs4_refresh_delegation_stateid() (bsc#1170592).
- NFSv4: Retry CLOSE and DELEGRETURN on NFS4ERR_OLD_STATEID (bsc#1170592).
- nilfs2: fix null pointer dereference at nilfs_segctor_do_construct() (bsc#1173857).
- nl80211: fix NL80211_ATTR_CHANNEL_WIDTH attribute type (bsc#1111666).
- nvdimm: Avoid race between probe and reading device attributes (bsc#1170442).
- nvme: check for NVME_CTRL_LIVE in nvme_report_ns_ids() (bcs#1171558 bsc#1159058).
- nvme: do not update multipath disk information if the controller is down (bcs#1171558 bsc#1159058).
- nvme: fail cancelled commands with NVME_SC_HOST_PATH_ERROR (bsc#1158983 bsc#1172538).
- nvme-fc: Fail transport errors with NVME_SC_HOST_PATH (bsc#1158983 bsc#1172538).
- nvme-tcp: fail command with NVME_SC_HOST_PATH_ERROR send failed (bsc#1158983 bsc#1172538).
- objtool: Clean instruction state before each function validation (bsc#1169514).
- objtool: Ignore empty alternatives (bsc#1169514).
- ocfs2: no need try to truncate file beyond i_size (bsc#1171841).
- overflow: Fix -Wtype-limits compilation warnings (git fixes).
- overflow.h: Add arithmetic shift helper (git fixes).
- p54usb: add AirVasT USB stick device-id (bsc#1051510).
- padata: ensure the reorder timer callback runs on the correct CPU (git-fixes).
- padata: reorder work kABI fixup (git-fixes).
- PCI/AER: Remove HEST/FIRMWARE_FIRST parsing for AER ownership (bsc#1174356).
- PCI/AER: Use only _OSC to determine AER ownership (bsc#1174356).
- PCI: Allow pci_resize_resource() for devices on root bus (bsc#1051510).
- PCI: Fix pci_register_host_bridge() device_register() error handling (bsc#1051510).
- PCI: Generalize multi-function power dependency device links (bsc#1111666).
- PCI: hv: Change pci_protocol_version to per-hbus (bsc#1172871, bsc#1172872).
- PCI: hv: Fix the PCI HyperV probe failure path to release resource properly (bsc#1172871, bsc#1172872).
- PCI: hv: Introduce hv_msi_entry (bsc#1172871, bsc#1172872).
- PCI: hv: Move hypercall related definitions into tlfs header (bsc#1172871, bsc#1172872).
- PCI: hv: Move retarget related structures into tlfs header (bsc#1172871, bsc#1172872).
- PCI: hv: Reorganize the code in preparation of hibernation (bsc#1172871, bsc#1172872).
- PCI: hv: Retry PCI bus D0 entry on invalid device state (bsc#1172871, bsc#1172872).
- PCI: pciehp: Fix indefinite wait on sysfs requests (git-fixes).
- PCI: pciehp: Support interrupts sent from D3hot (git-fixes).
- PCI/PM: Call .bridge_d3() hook only if non-NULL (git-fixes).
- PCI: Program MPS for RCiEP devices (bsc#1051510).
- PCI/PTM: Inherit Switch Downstream Port PTM settings from Upstream Port (bsc#1051510).
- pci: Revive pci_dev __aer_firmware_first* fields for kABI (bsc#1174356).
- pcm_native: result of put_user() needs to be checked (bsc#1111666).
- perf: Allocate context task_ctx_data for child event (git-fixes).
- perf/cgroup: Fix perf cgroup hierarchy support (git-fixes).
- perf: Copy parent's address filter offsets on clone (git-fixes).
- perf/core: Add sanity check to deal with pinned event failure (git-fixes).
- perf/core: Avoid freeing static PMU contexts when PMU is unregistered (git-fixes).
- perf/core: Correct event creation with PERF_FORMAT_GROUP (git-fixes).
- perf/core: Do not WARN() for impossible ring-buffer sizes (git-fixes).
- perf/core: Fix ctx_event_type in ctx_resched() (git-fixes).
- perf/core: Fix error handling in perf_event_alloc() (git-fixes).
- perf/core: Fix exclusive events' grouping (git-fixes).
- perf/core: Fix group scheduling with mixed hw and sw events (git-fixes).
- perf/core: Fix impossible ring-buffer sizes warning (git-fixes).
- perf/core: Fix locking for children siblings group read (git-fixes).
- perf/core: Fix lock inversion between perf,trace,cpuhp (git-fixes (dependent patch for 18736eef1213)).
- perf/core: Fix perf_event_read_value() locking (git-fixes).
- perf/core: Fix perf_pmu_unregister() locking (git-fixes).
- perf/core: Fix __perf_read_group_add() locking (git-fixes (dependent patch)).
- perf/core: Fix perf_sample_regs_user() mm check (git-fixes).
- perf/core: Fix possible Spectre-v1 indexing for ->aux_pages (git-fixes).
- perf/core: Fix race between close() and fork() (git-fixes).
- perf/core: Fix the address filtering fix (git-fixes).
- perf/core: Fix use-after-free in uprobe_perf_close() (git-fixes).
- perf/core: Force USER_DS when recording user stack data (git-fixes).
- perf/core: Restore mmap record type correctly (git-fixes).
- perf: Fix header.size for namespace events (git-fixes).
- perf/ioctl: Add check for the sample_period value (git-fixes).
- perf, pt, coresight: Fix address filters for vmas with non-zero offset (git-fixes).
- perf: Return proper values for user stack errors (git-fixes).
- perf/x86/amd: Constrain Large Increment per Cycle events (git-fixes).
- perf/x86/amd/ibs: Fix reading of the IBS OpData register and thus precise RIP validity (git-fixes).
- perf/x86/amd/ibs: Fix sample bias for dispatched micro-ops (git-fixes).
- perf/x86/amd/ibs: Handle erratum #420 only on the affected CPU family (10h) (git-fixes).
- perf/x86/amd/iommu: Make the 'amd_iommu_attr_groups' symbol static (git-fixes).
- perf/x86/amd/uncore: Do not set 'ThreadMask' and 'SliceMask' for non-L3 PMCs (git-fixes stable).
- perf/x86/amd/uncore: Set the thread mask for F17h L3 PMCs (git-fixes).
- perf/x86/amd/uncore: Set ThreadMask and SliceMask for L3 Cache perf events (git-fixes stable).
- perf/x86: Enable free running PEBS for REGS_USER/INTR (git-fixes).
- perf/x86: Fix incorrect PEBS_REGS (git-fixes).
- perf/x86/intel: Add generic branch tracing check to intel_pmu_has_bts() (git-fixes).
- perf/x86/intel: Add proper condition to run sched_task callbacks (git-fixes).
- perf/x86/intel/bts: Fix the use of page_private() (git-fixes).
- perf/x86/intel: Fix PT PMI handling (git-fixes).
- perf/x86/intel: Move branch tracing setup to the Intel-specific source file (git-fixes).
- perf/x86/intel/uncore: Add Node ID mask (git-fixes).
- perf/x86/intel/uncore: Fix PCI BDF address of M3UPI on SKX (git-fixes).
- perf/x86/intel/uncore: Handle invalid event coding for free-running counter (git-fixes).
- perf/x86/uncore: Fix event group support (git-fixes).
- pid: Improve the comment about waiting in zap_pid_ns_processes (git fixes)).
- pinctrl: freescale: imx: Fix an error handling path in 'imx_pinctrl_probe()' (bsc#1051510).
- pinctrl: imxl: Fix an error handling path in 'imx1_pinctrl_core_probe()' (bsc#1051510).
- pinctrl: samsung: Save/restore eint_mask over suspend for EINT_TYPE GPIOs (bsc#1051510).
- platform/x86: dell-laptop: do not register micmute LED if there is no token (bsc#1111666).
- platform/x86: hp-wmi: Convert simple_strtoul() to kstrtou32() (bsc#1111666).
- PM / Domains: Allow genpd users to specify default active wakeup behavior (git-fixes).
- pnp: Use list_for_each_entry() instead of open coding (git fixes).
- powerpc/64s: Do not let DT CPU features set FSCR_DSCR (bsc#1065729).
- powerpc/64s: Save FSCR to init_task.thread.fscr after feature init (bsc#1065729).
- powerpc/book3s64: Export has_transparent_hugepage() related functions (bsc#1171759).
- powerpc/book3s64/pkeys: Fix pkey_access_permitted() for execute disable pkey (bsc#1065729).
- powerpc/fadump: fix race between pstore write and fadump crash trigger (bsc#1168959 ltc#185010).
- powerpc/xive: Clear the page tables for the ESB IO mapping (bsc#1085030).
- powerpc/xmon: Reset RCU and soft lockup watchdogs (bsc#1065729).
- power: supply: bq24257_charger: Replace depends on REGMAP_I2C with select (bsc#1051510).
- power: supply: lp8788: Fix an error handling path in 'lp8788_charger_probe()' (bsc#1051510).
- power: supply: smb347-charger: IRQSTAT_D is volatile (bsc#1051510).
- power: vexpress: add suppress_bind_attrs to true (bsc#1111666).
- pppoe: only process PADT targeted at local interfaces (networking-stable-20_05_16).
- qed: reduce maximum stack frame size (git-fixes).
- qlcnic: fix missing release in qlcnic_83xx_interrupt_test (git-fixes).
- r8152: support additional Microsoft Surface Ethernet Adapter variant (networking-stable-20_05_27).
- raid5: remove gfp flags from scribble_alloc() (bsc#1166985).
- RDMA/efa: Fix setting of wrong bit in get/set_feature commands (bsc#1111666)
- RDMA/efa: Set maximum pkeys device attribute (bsc#1111666)
- RDMA/efa: Support remote read access in MR registration (bsc#1111666)
- RDMA/efa: Unified getters/setters for device structs bitmask access (bsc#1111666)
- README.BRANCH: Add Takashi Iwai as primary maintainer.
- regmap: debugfs: Do not sleep while atomic for fast_io regmaps (bsc#1111666).
- resolve KABI warning for perf-pt-coresight (git-fixes).
- Revert 'bcache: ignore pending signals when creating gc and allocator thread' (git fixes (block drivers)).
- Revert commit e918e570415c ('tpm_tis: Remove the HID IFX0102') (bsc#1111666).
- Revert 'dm crypt: use WQ_HIGHPRI for the IO and crypt workqueues' (git fixes (block drivers)).
- Revert 'thermal: mediatek: fix register index error' (bsc#1111666).
- Revert 'tools lib traceevent: Remove unneeded qsort and uses memmove'
- rtnetlink: Fix memory(net_device) leak when ->newlink fails (git-fixes).
- s390/bpf: Maintain 8-byte stack alignment (bsc#1169194).
- s390: fix syscall_get_error for compat processes (git-fixes).
- s390/qdio: consistently restore the IRQ handler (git-fixes).
- s390/qdio: lock device while installing IRQ handler (git-fixes).
- s390/qdio: put thinint indicator after early error (git-fixes).
- s390/qdio: tear down thinint indicator after early error (git-fixes).
- s390/qeth: fix error handling for isolation mode cmds (git-fixes).
- sch_choke: avoid potential panic in choke_reset() (networking-stable-20_05_12).
- sch_sfq: validate silly quantum values (networking-stable-20_05_12).
- scsi: aacraid: fix a signedness bug (bsc#1174296).
- scsi: hisi_sas: fix calls to dma_set_mask_and_coherent() (bsc#1174296).
- scsi: ibmvscsi: Do not send host info in adapter info MAD after LPM (bsc#1172759 ltc#184814).
- scsi: lpfc: Add an internal trace log buffer (bsc#1172687 bsc#1171530).
- scsi: lpfc: Add blk_io_poll support for latency improvment (bsc#1172687 bsc#1171530).
- scsi: lpfc: Add support to display if adapter dumps are available (bsc#1172687 bsc#1171530).
- scsi: lpfc: Allow applications to issue Common Set Features mailbox command (bsc#1172687 bsc#1171530).
- scsi: lpfc: Avoid another null dereference in lpfc_sli4_hba_unset() (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix inconsistent indenting (bsc#1158983).
- scsi: lpfc: Fix interrupt assignments when multiple vectors are supported on same CPU (bsc#1158983).
- scsi: lpfc: Fix kdump hang on PPC (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix language in 0373 message to reflect non-error message (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix less-than-zero comparison of unsigned value (bsc#1158983).
- scsi: lpfc: Fix missing MDS functionality (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix NVMe rport deregister and registration during ADISC (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix oops due to overrun when reading SLI3 data (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix shost refcount mismatch when deleting vport (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix stack trace seen while setting rrq active (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix unused assignment in lpfc_sli4_bsg_link_diag_test (bsc#1172687 bsc#1171530).
- scsi: lpfc: Update lpfc version to 12.8.0.2 (bsc#1158983).
- scsi: megaraid_sas: Fix a compilation warning (bsc#1174296).
- scsi: mpt3sas: Fix double free in attach error handling (bsc#1174296).
- scsi: qedf: Add port_id getter (bsc#1150660).
- scsi: qla2xxx: Fix a condition in qla2x00_find_all_fabric_devs() (bsc#1174296).
- scsi: qla2xxx: Set NVMe status code for failed NVMe FCP request (bsc#1158983).
- sctp: Do not add the shutdown timer if its already been added (networking-stable-20_05_27).
- sctp: Start shutdown on association restart if in SHUTDOWN-SENT state and socket is closed (networking-stable-20_05_27).
- spi: dw: use 'smp_mb()' to avoid sending spi data error (bsc#1051510).
- spi: fix initial SPI_SR value in spi-fsl-dspi (bsc#1111666).
- spi: pxa2xx: Apply CS clk quirk to BXT (bsc#1111666).
- spi: spidev: fix a race between spidev_release and spidev_remove (bsc#1111666).
- spi: spi-mem: Fix Dual/Quad modes on Octal-capable devices (bsc#1111666).
- spi: spi-sun6i: sun6i_spi_transfer_one(): fix setting of clock rate (bsc#1111666).
- staging: comedi: verify array index is correct before using it (bsc#1111666).
- staging: rtl8712: Fix IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK (bsc#1051510).
- staging: sm750fb: add missing case while setting FB_VISUAL (bsc#1051510).
- SUNRPC: The TCP back channel mustn't disappear while requests are outstanding (bsc#1152624).
- tg3: driver sleeps indefinitely when EEH errors exceed eeh_max_freezes (bsc#1173284).
- timers: Add a function to start/reduce a timer (networking-stable-20_05_27).
- tpm_tis: extra chip->ops check on error path in tpm_tis_core_init (bsc#1111666).
- tpm_tis: Remove the HID IFX0102 (bsc#1111666).
- tracing: Fix event trigger to accept redundant spaces (git-fixes).
- tty: hvc_console, fix crashes on parallel open/close (git-fixes).
- tty: n_gsm: Fix bogus i++ in gsm_data_kick (bsc#1051510).
- tty: n_gsm: Fix SOF skipping (bsc#1051510).
- tty: n_gsm: Fix waking up upper tty layer when room available (bsc#1051510).
- tunnel: Propagate ECT(1) when decapsulating as recommended by RFC6040 (networking-stable-20_05_12).
- ubifs: remove broken lazytime support (bsc#1173826).
- usb: add USB_QUIRK_DELAY_INIT for Logitech C922 (git-fixes).
- USB: c67x00: fix use after free in c67x00_giveback_urb (bsc#1111666).
- usb: chipidea: core: add wakeup support for extcon (bsc#1111666).
- usb: dwc2: Fix shutdown callback in platform (bsc#1111666).
- usb: dwc2: gadget: move gadget resume after the core is in L0 state (bsc#1051510).
- usb: dwc3: gadget: introduce cancelled_list (git-fixes).
- usb: dwc3: gadget: never call ->complete() from ->ep_queue() (git-fixes).
- usb: dwc3: gadget: Properly handle ClearFeature(halt) (git-fixes).
- usb: dwc3: gadget: Properly handle failed kick_transfer (git-fixes).
- USB: ehci: reopen solution for Synopsys HC bug (git-fixes).
- usb: gadget: fix potential double-free in m66592_probe (bsc#1111666).
- usb: gadget: lpc32xx_udc: do not dereference ep pointer before null check (bsc#1051510).
- usb: gadget: udc: atmel: fix uninitialized read in debug printk (bsc#1111666).
- usb: gadget: udc: atmel: remove outdated comment in usba_ep_disable() (bsc#1111666).
- usb: gadget: udc: Potential Oops in error handling code (bsc#1111666).
- USB: gadget: udc: s3c2410_udc: Remove pointless NULL check in s3c2410_udc_nuke (bsc#1051510).
- usb: host: ehci-exynos: Fix error check in exynos_ehci_probe() (bsc#1111666).
- USB: host: ehci-mxc: Add error handling in ehci_mxc_drv_probe() (bsc#1051510).
- usb: musb: Fix runtime PM imbalance on error (bsc#1051510).
- usb: musb: start session in resume for host port (bsc#1051510).
- usbnet: smsc95xx: Fix use-after-free after removal (bsc#1111666).
- USB: ohci-sm501: Add missed iounmap() in remove (bsc#1111666).
- USB: serial: ch341: add new Product ID for CH340 (bsc#1111666).
- USB: serial: cypress_m8: enable Simply Automated UPB PIM (bsc#1111666).
- USB: serial: iuu_phoenix: fix memory corruption (bsc#1111666).
- USB: serial: option: add GosunCn GM500 series (bsc#1111666).
- USB: serial: option: add Quectel EG95 LTE modem (bsc#1111666).
- USB: serial: option: add Telit LE910C1-EUX compositions (bsc#1051510).
- USB: serial: qcserial: add DW5816e QDL support (bsc#1051510).
- USB: serial: usb_wwan: do not resubmit rx urb on fatal errors (bsc#1051510).
- USB: serial: usb_wwan: do not resubmit rx urb on fatal errors (git-fixes).
- vfio/pci: Fix SR-IOV VF handling with MMIO blocking (bsc#1174123).
- vfs: Fix EOVERFLOW testing in put_compat_statfs64 (bnc#1151927 5.3.6).
- virtio-blk: handle block_device_operations callbacks after hot unplug (git fixes (block drivers)).
- virtio: virtio_console: add missing MODULE_DEVICE_TABLE() for rproc serial (git-fixes).
- vmxnet3: add geneve and vxlan tunnel offload support (bsc#1172484).
- vmxnet3: add support to get/set rx flow hash (bsc#1172484).
- vmxnet3: allow rx flow hash ops only when rss is enabled (bsc#1172484).
- vmxnet3: avoid format strint overflow warning (bsc#1172484).
- vmxnet3: prepare for version 4 changes (bsc#1172484).
- vmxnet3: Remove always false conditional statement (bsc#1172484).
- vmxnet3: remove redundant initialization of pointer 'rq' (bsc#1172484).
- vmxnet3: remove unused flag 'rxcsum' from struct vmxnet3_adapter (bsc#1172484).
- vmxnet3: Replace msleep(1) with usleep_range() (bsc#1172484).
- vmxnet3: update to version 4 (bsc#1172484).
- vmxnet3: use correct hdr reference when packet is encapsulated (bsc#1172484).
- vsock: fix timeout in vsock_accept() (networking-stable-20_06_07).
- vxlan: Avoid infinite loop when suppressing NS messages with invalid options (git-fixes).
- w1: omap-hdq: cleanup to add missing newline for some dev_dbg (bsc#1051510).
- watchdog: sp805: fix restart handler (bsc#1111666).
- wil6210: add general initialization/size checks (bsc#1111666).
- wil6210: check rx_buff_mgmt before accessing it (bsc#1111666).
- wil6210: ignore HALP ICR if already handled (bsc#1111666).
- wil6210: make sure Rx ring sizes are correlated (git-fixes).
- work around mvfs bug (bsc#1162063).
- x86/apic: Install an empty physflat_init_apic_ldr (bsc#1163309).
- x86/cpu/amd: Make erratum #1054 a legacy erratum (bsc#1114279).
- x86/events/intel/ds: Add PERF_SAMPLE_PERIOD into PEBS_FREERUNNING_FLAGS (git-fixes).
- x86: Fix early boot crash on gcc-10, third try (bsc#1114279).
- x86/{mce,mm}: Unmap the entire page if the whole page is affected and poisoned (bsc#1172257).
- x86/reboot/quirks: Add MacBook6,1 reboot quirk (bsc#1114279).
- xfrm: fix error in comment (git fixes).
- xhci: Fix incorrect EP_STATE_MASK (git-fixes).
Patchnames
SUSE-2020-2103,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-2103
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 15 SP1 Azure kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2020-15393: Fixed a memory leak in usbtest_disconnect (bnc#1173514).\n- CVE-2020-12771: An issue was discovered in btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails (bnc#1171732).\n- CVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).\n- CVE-2020-10773: Fixed a memory leak on s390/s390x, in the cmm_timeout_hander in file arch/s390/mm/cmm.c (bnc#1172999).\n- CVE-2020-14416: Fixed a race condition in tty-\u003edisc_data handling in the slip and slcan line discipline could lead to a use-after-free. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).\n- CVE-2020-10768: Fixed an issue with the prctl() function, where indirect branch speculation could be enabled even though it was diabled before (bnc#1172783).\n- CVE-2020-10766: Fixed an issue which allowed an attacker with a local account to disable SSBD protection (bnc#1172781).\n- CVE-2020-10767: Fixed an issue where Indirect Branch Prediction Barrier was disabled in certain circumstances, leaving the system open to a spectre v2 style attack (bnc#1172782).\n- CVE-2020-13974: Fixed a integer overflow in drivers/tty/vt/keyboard.c, if k_ascii is called several times in a row (bnc#1172775).\n- CVE-2019-20810: Fixed a memory leak in go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c because it did not call snd_card_free for a failure path (bnc#1172458).\n- CVE-2020-10769: A buffer over-read flaw was found in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm\u0027s module, authenc. This flaw allowed a local attacker with user privileges to cause a denial of service (bnc#1173265).\n- CVE-2020-10781: Fixed a denial of service issue in the ZRAM implementation (bsc#1173074).\n- CVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bsc#1174462).\n- CVE-2019-20908: An issue was discovered in drivers/firmware/efi/efi.c: incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032 (bsc#1173567).\n- CVE-2020-15780: An issue was discovered in drivers/acpi/acpi_configfs.c: injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30 (bsc#1173573).\n\nThe following non-security bugs were fixed:\n\n- ACPI: GED: add support for _Exx / _Lxx handler methods (bsc#1111666).\n- ACPI: GED: use correct trigger type field in _Exx / _Lxx handling (bsc#1111666).\n- ACPI: NFIT: Fix unlock on error in scrub_show() (bsc#1171753).\n- ACPI: PM: Avoid using power resources if there are none for D0 (bsc#1051510).\n- ACPI: sysfs: Fix pm_profile_attr type (bsc#1111666).\n- ACPI: video: Use native backlight on Acer Aspire 5783z (bsc#1111666).\n- ACPI: video: Use native backlight on Acer TravelMate 5735Z (bsc#1111666).\n- ALSA: es1688: Add the missed snd_card_free() (bsc#1051510).\n- ALSA: hda: Add ElkhartLake HDMI codec vid (bsc#1111666).\n- ALSA: hda: add sienna_cichlid audio asic id for sienna_cichlid up (bsc#1111666).\n- ALSA: hda/hdmi - enable runtime pm for newer AMD display audio (bsc#1111666).\n- ALSA: hda - let hs_mic be picked ahead of hp_mic (bsc#1111666).\n- ALSA: hda/realtek - add a pintbl quirk for several Lenovo machines (bsc#1111666).\n- ALSA: hda/realtek - Add LED class support for micmute LED (bsc#1111666).\n- ALSA: hda/realtek - Enable micmute LED on and HP system (bsc#1111666).\n- ALSA: hda/realtek - Enable Speaker for ASUS UX533 and UX534 (bsc#1111666).\n- ALSA: hda/realtek - Fix unused variable warning w/o CONFIG_LEDS_TRIGGER_AUDIO (bsc#1111666).\n- ALSA: hda/realtek - Introduce polarity for micmute LED GPIO (bsc#1111666).\n- ALSA: lx6464es - add support for LX6464ESe pci express variant (bsc#1111666).\n- ALSA: opl3: fix infoleak in opl3 (bsc#1111666).\n- ALSA: pcm: disallow linking stream to itself (bsc#1111666).\n- ALSA: usb-audio: Add duplex sound support for USB devices using implicit feedback (bsc#1111666).\n- ALSA: usb-audio: Add Pioneer DJ DJM-900NXS2 support (bsc#1111666).\n- ALSA: usb-audio: add quirk for MacroSilicon MS2109 (bsc#1111666).\n- ALSA: usb-audio: Add vendor, product and profile name for HP Thunderbolt Dock (bsc#1111666).\n- ALSA: usb-audio: Clean up quirk entries with macros (bsc#1111666).\n- ALSA: usb-audio: Fix inconsistent card PM state after resume (bsc#1111666).\n- ALSA: usb-audio: Fix packet size calculation (bsc#1111666).\n- ALSA: usb-audio: Fix racy list management in output queue (bsc#1111666).\n- ALSA: usb-audio: Improve frames size computation (bsc#1111666).\n- ALSA: usb-audio: Manage auto-pm of all bundled interfaces (bsc#1111666).\n- ALSA: usb-audio: Use the new macro for HP Dock rename quirks (bsc#1111666).\n- amdgpu: a NULL -\u003emm does not mean a thread is a kthread (git-fixes).\n- arm64: map FDT as RW for early_init_dt_scan() (jsc#SLE-12423).\n- ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb (bsc#1111666).\n- ath9k: Fix use-after-free Read in ath9k_wmi_ctrl_rx (bsc#1111666).\n- ath9k: Fix use-after-free Write in ath9k_htc_rx_msg (bsc#1111666).\n- ath9x: Fix stack-out-of-bounds Write in ath9k_hif_usb_rx_cb (bsc#1111666).\n- ax25: fix setsockopt(SO_BINDTODEVICE) (networking-stable-20_05_27).\n- b43: Fix connection problem with WPA3 (bsc#1111666).\n- b43_legacy: Fix connection problem with WPA3 (bsc#1111666).\n- bcache: Fix an error code in bch_dump_read() (git fixes (block drivers)).\n- be2net: fix link failure after ethtool offline test (git-fixes).\n- block: nr_sects_write(): Disable preemption on seqcount write (bsc#1173818).\n- block: remove QUEUE_FLAG_STACKABLE (git fixes (block drivers)).\n- block: sed-opal: fix sparse warning: convert __be64 data (git fixes (block drivers)).\n- Bluetooth: Add SCO fallback for invalid LMP parameters error (bsc#1111666).\n- bnxt_en: Fix AER reset logic on 57500 chips (git-fixes).\n- bnxt_en: Fix ethtool selftest crash under error conditions (git-fixes).\n- bnxt_en: Fix handling FRAG_ERR when NVM_INSTALL_UPDATE cmd fails (git-fixes).\n- bnxt_en: Fix ipv6 RFS filter matching logic (git-fixes).\n- bnxt_en: fix NULL dereference in case SR-IOV configuration fails (git-fixes).\n- bnxt_en: Fix VF anti-spoof filter setup (networking-stable-20_05_12).\n- bnxt_en: Fix VLAN acceleration handling in bnxt_fix_features() (networking-stable-20_05_12).\n- bnxt_en: Improve AER slot reset (networking-stable-20_05_12).\n- brcmfmac: fix wrong location to get firmware feature (bsc#1111666).\n- brcmfmac: Transform compatible string for FW loading (bsc#1169771).\n- btrfs: add assertions for tree == inode-\u003eio_tree to extent IO helpers (bsc#1174438).\n- btrfs: add new helper btrfs_lock_and_flush_ordered_range (bsc#1174438).\n- btrfs: Always use a cached extent_state in btrfs_lock_and_flush_ordered_range (bsc#1174438).\n- btrfs: do not zero f_bavail if we have available space (bsc#1168081).\n- btrfs: do not zero f_bavail if we have available space (bsc#1168081).\n- btrfs: drop argument tree from btrfs_lock_and_flush_ordered_range (bsc#1174438).\n- btrfs: fix extent_state leak in btrfs_lock_and_flush_ordered_range (bsc#1174438).\n- btrfs: fix failure of RWF_NOWAIT write into prealloc extent beyond eof (bsc#1174438).\n- btrfs: fix hang on snapshot creation after RWF_NOWAIT write (bsc#1174438).\n- btrfs: fix RWF_NOWAIT write not failling when we need to cow (bsc#1174438).\n- btrfs: fix RWF_NOWAIT writes blocking on extent locks and waiting for IO (bsc#1174438).\n- btrfs: qgroup: Fix a bug that prevents qgroup to be re-enabled after disable (bsc#1172247).\n- btrfs: Return EAGAIN if we can\u0027t start no snpashot write in check_can_nocow (bsc#1174438).\n- btrfs: use correct count in btrfs_file_write_iter() (bsc#1174438).\n- btrfs: Use newly introduced btrfs_lock_and_flush_ordered_range (bsc#1174438).\n- btrfs: volumes: Remove ENOSPC-prone btrfs_can_relocate() (bsc#1171124).\n- bus: sunxi-rsb: Return correct data when mixing 16-bit and 8-bit reads (bsc#1111666).\n- carl9170: remove P2P_GO support (bsc#1111666).\n- CDC-ACM: heed quirk also in error handling (git-fixes).\n- ceph: convert mdsc-\u003ecap_dirty to a per-session list (bsc#1167104).\n- ceph: request expedited service on session\u0027s last cap flush (bsc#1167104).\n- cgroup, blkcg: Prepare some symbols for module and !CONFIG_CGROUP usages (bsc#1173857).\n- char/random: Add a newline at the end of the file (jsc#SLE-12423).\n- cifs: get rid of unused parameter in reconn_setup_dfs_targets() (bsc#1144333).\n- cifs: handle hostnames that resolve to same ip in failover (bsc#1144333 bsc#1161016).\n- cifs: set up next DFS target before generic_ip_connect() (bsc#1144333 bsc#1161016).\n- clk: bcm2835: Fix return type of bcm2835_register_gate (bsc#1051510).\n- clk: clk-flexgen: fix clock-critical handling (bsc#1051510).\n- clk: sunxi: Fix incorrect usage of round_down() (bsc#1051510).\n- clocksource: dw_apb_timer: Make CPU-affiliation being optional (bsc#1111666).\n- compat_ioctl: block: handle BLKREPORTZONE/BLKRESETZONE (git fixes (block drivers)).\n- compat_ioctl: block: handle Persistent Reservations (git fixes (block drivers)).\n- copy_{to,from}_user(): consolidate object size checks (git fixes).\n- crypto: algboss - do not wait during notifier callback (bsc#1111666).\n- crypto: algif_skcipher - Cap recv SG list at ctx-\u003eused (bsc#1111666).\n- crypto: caam - update xts sector size for large input length (bsc#1111666).\n- crypto: cavium/nitrox - Fix \u0027nitrox_get_first_device()\u0027 when ndevlist is fully iterated (bsc#1111666).\n- crypto: cavium/nitrox - Fix \u0027nitrox_get_first_device()\u0027 when ndevlist is fully iterated (git-fixes).\n- Crypto/chcr: fix for ccm(aes) failed test (bsc#1111666).\n- crypto: chelsio/chtls: properly set tp-\u003elsndtime (bsc#1111666).\n- crypto: talitos - fix IPsec cipher in length (git-fixes).\n- crypto: talitos - reorder code in talitos_edesc_alloc() (git-fixes).\n- debugfs: Check module state before warning in {full/open}_proxy_open() (bsc#1173746).\n- devinet: fix memleak in inetdev_init() (networking-stable-20_06_07).\n- /dev/mem: Add missing memory barriers for devmem_inode (git-fixes).\n- /dev/mem: Revoke mappings when a driver claims the region (git-fixes).\n- dmaengine: tegra210-adma: Fix an error handling path in \u0027tegra_adma_probe()\u0027 (bsc#1111666).\n- dm btree: increase rebalance threshold in __rebalance2() (git fixes (block drivers)).\n- dm cache: fix a crash due to incorrect work item cancelling (git fixes (block drivers)).\n- dm crypt: fix benbi IV constructor crash if used in authenticated mode (git fixes (block drivers)).\n- dm: fix potential for q-\u003emake_request_fn NULL pointer (git fixes (block drivers)).\n- dm space map common: fix to ensure new block isn\u0027t already in use (git fixes (block drivers)).\n- dm: various cleanups to md-\u003equeue initialization code (git fixes).\n- dm verity fec: fix hash block number in verity_fec_decode (git fixes (block drivers)).\n- dm verity fec: fix memory leak in verity_fec_dtr (git fixes (block drivers)).\n- dpaa_eth: fix usage as DSA master, try 3 (networking-stable-20_05_27).\n- driver-core, libnvdimm: Let device subsystems add local lockdep coverage (bsc#1171753).\n- Drivers: hv: Change flag to write log level in panic msg to false (bsc#1170617, bsc#1170618).\n- drivers: soc: ti: knav_qmss_queue: Make knav_gp_range_ops static (bsc#1051510).\n- drm: amd/display: fix Kconfig help text (bsc#1113956) \t* only fix DEBUG_KERNEL_DC\n- drm: bridge: adv7511: Extend list of audio sample rates (bsc#1111666).\n- drm/dp_mst: Increase ACT retry timeout to 3s (bsc#1113956) * context changes\n- drm: encoder_slave: fix refcouting error for modules (bsc#1111666).\n- drm: encoder_slave: fix refcouting error for modules (bsc#1114279)\n- drm/i915/icl+: Fix hotplug interrupt disabling after storm detection (bsc#1112178)\n- drm/i915: Whitelist context-local timestamp in the gen9 cmdparser (bsc#1111666).\n- drm/mediatek: Check plane visibility in atomic_update (bsc#1113956) * context changes\n- drm/msm/dpu: fix error return code in dpu_encoder_init (bsc#1111666).\n- drm: panel-orientation-quirks: Add quirk for Asus T101HA panel (bsc#1111666).\n- drm: panel-orientation-quirks: Use generic orientation-data for Acer S1003 (bsc#1111666).\n- drm/qxl: Use correct notify port address when creating cursor ring (bsc#1113956)\n- drm/radeon: fix double free (bsc#1113956)\n- drm/radeon: fix fb_div check in ni_init_smc_spll_table() (bsc#1113956)\n- drm/sun4i: hdmi ddc clk: Fix size of m divider (bsc#1111666).\n- drm/tegra: hub: Do not enable orphaned window group (bsc#1111666).\n- drm/vkms: Hold gem object while still in-use (bsc#1113956) * context changes\n- Drop another USB dwc3 gadget patch that broke the build\n- Drop USB dwc3 gadget patch that broke the build on openSUSE-15.1 branch\n- e1000: Distribute switch variables for initialization (bsc#1111666).\n- e1000e: Disable TSO for buffer overrun workaround (bsc#1051510).\n- e1000e: Do not wake up the system via WOL if device wakeup is disabled (bsc#1051510).\n- e1000e: Relax condition to trigger reset for ME workaround (bsc#1111666).\n- EDAC/amd64: Read back the scrub rate PCI register on F15h (bsc#1114279).\n- efi/random: Increase size of firmware supplied randomness (jsc#SLE-12423).\n- efi/random: Treat EFI_RNG_PROTOCOL output as bootloader randomness (jsc#SLE-12423).\n- efi: READ_ONCE rng seed size before munmap (jsc#SLE-12423).\n- efi: Reorder pr_notice() with add_device_randomness() call (jsc#SLE-12423).\n- evm: Check also if *tfm is an error pointer in init_desc() (bsc#1051510).\n- evm: Fix a small race in init_desc() (bsc#1051510).\n- ext4: fix a data race at inode-\u003ei_blocks (bsc#1171835).\n- ext4: fix partial cluster initialization when splitting extent (bsc#1173839).\n- ext4: fix race between ext4_sync_parent() and rename() (bsc#1173838).\n- ext4, jbd2: ensure panic by fix a race between jbd2 abort and ext4 error handlers (bsc#1173833).\n- extcon: adc-jack: Fix an error handling path in \u0027adc_jack_probe()\u0027 (bsc#1051510).\n- fanotify: fix ignore mask logic for events on child and on dir (bsc#1172719).\n- fdt: add support for rng-seed (jsc#SLE-12423).\n- fdt: Update CRC check for rng-seed (jsc#SLE-12423).\n- firmware: imx: scu: Fix corruption of header (git-fixes).\n- firmware: imx: scu: Fix possible memory leak in imx_scu_probe() (bsc#1111666).\n- Fix boot crash with MD (bsc#1174343) Refresh patches.suse/mdraid-fix-read-write-bytes-accounting.patch\n- fix multiplication overflow in copy_fdtable() (bsc#1173825).\n- Fix Patch-mainline tag in the previous zram fix patch\n- fpga: dfl: afu: Corrected error handling levels (git-fixes).\n- fq_codel: fix TCA_FQ_CODEL_DROP_BATCH_SIZE sanity checks (networking-stable-20_05_12).\n- gpiolib: Document that GPIO line names are not globally unique (bsc#1051510).\n- gpu: host1x: Detach driver on unregister (bsc#1111666).\n- gpu: ipu-v3: pre: do not trigger update if buffer address does not change (bsc#1111666).\n- HID: magicmouse: do not set up autorepeat (git-fixes).\n- HID: sony: Fix for broken buttons on DS3 USB dongles (bsc#1051510).\n- hv_netvsc: Fix netvsc_start_xmit\u0027s return type (git-fixes).\n- hwmon: (acpi_power_meter) Fix potential memory leak in acpi_power_meter_add() (bsc#1111666).\n- hwmon: (emc2103) fix unable to change fan pwm1_enable attribute (bsc#1111666).\n- hwmon: (max6697) Make sure the OVERT mask is set correctly (bsc#1111666).\n- i2c: algo-pca: Add 0x78 as SCL stuck low status for PCA9665 (bsc#1111666).\n- i2c: eg20t: Load module automatically if ID matches (bsc#1111666).\n- i2c: mlxcpld: check correct size of maximum RECV_LEN packet (bsc#1111666).\n- i40e: reduce stack usage in i40e_set_fc (git-fixes).\n- IB/hfi1: Do not destroy hfi1_wq when the device is shut down (bsc#1174409).\n- IB/hfi1: Do not destroy link_wq when the device is shut down (bsc#1174409).\n- ibmveth: Fix max MTU limit (bsc#1173428 ltc#186397).\n- ibmvnic: continue to init in CRQ reset returns H_CLOSED (bsc#1173280 ltc#185369).\n- ibmvnic: Flush existing work items before device removal (bsc#1065729).\n- ibmvnic: Harden device login requests (bsc#1170011 ltc#183538).\n- iio: buffer: Do not allow buffers without any channels enabled to be activated (bsc#1051510).\n- iio:health:afe4404 Fix timestamp alignment and prevent data leak (bsc#1111666).\n- iio:humidity:hdc100x Fix alignment and data leak issues (bsc#1111666).\n- iio:magnetometer:ak8974: Fix alignment and data leak issues (bsc#1111666).\n- iio: mma8452: Add missed iio_device_unregister() call in mma8452_probe() (bsc#1111666).\n- iio: pressure: bmp280: Tolerate IRQ before registering (bsc#1051510).\n- iio:pressure:ms5611 Fix buffer element alignment (bsc#1111666).\n- iio: pressure: zpa2326: handle pm_runtime_get_sync failure (bsc#1111666).\n- ima: Directly assign the ima_default_policy pointer to ima_rules (bsc#1051510).\n- ima: Fix ima digest hash table key calculation (bsc#1051510).\n- include/asm-generic/topology.h: guard cpumask_of_node() macro argument (bsc#1148868).\n- Input: i8042 - add Lenovo XiaoXin Air 12 to i8042 nomux list (bsc#1111666).\n- input: i8042 - Remove special PowerPC handling (git-fixes).\n- Input: synaptics - add a second working PNP_ID for Lenovo T470s (bsc#1111666).\n- intel_idle: Graceful probe failure when MWAIT is disabled (bsc#1174115).\n- intel_th: Fix a NULL dereference when hub driver is not loaded (bsc#1111666).\n- ipvlan: call dev_change_flags when ipvlan mode is reset (git-fixes).\n- ixgbevf: Remove limit of 10 entries for unicast filter list (git-fixes).\n- jbd2: avoid leaking transaction credits when unreserving handle (bsc#1173845).\n- jbd2: Preserve kABI when adding j_abort_mutex (bsc#1173833).\n- kabi: hv: prevent struct device_node to become defined (bsc#1172871).\n- kabi: ppc64le: prevent struct dma_map_ops to become defined (jsc#SLE-12423).\n- kABI: protect struct mlx5_cmd_work_ent (kabi).\n- kABI: reintroduce inet_hashtables.h include to l2tp_ip (kabi).\n- kernfs: fix barrier usage in __kernfs_new_node() (bsc#1111666).\n- KVM: nVMX: Do not reread VMCS-agnostic state when switching VMCS (bsc#1114279).\n- KVM: nVMX: Skip IBPB when switching between vmcs01 and vmcs02 (bsc#1114279).\n- KVM: x86: Fix APIC page invalidation race (bsc#1174122).\n- kvm: x86: Fix L1TF mitigation for shadow MMU (bsc#1171904).\n- KVM: x86/mmu: Set mmio_value to \u00270\u0027 if reserved #PF can\u0027t be generated (bsc#1171904).\n- KVM: x86: only do L1TF workaround on affected processors (bsc#1171904).\n- l2tp: add sk_family checks to l2tp_validate_socket (networking-stable-20_06_07).\n- l2tp: do not use inet_hash()/inet_unhash() (networking-stable-20_06_07).\n- libceph: do not omit recovery_deletes in target_copy() (bsc#1174113).\n- libceph: ignore pool overlay and cache logic on redirects (bsc#1173146).\n- libnvdimm/bus: Fix wait_nvdimm_bus_probe_idle() ABBA deadlock (bsc#1171753).\n- libnvdimm/bus: Prepare the nd_ioctl() path to be re-entrant (bsc#1171753).\n- libnvdimm/bus: Stop holding nvdimm_bus_list_mutex over __nd_ioctl() (bsc#1171753).\n- libnvdimm: cover up changes in struct nvdimm_bus (bsc#1171753).\n- libnvdimm: cover up nd_pfn_sb changes (bsc#1171759).\n- libnvdimm/dax: Pick the right alignment default when creating dax devices (bsc#1171759).\n- libnvdimm/label: Remove the dpa align check (bsc#1171759).\n- libnvdimm/of_pmem: Provide a unique name for bus provider (bsc#1171739).\n- libnvdimm/pfn_dev: Add a build check to make sure we notice when struct page size change (bsc#1171743).\n- libnvdimm/pfn_dev: Add page size and struct page size to pfn superblock (bsc#1171759).\n- libnvdimm/pfn: Prevent raw mode fallback if pfn-infoblock valid (bsc#1171743).\n- libnvdimm/pmem: Advance namespace seed for specific probe errors (bsc#1171743).\n- libnvdimm/region: Initialize bad block for volatile namespaces (bnc#1151927 5.3.6).\n- libnvdimm/region: Rewrite _probe_success() to _advance_seeds() (bsc#1171743).\n- libnvdimm: Use PAGE_SIZE instead of SZ_4K for align check (bsc#1171759).\n- livepatch: Apply vmlinux-specific KLP relocations early (bsc#1071995).\n- livepatch: Disallow vmlinux.ko (bsc#1071995).\n- livepatch: Make klp_apply_object_relocs static (bsc#1071995).\n- livepatch: Prevent module-specific KLP rela sections from referencing vmlinux symbols (bsc#1071995).\n- livepatch: Remove .klp.arch (bsc#1071995).\n- loop: replace kill_bdev with invalidate_bdev (bsc#1173820).\n- lpfc_debugfs: get rid of pointless access_ok() (bsc#1172687 bsc#1171530).\n- lpfc: Synchronize NVME transport and lpfc driver devloss_tmo (bcs#1173060).\n- mac80211: add option for setting control flags (bsc#1111666).\n- mac80211: set IEEE80211_TX_CTRL_PORT_CTRL_PROTO for nl80211 TX (bsc#1111666).\n- mailbox: imx: Disable the clock on devm_mbox_controller_register() failure (git-fixes).\n- md: Avoid namespace collision with bitmap API (git fixes (block drivers)).\n- mdraid: fix read/write bytes accounting (bsc#1172537).\n- md: use memalloc scope APIs in mddev_suspend()/mddev_resume() (bsc#1166985)).\n- media: cec: silence shift wrapping warning in __cec_s_log_addrs() (git-fixes).\n- media: si2157: Better check for running tuner in init (bsc#1111666).\n- mlxsw: core: Do not use WQ_MEM_RECLAIM for mlxsw ordered workqueue (git-fixes).\n- mlxsw: core: Do not use WQ_MEM_RECLAIM for mlxsw workqueue (git-fixes).\n- mlxsw: pci: Return error on PCI reset timeout (git-fixes).\n- mlxsw: spectrum_acl_tcam: Position vchunk in a vregion list properly (networking-stable-20_05_12).\n- mlxsw: spectrum: Disallow prio-tagged packets when PVID is removed (git-fixes).\n- mlxsw: spectrum_dpipe: Add missing error path (git-fixes).\n- mlxsw: spectrum: Prevent force of 56G (git-fixes).\n- mlxsw: spectrum_router: Refresh nexthop neighbour when it becomes dead (git-fixes).\n- mlxsw: spectrum_router: Remove inappropriate usage of WARN_ON() (git-fixes).\n- mlxsw: spectrum_switchdev: Add MDB entries in prepare phase (git-fixes).\n- mlxsw: spectrum_switchdev: Do not treat static FDB entries as sticky (git-fixes).\n- mmc: block: Fix request completion in the CQE timeout path (bsc#1111666).\n- mmc: block: Fix use-after-free issue for rpmb (bsc#1111666).\n- mmc: fix compilation of user API (bsc#1051510).\n- mmc: sdhci: do not enable card detect interrupt for gpio cd type (bsc#1111666).\n- mmc: sdhci-msm: Set SDHCI_QUIRK_MULTIBLOCK_READ_ACMD12 quirk (bsc#1111666).\n- Move upstreamed lpfc patches into sorted section\n- mvpp2: remove misleading comment (git-fixes).\n- net: be more gentle about silly gso requests coming from user (networking-stable-20_06_07).\n- net: check untrusted gso_size at kernel entry (networking-stable-20_06_07).\n- net/cxgb4: Check the return from t4_query_params properly (git-fixes).\n- net: dsa: bcm_sf2: Fix node reference count (git-fixes).\n- net: dsa: loop: Add module soft dependency (networking-stable-20_05_16).\n- net: dsa: mt7530: fix roaming from DSA user ports (networking-stable-20_05_27).\n- net: ena: add intr_moder_rx_interval to struct ena_com_dev and use it (git-fixes).\n- net: ena: add missing ethtool TX timestamping indication (git-fixes).\n- net: ena: avoid memory access violation by validating req_id properly (git-fixes).\n- net: ena: do not wake up tx queue when down (git-fixes).\n- net: ena: ena-com.c: prevent NULL pointer dereference (git-fixes).\n- net: ena: ethtool: use correct value for crc32 hash (git-fixes).\n- net: ena: fix continuous keep-alive resets (git-fixes).\n- net: ena: fix corruption of dev_idx_to_host_tbl (git-fixes).\n- net: ena: fix default tx interrupt moderation interval (git-fixes).\n- net: ena: fix incorrect default RSS key (git-fixes).\n- net: ena: fix incorrectly saving queue numbers when setting RSS indirection table (git-fixes).\n- net: ena: fix issues in setting interrupt moderation params in ethtool (git-fixes).\n- net: ena: fix potential crash when rxfh key is NULL (git-fixes).\n- net: ena: fix retrieval of nonadaptive interrupt moderation intervals (git-fixes).\n- net: ena: fix uses of round_jiffies() (git-fixes).\n- net: ena: make ena rxfh support ETH_RSS_HASH_NO_CHANGE (git-fixes).\n- net: ena: reimplement set/get_coalesce() (git-fixes).\n- net: ena: rss: do not allocate key when not supported (git-fixes).\n- net: ena: rss: fix failure to get indirection table (git-fixes).\n- net: ena: rss: store hash function as values and not bits (git-fixes).\n- netfilter: connlabels: prefer static lock initialiser (git-fixes).\n- netfilter: ctnetlink: netns exit must wait for callbacks (bsc#1169795).\n- netfilter: not mark a spinlock as __read_mostly (git-fixes).\n- net: fix a potential recursive NETDEV_FEAT_CHANGE (networking-stable-20_05_16).\n- net: inet_csk: Fix so_reuseport bind-address cache in tb-\u003efast* (networking-stable-20_05_27).\n- net: ipip: fix wrong address family in init error path (networking-stable-20_05_27).\n- net: ipvlan: Fix ipvlan device tso disabled while NETIF_F_IP_CSUM is set (git-fixes).\n- net: macsec: preserve ingress frame ordering (networking-stable-20_05_12).\n- net/mlx4_core: drop useless LIST_HEAD (git-fixes).\n- net/mlx4_core: fix a memory leak bug (git-fixes).\n- net/mlx4_core: Fix use of ENOSPC around mlx4_counter_alloc() (networking-stable-20_05_12).\n- net/mlx5: Add command entry handling completion (networking-stable-20_05_27).\n- net/mlx5: Avoid panic when setting vport rate (git-fixes).\n- net/mlx5: Continue driver initialization despite debugfs failure (git-fixes).\n- net/mlx5e: ethtool, Fix a typo in WOL function names (git-fixes).\n- net/mlx5e: Fix traffic duplication in ethtool steering (git-fixes).\n- net/mlx5e: Remove unnecessary clear_bit()s (git-fixes).\n- net/mlx5e: Update netdev txq on completions during closure (networking-stable-20_05_27).\n- net/mlx5: Fix command entry leak in Internal Error State (networking-stable-20_05_12).\n- net/mlx5: Fix crash upon suspend/resume (networking-stable-20_06_07).\n- net/mlx5: Fix forced completion access non initialized command entry (networking-stable-20_05_12).\n- net: mvmdio: allow up to four clocks to be specified for orion-mdio (git-fixes).\n- net: mvpp2: prs: Do not override the sign bit in SRAM parser shift (git-fixes).\n- net: phy: fix aneg restart in phy_ethtool_set_eee (networking-stable-20_05_16).\n- netprio_cgroup: Fix unlimited memory leak of v2 cgroups (networking-stable-20_05_16).\n- net: qede: stop adding events on an already destroyed workqueue (git-fixes).\n- net: qed: fix excessive QM ILT lines consumption (git-fixes).\n- net: qed: fix NVMe login fails over VFs (git-fixes).\n- net: qrtr: Fix passing invalid reference to qrtr_local_enqueue() (networking-stable-20_05_27).\n- net: revert \u0027net: get rid of an signed integer overflow in ip_idents_reserve()\u0027 (networking-stable-20_05_27).\n- net sched: fix reporting the first-time use timestamp (networking-stable-20_05_27).\n- net: stricter validation of untrusted gso packets (networking-stable-20_05_12).\n- net/tls: Fix sk_psock refcnt leak in bpf_exec_tx_verdict() (networking-stable-20_05_12).\n- net/tls: Fix sk_psock refcnt leak when in tls_data_ready() (networking-stable-20_05_12).\n- net: usb: qmi_wwan: add support for DW5816e (networking-stable-20_05_12).\n- net: usb: qmi_wwan: add Telit 0x1050 composition (networking-stable-20_06_07).\n- net: usb: qmi_wwan: add Telit LE910C1-EUX composition (networking-stable-20_06_07).\n- net: vmxnet3: fix possible buffer overflow caused by bad DMA value in vmxnet3_get_rss() (bsc#1172484).\n- nfp: bpf: fix code-gen bug on BPF_ALU | BPF_XOR | BPF_K (git-fixes).\n- NFS: Fix an RCU lock leak in nfs4_refresh_delegation_stateid() (bsc#1170592).\n- NFSv4: Retry CLOSE and DELEGRETURN on NFS4ERR_OLD_STATEID (bsc#1170592).\n- nilfs2: fix null pointer dereference at nilfs_segctor_do_construct() (bsc#1173857).\n- nl80211: fix NL80211_ATTR_CHANNEL_WIDTH attribute type (bsc#1111666).\n- nvdimm: Avoid race between probe and reading device attributes (bsc#1170442).\n- nvme: check for NVME_CTRL_LIVE in nvme_report_ns_ids() (bcs#1171558 bsc#1159058).\n- nvme: do not update multipath disk information if the controller is down (bcs#1171558 bsc#1159058).\n- nvme: fail cancelled commands with NVME_SC_HOST_PATH_ERROR (bsc#1158983 bsc#1172538).\n- nvme-fc: Fail transport errors with NVME_SC_HOST_PATH (bsc#1158983 bsc#1172538).\n- nvme-tcp: fail command with NVME_SC_HOST_PATH_ERROR send failed (bsc#1158983 bsc#1172538).\n- objtool: Clean instruction state before each function validation (bsc#1169514).\n- objtool: Ignore empty alternatives (bsc#1169514).\n- ocfs2: no need try to truncate file beyond i_size (bsc#1171841).\n- overflow: Fix -Wtype-limits compilation warnings (git fixes).\n- overflow.h: Add arithmetic shift helper (git fixes).\n- p54usb: add AirVasT USB stick device-id (bsc#1051510).\n- padata: ensure the reorder timer callback runs on the correct CPU (git-fixes).\n- padata: reorder work kABI fixup (git-fixes).\n- PCI/AER: Remove HEST/FIRMWARE_FIRST parsing for AER ownership (bsc#1174356).\n- PCI/AER: Use only _OSC to determine AER ownership (bsc#1174356).\n- PCI: Allow pci_resize_resource() for devices on root bus (bsc#1051510).\n- PCI: Fix pci_register_host_bridge() device_register() error handling (bsc#1051510).\n- PCI: Generalize multi-function power dependency device links (bsc#1111666).\n- PCI: hv: Change pci_protocol_version to per-hbus (bsc#1172871, bsc#1172872).\n- PCI: hv: Fix the PCI HyperV probe failure path to release resource properly (bsc#1172871, bsc#1172872).\n- PCI: hv: Introduce hv_msi_entry (bsc#1172871, bsc#1172872).\n- PCI: hv: Move hypercall related definitions into tlfs header (bsc#1172871, bsc#1172872).\n- PCI: hv: Move retarget related structures into tlfs header (bsc#1172871, bsc#1172872).\n- PCI: hv: Reorganize the code in preparation of hibernation (bsc#1172871, bsc#1172872).\n- PCI: hv: Retry PCI bus D0 entry on invalid device state (bsc#1172871, bsc#1172872).\n- PCI: pciehp: Fix indefinite wait on sysfs requests (git-fixes).\n- PCI: pciehp: Support interrupts sent from D3hot (git-fixes).\n- PCI/PM: Call .bridge_d3() hook only if non-NULL (git-fixes).\n- PCI: Program MPS for RCiEP devices (bsc#1051510).\n- PCI/PTM: Inherit Switch Downstream Port PTM settings from Upstream Port (bsc#1051510).\n- pci: Revive pci_dev __aer_firmware_first* fields for kABI (bsc#1174356).\n- pcm_native: result of put_user() needs to be checked (bsc#1111666).\n- perf: Allocate context task_ctx_data for child event (git-fixes).\n- perf/cgroup: Fix perf cgroup hierarchy support (git-fixes).\n- perf: Copy parent\u0027s address filter offsets on clone (git-fixes).\n- perf/core: Add sanity check to deal with pinned event failure (git-fixes).\n- perf/core: Avoid freeing static PMU contexts when PMU is unregistered (git-fixes).\n- perf/core: Correct event creation with PERF_FORMAT_GROUP (git-fixes).\n- perf/core: Do not WARN() for impossible ring-buffer sizes (git-fixes).\n- perf/core: Fix ctx_event_type in ctx_resched() (git-fixes).\n- perf/core: Fix error handling in perf_event_alloc() (git-fixes).\n- perf/core: Fix exclusive events\u0027 grouping (git-fixes).\n- perf/core: Fix group scheduling with mixed hw and sw events (git-fixes).\n- perf/core: Fix impossible ring-buffer sizes warning (git-fixes).\n- perf/core: Fix locking for children siblings group read (git-fixes).\n- perf/core: Fix lock inversion between perf,trace,cpuhp (git-fixes (dependent patch for 18736eef1213)).\n- perf/core: Fix perf_event_read_value() locking (git-fixes).\n- perf/core: Fix perf_pmu_unregister() locking (git-fixes).\n- perf/core: Fix __perf_read_group_add() locking (git-fixes (dependent patch)).\n- perf/core: Fix perf_sample_regs_user() mm check (git-fixes).\n- perf/core: Fix possible Spectre-v1 indexing for -\u003eaux_pages (git-fixes).\n- perf/core: Fix race between close() and fork() (git-fixes).\n- perf/core: Fix the address filtering fix (git-fixes).\n- perf/core: Fix use-after-free in uprobe_perf_close() (git-fixes).\n- perf/core: Force USER_DS when recording user stack data (git-fixes).\n- perf/core: Restore mmap record type correctly (git-fixes).\n- perf: Fix header.size for namespace events (git-fixes).\n- perf/ioctl: Add check for the sample_period value (git-fixes).\n- perf, pt, coresight: Fix address filters for vmas with non-zero offset (git-fixes).\n- perf: Return proper values for user stack errors (git-fixes).\n- perf/x86/amd: Constrain Large Increment per Cycle events (git-fixes).\n- perf/x86/amd/ibs: Fix reading of the IBS OpData register and thus precise RIP validity (git-fixes).\n- perf/x86/amd/ibs: Fix sample bias for dispatched micro-ops (git-fixes).\n- perf/x86/amd/ibs: Handle erratum #420 only on the affected CPU family (10h) (git-fixes).\n- perf/x86/amd/iommu: Make the \u0027amd_iommu_attr_groups\u0027 symbol static (git-fixes).\n- perf/x86/amd/uncore: Do not set \u0027ThreadMask\u0027 and \u0027SliceMask\u0027 for non-L3 PMCs (git-fixes stable).\n- perf/x86/amd/uncore: Set the thread mask for F17h L3 PMCs (git-fixes).\n- perf/x86/amd/uncore: Set ThreadMask and SliceMask for L3 Cache perf events (git-fixes stable).\n- perf/x86: Enable free running PEBS for REGS_USER/INTR (git-fixes).\n- perf/x86: Fix incorrect PEBS_REGS (git-fixes).\n- perf/x86/intel: Add generic branch tracing check to intel_pmu_has_bts() (git-fixes).\n- perf/x86/intel: Add proper condition to run sched_task callbacks (git-fixes).\n- perf/x86/intel/bts: Fix the use of page_private() (git-fixes).\n- perf/x86/intel: Fix PT PMI handling (git-fixes).\n- perf/x86/intel: Move branch tracing setup to the Intel-specific source file (git-fixes).\n- perf/x86/intel/uncore: Add Node ID mask (git-fixes).\n- perf/x86/intel/uncore: Fix PCI BDF address of M3UPI on SKX (git-fixes).\n- perf/x86/intel/uncore: Handle invalid event coding for free-running counter (git-fixes).\n- perf/x86/uncore: Fix event group support (git-fixes).\n- pid: Improve the comment about waiting in zap_pid_ns_processes (git fixes)).\n- pinctrl: freescale: imx: Fix an error handling path in \u0027imx_pinctrl_probe()\u0027 (bsc#1051510).\n- pinctrl: imxl: Fix an error handling path in \u0027imx1_pinctrl_core_probe()\u0027 (bsc#1051510).\n- pinctrl: samsung: Save/restore eint_mask over suspend for EINT_TYPE GPIOs (bsc#1051510).\n- platform/x86: dell-laptop: do not register micmute LED if there is no token (bsc#1111666).\n- platform/x86: hp-wmi: Convert simple_strtoul() to kstrtou32() (bsc#1111666).\n- PM / Domains: Allow genpd users to specify default active wakeup behavior (git-fixes).\n- pnp: Use list_for_each_entry() instead of open coding (git fixes).\n- powerpc/64s: Do not let DT CPU features set FSCR_DSCR (bsc#1065729).\n- powerpc/64s: Save FSCR to init_task.thread.fscr after feature init (bsc#1065729).\n- powerpc/book3s64: Export has_transparent_hugepage() related functions (bsc#1171759).\n- powerpc/book3s64/pkeys: Fix pkey_access_permitted() for execute disable pkey (bsc#1065729).\n- powerpc/fadump: fix race between pstore write and fadump crash trigger (bsc#1168959 ltc#185010).\n- powerpc/xive: Clear the page tables for the ESB IO mapping (bsc#1085030).\n- powerpc/xmon: Reset RCU and soft lockup watchdogs (bsc#1065729).\n- power: supply: bq24257_charger: Replace depends on REGMAP_I2C with select (bsc#1051510).\n- power: supply: lp8788: Fix an error handling path in \u0027lp8788_charger_probe()\u0027 (bsc#1051510).\n- power: supply: smb347-charger: IRQSTAT_D is volatile (bsc#1051510).\n- power: vexpress: add suppress_bind_attrs to true (bsc#1111666).\n- pppoe: only process PADT targeted at local interfaces (networking-stable-20_05_16).\n- qed: reduce maximum stack frame size (git-fixes).\n- qlcnic: fix missing release in qlcnic_83xx_interrupt_test (git-fixes).\n- r8152: support additional Microsoft Surface Ethernet Adapter variant (networking-stable-20_05_27).\n- raid5: remove gfp flags from scribble_alloc() (bsc#1166985).\n- RDMA/efa: Fix setting of wrong bit in get/set_feature commands (bsc#1111666)\n- RDMA/efa: Set maximum pkeys device attribute (bsc#1111666)\n- RDMA/efa: Support remote read access in MR registration (bsc#1111666)\n- RDMA/efa: Unified getters/setters for device structs bitmask access (bsc#1111666)\n- README.BRANCH: Add Takashi Iwai as primary maintainer.\n- regmap: debugfs: Do not sleep while atomic for fast_io regmaps (bsc#1111666).\n- resolve KABI warning for perf-pt-coresight (git-fixes).\n- Revert \u0027bcache: ignore pending signals when creating gc and allocator thread\u0027 (git fixes (block drivers)).\n- Revert commit e918e570415c (\u0027tpm_tis: Remove the HID IFX0102\u0027) (bsc#1111666).\n- Revert \u0027dm crypt: use WQ_HIGHPRI for the IO and crypt workqueues\u0027 (git fixes (block drivers)).\n- Revert \u0027thermal: mediatek: fix register index error\u0027 (bsc#1111666).\n- Revert \u0027tools lib traceevent: Remove unneeded qsort and uses memmove\u0027\n- rtnetlink: Fix memory(net_device) leak when -\u003enewlink fails (git-fixes).\n- s390/bpf: Maintain 8-byte stack alignment (bsc#1169194).\n- s390: fix syscall_get_error for compat processes (git-fixes).\n- s390/qdio: consistently restore the IRQ handler (git-fixes).\n- s390/qdio: lock device while installing IRQ handler (git-fixes).\n- s390/qdio: put thinint indicator after early error (git-fixes).\n- s390/qdio: tear down thinint indicator after early error (git-fixes).\n- s390/qeth: fix error handling for isolation mode cmds (git-fixes).\n- sch_choke: avoid potential panic in choke_reset() (networking-stable-20_05_12).\n- sch_sfq: validate silly quantum values (networking-stable-20_05_12).\n- scsi: aacraid: fix a signedness bug (bsc#1174296).\n- scsi: hisi_sas: fix calls to dma_set_mask_and_coherent() (bsc#1174296).\n- scsi: ibmvscsi: Do not send host info in adapter info MAD after LPM (bsc#1172759 ltc#184814).\n- scsi: lpfc: Add an internal trace log buffer (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Add blk_io_poll support for latency improvment (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Add support to display if adapter dumps are available (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Allow applications to issue Common Set Features mailbox command (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Avoid another null dereference in lpfc_sli4_hba_unset() (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix inconsistent indenting (bsc#1158983).\n- scsi: lpfc: Fix interrupt assignments when multiple vectors are supported on same CPU (bsc#1158983).\n- scsi: lpfc: Fix kdump hang on PPC (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix language in 0373 message to reflect non-error message (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix less-than-zero comparison of unsigned value (bsc#1158983).\n- scsi: lpfc: Fix missing MDS functionality (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix NVMe rport deregister and registration during ADISC (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix oops due to overrun when reading SLI3 data (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix shost refcount mismatch when deleting vport (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix stack trace seen while setting rrq active (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Fix unused assignment in lpfc_sli4_bsg_link_diag_test (bsc#1172687 bsc#1171530).\n- scsi: lpfc: Update lpfc version to 12.8.0.2 (bsc#1158983).\n- scsi: megaraid_sas: Fix a compilation warning (bsc#1174296).\n- scsi: mpt3sas: Fix double free in attach error handling (bsc#1174296).\n- scsi: qedf: Add port_id getter (bsc#1150660).\n- scsi: qla2xxx: Fix a condition in qla2x00_find_all_fabric_devs() (bsc#1174296).\n- scsi: qla2xxx: Set NVMe status code for failed NVMe FCP request (bsc#1158983).\n- sctp: Do not add the shutdown timer if its already been added (networking-stable-20_05_27).\n- sctp: Start shutdown on association restart if in SHUTDOWN-SENT state and socket is closed (networking-stable-20_05_27).\n- spi: dw: use \u0027smp_mb()\u0027 to avoid sending spi data error (bsc#1051510).\n- spi: fix initial SPI_SR value in spi-fsl-dspi (bsc#1111666).\n- spi: pxa2xx: Apply CS clk quirk to BXT (bsc#1111666).\n- spi: spidev: fix a race between spidev_release and spidev_remove (bsc#1111666).\n- spi: spi-mem: Fix Dual/Quad modes on Octal-capable devices (bsc#1111666).\n- spi: spi-sun6i: sun6i_spi_transfer_one(): fix setting of clock rate (bsc#1111666).\n- staging: comedi: verify array index is correct before using it (bsc#1111666).\n- staging: rtl8712: Fix IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK (bsc#1051510).\n- staging: sm750fb: add missing case while setting FB_VISUAL (bsc#1051510).\n- SUNRPC: The TCP back channel mustn\u0027t disappear while requests are outstanding (bsc#1152624).\n- tg3: driver sleeps indefinitely when EEH errors exceed eeh_max_freezes (bsc#1173284).\n- timers: Add a function to start/reduce a timer (networking-stable-20_05_27).\n- tpm_tis: extra chip-\u003eops check on error path in tpm_tis_core_init (bsc#1111666).\n- tpm_tis: Remove the HID IFX0102 (bsc#1111666).\n- tracing: Fix event trigger to accept redundant spaces (git-fixes).\n- tty: hvc_console, fix crashes on parallel open/close (git-fixes).\n- tty: n_gsm: Fix bogus i++ in gsm_data_kick (bsc#1051510).\n- tty: n_gsm: Fix SOF skipping (bsc#1051510).\n- tty: n_gsm: Fix waking up upper tty layer when room available (bsc#1051510).\n- tunnel: Propagate ECT(1) when decapsulating as recommended by RFC6040 (networking-stable-20_05_12).\n- ubifs: remove broken lazytime support (bsc#1173826).\n- usb: add USB_QUIRK_DELAY_INIT for Logitech C922 (git-fixes).\n- USB: c67x00: fix use after free in c67x00_giveback_urb (bsc#1111666).\n- usb: chipidea: core: add wakeup support for extcon (bsc#1111666).\n- usb: dwc2: Fix shutdown callback in platform (bsc#1111666).\n- usb: dwc2: gadget: move gadget resume after the core is in L0 state (bsc#1051510).\n- usb: dwc3: gadget: introduce cancelled_list (git-fixes).\n- usb: dwc3: gadget: never call -\u003ecomplete() from -\u003eep_queue() (git-fixes).\n- usb: dwc3: gadget: Properly handle ClearFeature(halt) (git-fixes).\n- usb: dwc3: gadget: Properly handle failed kick_transfer (git-fixes).\n- USB: ehci: reopen solution for Synopsys HC bug (git-fixes).\n- usb: gadget: fix potential double-free in m66592_probe (bsc#1111666).\n- usb: gadget: lpc32xx_udc: do not dereference ep pointer before null check (bsc#1051510).\n- usb: gadget: udc: atmel: fix uninitialized read in debug printk (bsc#1111666).\n- usb: gadget: udc: atmel: remove outdated comment in usba_ep_disable() (bsc#1111666).\n- usb: gadget: udc: Potential Oops in error handling code (bsc#1111666).\n- USB: gadget: udc: s3c2410_udc: Remove pointless NULL check in s3c2410_udc_nuke (bsc#1051510).\n- usb: host: ehci-exynos: Fix error check in exynos_ehci_probe() (bsc#1111666).\n- USB: host: ehci-mxc: Add error handling in ehci_mxc_drv_probe() (bsc#1051510).\n- usb: musb: Fix runtime PM imbalance on error (bsc#1051510).\n- usb: musb: start session in resume for host port (bsc#1051510).\n- usbnet: smsc95xx: Fix use-after-free after removal (bsc#1111666).\n- USB: ohci-sm501: Add missed iounmap() in remove (bsc#1111666).\n- USB: serial: ch341: add new Product ID for CH340 (bsc#1111666).\n- USB: serial: cypress_m8: enable Simply Automated UPB PIM (bsc#1111666).\n- USB: serial: iuu_phoenix: fix memory corruption (bsc#1111666).\n- USB: serial: option: add GosunCn GM500 series (bsc#1111666).\n- USB: serial: option: add Quectel EG95 LTE modem (bsc#1111666).\n- USB: serial: option: add Telit LE910C1-EUX compositions (bsc#1051510).\n- USB: serial: qcserial: add DW5816e QDL support (bsc#1051510).\n- USB: serial: usb_wwan: do not resubmit rx urb on fatal errors (bsc#1051510).\n- USB: serial: usb_wwan: do not resubmit rx urb on fatal errors (git-fixes).\n- vfio/pci: Fix SR-IOV VF handling with MMIO blocking (bsc#1174123).\n- vfs: Fix EOVERFLOW testing in put_compat_statfs64 (bnc#1151927 5.3.6).\n- virtio-blk: handle block_device_operations callbacks after hot unplug (git fixes (block drivers)).\n- virtio: virtio_console: add missing MODULE_DEVICE_TABLE() for rproc serial (git-fixes).\n- vmxnet3: add geneve and vxlan tunnel offload support (bsc#1172484).\n- vmxnet3: add support to get/set rx flow hash (bsc#1172484).\n- vmxnet3: allow rx flow hash ops only when rss is enabled (bsc#1172484).\n- vmxnet3: avoid format strint overflow warning (bsc#1172484).\n- vmxnet3: prepare for version 4 changes (bsc#1172484).\n- vmxnet3: Remove always false conditional statement (bsc#1172484).\n- vmxnet3: remove redundant initialization of pointer \u0027rq\u0027 (bsc#1172484).\n- vmxnet3: remove unused flag \u0027rxcsum\u0027 from struct vmxnet3_adapter (bsc#1172484).\n- vmxnet3: Replace msleep(1) with usleep_range() (bsc#1172484).\n- vmxnet3: update to version 4 (bsc#1172484).\n- vmxnet3: use correct hdr reference when packet is encapsulated (bsc#1172484).\n- vsock: fix timeout in vsock_accept() (networking-stable-20_06_07).\n- vxlan: Avoid infinite loop when suppressing NS messages with invalid options (git-fixes).\n- w1: omap-hdq: cleanup to add missing newline for some dev_dbg (bsc#1051510).\n- watchdog: sp805: fix restart handler (bsc#1111666).\n- wil6210: add general initialization/size checks (bsc#1111666).\n- wil6210: check rx_buff_mgmt before accessing it (bsc#1111666).\n- wil6210: ignore HALP ICR if already handled (bsc#1111666).\n- wil6210: make sure Rx ring sizes are correlated (git-fixes).\n- work around mvfs bug (bsc#1162063).\n- x86/apic: Install an empty physflat_init_apic_ldr (bsc#1163309).\n- x86/cpu/amd: Make erratum #1054 a legacy erratum (bsc#1114279).\n- x86/events/intel/ds: Add PERF_SAMPLE_PERIOD into PEBS_FREERUNNING_FLAGS (git-fixes).\n- x86: Fix early boot crash on gcc-10, third try (bsc#1114279).\n- x86/{mce,mm}: Unmap the entire page if the whole page is affected and poisoned (bsc#1172257).\n- x86/reboot/quirks: Add MacBook6,1 reboot quirk (bsc#1114279).\n- xfrm: fix error in comment (git fixes).\n- xhci: Fix incorrect EP_STATE_MASK (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2020-2103,SUSE-SLE-Module-Public-Cloud-15-SP1-2020-2103", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2103-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2020:2103-1", "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20202103-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2020:2103-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-August/007208.html" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1065729", "url": "https://bugzilla.suse.com/1065729" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1085030", "url": "https://bugzilla.suse.com/1085030" }, { "category": "self", "summary": "SUSE Bug 1111666", "url": "https://bugzilla.suse.com/1111666" }, { "category": "self", "summary": "SUSE Bug 1112178", "url": "https://bugzilla.suse.com/1112178" }, { "category": "self", "summary": "SUSE Bug 1113956", "url": "https://bugzilla.suse.com/1113956" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1144333", "url": "https://bugzilla.suse.com/1144333" }, { "category": "self", "summary": "SUSE Bug 1148868", "url": "https://bugzilla.suse.com/1148868" }, { "category": "self", "summary": "SUSE Bug 1150660", "url": "https://bugzilla.suse.com/1150660" }, { "category": "self", "summary": "SUSE Bug 1151927", "url": "https://bugzilla.suse.com/1151927" }, { "category": "self", "summary": "SUSE Bug 1152624", "url": "https://bugzilla.suse.com/1152624" }, { "category": "self", "summary": "SUSE Bug 1158983", "url": "https://bugzilla.suse.com/1158983" }, { "category": "self", "summary": "SUSE Bug 1159058", "url": "https://bugzilla.suse.com/1159058" }, { "category": "self", "summary": "SUSE Bug 1161016", "url": "https://bugzilla.suse.com/1161016" }, { "category": "self", "summary": "SUSE Bug 1162002", "url": "https://bugzilla.suse.com/1162002" }, { "category": "self", "summary": "SUSE Bug 1162063", "url": "https://bugzilla.suse.com/1162063" }, { "category": "self", "summary": "SUSE Bug 1163309", "url": "https://bugzilla.suse.com/1163309" }, { "category": "self", "summary": "SUSE Bug 1166985", "url": "https://bugzilla.suse.com/1166985" }, { "category": "self", "summary": "SUSE Bug 1167104", "url": "https://bugzilla.suse.com/1167104" }, { "category": "self", "summary": "SUSE Bug 1168081", "url": "https://bugzilla.suse.com/1168081" }, { "category": "self", "summary": "SUSE Bug 1168959", "url": "https://bugzilla.suse.com/1168959" }, { "category": "self", "summary": "SUSE Bug 1169194", "url": "https://bugzilla.suse.com/1169194" }, { "category": "self", "summary": "SUSE Bug 1169514", "url": "https://bugzilla.suse.com/1169514" }, { "category": "self", "summary": "SUSE Bug 1169771", "url": "https://bugzilla.suse.com/1169771" }, { "category": "self", "summary": "SUSE Bug 1169795", "url": "https://bugzilla.suse.com/1169795" }, { "category": "self", "summary": "SUSE Bug 1170011", "url": "https://bugzilla.suse.com/1170011" }, { "category": "self", "summary": "SUSE Bug 1170442", "url": "https://bugzilla.suse.com/1170442" }, { "category": "self", "summary": "SUSE Bug 1170592", "url": "https://bugzilla.suse.com/1170592" }, { "category": "self", "summary": "SUSE Bug 1170617", "url": "https://bugzilla.suse.com/1170617" }, { "category": "self", "summary": "SUSE Bug 1170618", "url": "https://bugzilla.suse.com/1170618" }, { "category": "self", "summary": "SUSE Bug 1171124", "url": "https://bugzilla.suse.com/1171124" }, { "category": "self", "summary": "SUSE Bug 1171424", "url": "https://bugzilla.suse.com/1171424" }, { "category": "self", "summary": "SUSE Bug 1171529", "url": "https://bugzilla.suse.com/1171529" }, { "category": "self", "summary": "SUSE Bug 1171530", "url": "https://bugzilla.suse.com/1171530" }, { "category": "self", "summary": "SUSE Bug 1171558", "url": "https://bugzilla.suse.com/1171558" }, { "category": "self", "summary": "SUSE Bug 1171732", "url": "https://bugzilla.suse.com/1171732" }, { "category": "self", "summary": "SUSE Bug 1171739", "url": "https://bugzilla.suse.com/1171739" }, { "category": "self", "summary": "SUSE Bug 1171743", "url": "https://bugzilla.suse.com/1171743" }, { "category": "self", "summary": "SUSE Bug 1171753", "url": "https://bugzilla.suse.com/1171753" }, { "category": "self", "summary": "SUSE Bug 1171759", "url": "https://bugzilla.suse.com/1171759" }, { "category": "self", "summary": "SUSE Bug 1171835", "url": "https://bugzilla.suse.com/1171835" }, { "category": "self", "summary": "SUSE Bug 1171841", "url": "https://bugzilla.suse.com/1171841" }, { "category": "self", "summary": "SUSE Bug 1171868", "url": "https://bugzilla.suse.com/1171868" }, { "category": "self", "summary": "SUSE Bug 1171904", "url": "https://bugzilla.suse.com/1171904" }, { "category": "self", "summary": "SUSE Bug 1172247", "url": "https://bugzilla.suse.com/1172247" }, { "category": "self", "summary": "SUSE Bug 1172257", "url": "https://bugzilla.suse.com/1172257" }, { "category": "self", "summary": "SUSE Bug 1172344", "url": "https://bugzilla.suse.com/1172344" }, { "category": "self", "summary": "SUSE Bug 1172458", "url": "https://bugzilla.suse.com/1172458" }, { "category": "self", "summary": "SUSE Bug 1172484", "url": "https://bugzilla.suse.com/1172484" }, { "category": "self", "summary": "SUSE Bug 1172537", "url": "https://bugzilla.suse.com/1172537" }, { "category": "self", "summary": "SUSE Bug 1172538", "url": "https://bugzilla.suse.com/1172538" }, { "category": "self", "summary": "SUSE Bug 1172687", "url": "https://bugzilla.suse.com/1172687" }, { "category": "self", "summary": "SUSE Bug 1172719", "url": "https://bugzilla.suse.com/1172719" }, { "category": "self", "summary": "SUSE Bug 1172759", "url": "https://bugzilla.suse.com/1172759" }, { "category": "self", "summary": "SUSE Bug 1172775", "url": "https://bugzilla.suse.com/1172775" }, { "category": "self", "summary": "SUSE Bug 1172781", "url": "https://bugzilla.suse.com/1172781" }, { "category": "self", "summary": "SUSE Bug 1172782", "url": "https://bugzilla.suse.com/1172782" }, { "category": "self", "summary": "SUSE Bug 1172783", "url": "https://bugzilla.suse.com/1172783" }, { "category": "self", "summary": "SUSE Bug 1172871", "url": "https://bugzilla.suse.com/1172871" }, { "category": "self", "summary": "SUSE Bug 1172872", "url": "https://bugzilla.suse.com/1172872" }, { "category": "self", "summary": "SUSE Bug 1172999", "url": "https://bugzilla.suse.com/1172999" }, { "category": "self", "summary": "SUSE Bug 1173060", "url": "https://bugzilla.suse.com/1173060" }, { "category": "self", "summary": "SUSE Bug 1173074", "url": "https://bugzilla.suse.com/1173074" }, { "category": "self", "summary": "SUSE Bug 1173146", "url": "https://bugzilla.suse.com/1173146" }, { "category": "self", "summary": "SUSE Bug 1173265", "url": "https://bugzilla.suse.com/1173265" }, { "category": "self", "summary": "SUSE Bug 1173280", "url": "https://bugzilla.suse.com/1173280" }, { "category": "self", "summary": "SUSE Bug 1173284", "url": "https://bugzilla.suse.com/1173284" }, { "category": "self", "summary": "SUSE Bug 1173428", "url": "https://bugzilla.suse.com/1173428" }, { "category": "self", "summary": "SUSE Bug 1173514", "url": "https://bugzilla.suse.com/1173514" }, { "category": "self", "summary": "SUSE Bug 1173567", "url": "https://bugzilla.suse.com/1173567" }, { "category": "self", "summary": "SUSE Bug 1173573", "url": "https://bugzilla.suse.com/1173573" }, { "category": "self", "summary": "SUSE Bug 1173746", "url": "https://bugzilla.suse.com/1173746" }, { "category": "self", "summary": "SUSE Bug 1173818", "url": "https://bugzilla.suse.com/1173818" }, { "category": "self", "summary": "SUSE Bug 1173820", "url": "https://bugzilla.suse.com/1173820" }, { "category": "self", "summary": "SUSE Bug 1173825", "url": "https://bugzilla.suse.com/1173825" }, { "category": "self", "summary": "SUSE Bug 1173826", "url": "https://bugzilla.suse.com/1173826" }, { "category": "self", "summary": "SUSE Bug 1173833", "url": "https://bugzilla.suse.com/1173833" }, { "category": "self", "summary": "SUSE Bug 1173838", "url": "https://bugzilla.suse.com/1173838" }, { "category": "self", "summary": "SUSE Bug 1173839", "url": "https://bugzilla.suse.com/1173839" }, { "category": "self", "summary": "SUSE Bug 1173845", "url": "https://bugzilla.suse.com/1173845" }, { "category": "self", "summary": "SUSE Bug 1173857", "url": "https://bugzilla.suse.com/1173857" }, { "category": "self", "summary": "SUSE Bug 1174113", "url": "https://bugzilla.suse.com/1174113" }, { "category": "self", "summary": "SUSE Bug 1174115", "url": "https://bugzilla.suse.com/1174115" }, { "category": "self", "summary": "SUSE Bug 1174122", "url": "https://bugzilla.suse.com/1174122" }, { "category": "self", "summary": "SUSE Bug 1174123", "url": "https://bugzilla.suse.com/1174123" }, { "category": "self", "summary": "SUSE Bug 1174186", "url": "https://bugzilla.suse.com/1174186" }, { "category": "self", "summary": "SUSE Bug 1174187", "url": "https://bugzilla.suse.com/1174187" }, { "category": "self", "summary": "SUSE Bug 1174296", "url": "https://bugzilla.suse.com/1174296" }, { "category": "self", "summary": "SUSE Bug 1174343", "url": "https://bugzilla.suse.com/1174343" }, { "category": "self", "summary": "SUSE Bug 1174356", "url": "https://bugzilla.suse.com/1174356" }, { "category": "self", "summary": "SUSE Bug 1174409", "url": "https://bugzilla.suse.com/1174409" }, { "category": "self", "summary": "SUSE Bug 1174438", "url": "https://bugzilla.suse.com/1174438" }, { "category": "self", "summary": "SUSE Bug 1174462", "url": "https://bugzilla.suse.com/1174462" }, { "category": "self", "summary": "SUSE Bug 1174543", "url": "https://bugzilla.suse.com/1174543" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20810 page", "url": "https://www.suse.com/security/cve/CVE-2019-20810/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-20908 page", "url": "https://www.suse.com/security/cve/CVE-2019-20908/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-0305 page", "url": "https://www.suse.com/security/cve/CVE-2020-0305/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10766 page", "url": "https://www.suse.com/security/cve/CVE-2020-10766/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10767 page", "url": "https://www.suse.com/security/cve/CVE-2020-10767/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10768 page", "url": "https://www.suse.com/security/cve/CVE-2020-10768/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10769 page", "url": "https://www.suse.com/security/cve/CVE-2020-10769/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10773 page", "url": "https://www.suse.com/security/cve/CVE-2020-10773/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-10781 page", "url": "https://www.suse.com/security/cve/CVE-2020-10781/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12771 page", "url": "https://www.suse.com/security/cve/CVE-2020-12771/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-12888 page", "url": "https://www.suse.com/security/cve/CVE-2020-12888/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-13974 page", "url": "https://www.suse.com/security/cve/CVE-2020-13974/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-14416 page", "url": "https://www.suse.com/security/cve/CVE-2020-14416/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15393 page", "url": "https://www.suse.com/security/cve/CVE-2020-15393/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-15780 page", "url": "https://www.suse.com/security/cve/CVE-2020-15780/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2020-08-03T09:31:26Z", "generator": { "date": "2020-08-03T09:31:26Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2020:2103-1", "initial_release_date": "2020-08-03T09:31:26Z", "revision_history": [ { "date": "2020-08-03T09:31:26Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-azure-4.12.14-8.38.1.noarch", "product": { "name": "kernel-devel-azure-4.12.14-8.38.1.noarch", "product_id": "kernel-devel-azure-4.12.14-8.38.1.noarch" } }, { "category": "product_version", "name": "kernel-source-azure-4.12.14-8.38.1.noarch", "product": { "name": "kernel-source-azure-4.12.14-8.38.1.noarch", "product_id": "kernel-source-azure-4.12.14-8.38.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-azure-4.12.14-8.38.1.x86_64", "product": { "name": "cluster-md-kmp-azure-4.12.14-8.38.1.x86_64", "product_id": "cluster-md-kmp-azure-4.12.14-8.38.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-azure-4.12.14-8.38.1.x86_64", "product": { "name": "dlm-kmp-azure-4.12.14-8.38.1.x86_64", "product_id": "dlm-kmp-azure-4.12.14-8.38.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-azure-4.12.14-8.38.1.x86_64", "product": { "name": "gfs2-kmp-azure-4.12.14-8.38.1.x86_64", "product_id": "gfs2-kmp-azure-4.12.14-8.38.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-4.12.14-8.38.1.x86_64", "product": { "name": "kernel-azure-4.12.14-8.38.1.x86_64", "product_id": "kernel-azure-4.12.14-8.38.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-base-4.12.14-8.38.1.x86_64", "product": { "name": "kernel-azure-base-4.12.14-8.38.1.x86_64", "product_id": "kernel-azure-base-4.12.14-8.38.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-devel-4.12.14-8.38.1.x86_64", "product": { "name": "kernel-azure-devel-4.12.14-8.38.1.x86_64", "product_id": "kernel-azure-devel-4.12.14-8.38.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-extra-4.12.14-8.38.1.x86_64", "product": { "name": "kernel-azure-extra-4.12.14-8.38.1.x86_64", "product_id": "kernel-azure-extra-4.12.14-8.38.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-livepatch-devel-4.12.14-8.38.1.x86_64", "product": { "name": "kernel-azure-livepatch-devel-4.12.14-8.38.1.x86_64", "product_id": "kernel-azure-livepatch-devel-4.12.14-8.38.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-azure-4.12.14-8.38.1.x86_64", "product": { "name": "kernel-syms-azure-4.12.14-8.38.1.x86_64", "product_id": "kernel-syms-azure-4.12.14-8.38.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-azure-4.12.14-8.38.1.x86_64", "product": { "name": "kselftests-kmp-azure-4.12.14-8.38.1.x86_64", "product_id": "kselftests-kmp-azure-4.12.14-8.38.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-azure-4.12.14-8.38.1.x86_64", "product": { "name": "ocfs2-kmp-azure-4.12.14-8.38.1.x86_64", "product_id": "ocfs2-kmp-azure-4.12.14-8.38.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-azure-4.12.14-8.38.1.x86_64", "product": { "name": "reiserfs-kmp-azure-4.12.14-8.38.1.x86_64", "product_id": "reiserfs-kmp-azure-4.12.14-8.38.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-4.12.14-8.38.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.38.1.x86_64" }, "product_reference": "kernel-azure-4.12.14-8.38.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-base-4.12.14-8.38.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.38.1.x86_64" }, "product_reference": "kernel-azure-base-4.12.14-8.38.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-4.12.14-8.38.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.38.1.x86_64" }, "product_reference": "kernel-azure-devel-4.12.14-8.38.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-4.12.14-8.38.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.38.1.noarch" }, "product_reference": "kernel-devel-azure-4.12.14-8.38.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-4.12.14-8.38.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.38.1.noarch" }, "product_reference": "kernel-source-azure-4.12.14-8.38.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-4.12.14-8.38.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.38.1.x86_64" }, "product_reference": "kernel-syms-azure-4.12.14-8.38.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-20810", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20810" } ], "notes": [ { "category": "general", "text": "go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel before 5.6 does not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.38.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20810", "url": "https://www.suse.com/security/cve/CVE-2019-20810" }, { "category": "external", "summary": "SUSE Bug 1172458 for CVE-2019-20810", "url": "https://bugzilla.suse.com/1172458" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.38.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.38.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T09:31:26Z", "details": "low" } ], "title": "CVE-2019-20810" }, { "cve": "CVE-2019-20908", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-20908" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/firmware/efi/efi.c in the Linux kernel before 5.4. Incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.38.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-20908", "url": "https://www.suse.com/security/cve/CVE-2019-20908" }, { "category": "external", "summary": "SUSE Bug 1173567 for CVE-2019-20908", "url": "https://bugzilla.suse.com/1173567" }, { "category": "external", "summary": "SUSE Bug 1174187 for CVE-2019-20908", "url": "https://bugzilla.suse.com/1174187" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.38.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.38.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T09:31:26Z", "details": "important" } ], "title": "CVE-2019-20908" }, { "cve": "CVE-2020-0305", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-0305" } ], "notes": [ { "category": "general", "text": "In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-153467744", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.38.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-0305", "url": "https://www.suse.com/security/cve/CVE-2020-0305" }, { "category": "external", "summary": "SUSE Bug 1174462 for CVE-2020-0305", "url": "https://bugzilla.suse.com/1174462" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.38.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.38.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T09:31:26Z", "details": "moderate" } ], "title": "CVE-2020-0305" }, { "cve": "CVE-2020-10766", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10766" } ], "notes": [ { "category": "general", "text": "A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.38.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10766", "url": "https://www.suse.com/security/cve/CVE-2020-10766" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172781 for CVE-2020-10766", "url": "https://bugzilla.suse.com/1172781" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.38.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.38.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T09:31:26Z", "details": "moderate" } ], "title": "CVE-2020-10766" }, { "cve": "CVE-2020-10767", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10767" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.38.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10767", "url": "https://www.suse.com/security/cve/CVE-2020-10767" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172782 for CVE-2020-10767", "url": "https://bugzilla.suse.com/1172782" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.38.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.38.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T09:31:26Z", "details": "moderate" } ], "title": "CVE-2020-10767" }, { "cve": "CVE-2020-10768", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10768" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.38.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10768", "url": "https://www.suse.com/security/cve/CVE-2020-10768" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1172783 for CVE-2020-10768", "url": "https://bugzilla.suse.com/1172783" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.38.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.38.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T09:31:26Z", "details": "moderate" } ], "title": "CVE-2020-10768" }, { "cve": "CVE-2020-10769", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10769" } ], "notes": [ { "category": "general", "text": "A buffer over-read flaw was found in RH kernel versions before 5.0 in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm\u0027s module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash. This flaw allows a local attacker with user privileges to cause a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.38.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10769", "url": "https://www.suse.com/security/cve/CVE-2020-10769" }, { "category": "external", "summary": "SUSE Bug 1173265 for CVE-2020-10769", "url": "https://bugzilla.suse.com/1173265" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.38.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.38.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T09:31:26Z", "details": "moderate" } ], "title": "CVE-2020-10769" }, { "cve": "CVE-2020-10773", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10773" } ], "notes": [ { "category": "general", "text": "A stack information leak flaw was found in s390/s390x in the Linux kernel\u0027s memory manager functionality, where it incorrectly writes to the /proc/sys/vm/cmm_timeout file. This flaw allows a local user to see the kernel data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.38.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10773", "url": "https://www.suse.com/security/cve/CVE-2020-10773" }, { "category": "external", "summary": "SUSE Bug 1172999 for CVE-2020-10773", "url": "https://bugzilla.suse.com/1172999" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.38.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.38.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T09:31:26Z", "details": "low" } ], "title": "CVE-2020-10773" }, { "cve": "CVE-2020-10781", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-10781" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux Kernel before 5.8-rc6 in the ZRAM kernel module, where a user with a local account and the ability to read the /sys/class/zram-control/hot_add file can create ZRAM device nodes in the /dev/ directory. This read allocates kernel memory and is not accounted for a user that triggers the creation of that ZRAM device. With this vulnerability, continually reading the device may consume a large amount of system memory and cause the Out-of-Memory (OOM) killer to activate and terminate random userspace processes, possibly making the system inoperable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.38.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-10781", "url": "https://www.suse.com/security/cve/CVE-2020-10781" }, { "category": "external", "summary": "SUSE Bug 1173074 for CVE-2020-10781", "url": "https://bugzilla.suse.com/1173074" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.38.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.38.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T09:31:26Z", "details": "moderate" } ], "title": "CVE-2020-10781" }, { "cve": "CVE-2020-12771", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12771" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 5.6.11. btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.38.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12771", "url": "https://www.suse.com/security/cve/CVE-2020-12771" }, { "category": "external", "summary": "SUSE Bug 1171732 for CVE-2020-12771", "url": "https://bugzilla.suse.com/1171732" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.38.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.38.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T09:31:26Z", "details": "moderate" } ], "title": "CVE-2020-12771" }, { "cve": "CVE-2020-12888", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-12888" } ], "notes": [ { "category": "general", "text": "The VFIO PCI driver in the Linux kernel through 5.6.13 mishandles attempts to access disabled memory space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.38.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-12888", "url": "https://www.suse.com/security/cve/CVE-2020-12888" }, { "category": "external", "summary": "SUSE Bug 1159281 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1159281" }, { "category": "external", "summary": "SUSE Bug 1171868 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1171868" }, { "category": "external", "summary": "SUSE Bug 1176979 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1176979" }, { "category": "external", "summary": "SUSE Bug 1179612 for CVE-2020-12888", "url": "https://bugzilla.suse.com/1179612" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.38.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.38.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T09:31:26Z", "details": "moderate" } ], "title": "CVE-2020-12888" }, { "cve": "CVE-2020-13974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-13974" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel 4.4 through 5.7.1. drivers/tty/vt/keyboard.c has an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. NOTE: Members in the community argue that the integer overflow does not lead to a security issue in this case.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.38.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-13974", "url": "https://www.suse.com/security/cve/CVE-2020-13974" }, { "category": "external", "summary": "SUSE Bug 1172775 for CVE-2020-13974", "url": "https://bugzilla.suse.com/1172775" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.38.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.38.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T09:31:26Z", "details": "moderate" } ], "title": "CVE-2020-13974" }, { "cve": "CVE-2020-14416", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-14416" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 5.4.16, a race condition in tty-\u003edisc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.38.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-14416", "url": "https://www.suse.com/security/cve/CVE-2020-14416" }, { "category": "external", "summary": "SUSE Bug 1162002 for CVE-2020-14416", "url": "https://bugzilla.suse.com/1162002" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.38.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.38.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T09:31:26Z", "details": "moderate" } ], "title": "CVE-2020-14416" }, { "cve": "CVE-2020-15393", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15393" } ], "notes": [ { "category": "general", "text": "In the Linux kernel 4.4 through 5.7.6, usbtest_disconnect in drivers/usb/misc/usbtest.c has a memory leak, aka CID-28ebeb8db770.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.38.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15393", "url": "https://www.suse.com/security/cve/CVE-2020-15393" }, { "category": "external", "summary": "SUSE Bug 1173514 for CVE-2020-15393", "url": "https://bugzilla.suse.com/1173514" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.38.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.38.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T09:31:26Z", "details": "moderate" } ], "title": "CVE-2020-15393" }, { "cve": "CVE-2020-15780", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-15780" } ], "notes": [ { "category": "general", "text": "An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.38.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-15780", "url": "https://www.suse.com/security/cve/CVE-2020-15780" }, { "category": "external", "summary": "SUSE Bug 1173573 for CVE-2020-15780", "url": "https://bugzilla.suse.com/1173573" }, { "category": "external", "summary": "SUSE Bug 1174186 for CVE-2020-15780", "url": "https://bugzilla.suse.com/1174186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.38.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.38.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.38.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.38.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-08-03T09:31:26Z", "details": "important" } ], "title": "CVE-2020-15780" } ] }
ssa-770721
Vulnerability from csaf_siemens
Published
2024-03-12 00:00
Modified
2024-03-12 00:00
Summary
SSA-770721: Multiple Vulnerabilities in SIMATIC RF160B before V2.2
Notes
Summary
SIMATIC RF160B contain multiple vulnerabilities of different types that could allow an attacker to execute arbitrary code within the context of a privileged process.
Siemens has released a new version for SIMATIC RF160B and recommends to update to the latest version.
General Recommendations
As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download:
https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.
Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity
Additional Resources
For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories
Terms of Use
Siemens Security Advisories are subject to the terms and conditions contained in Siemens' underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter "License Terms"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens' Global Website (https://www.siemens.com/terms_of_use, hereinafter "Terms of Use"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)", "tlp": { "label": "WHITE" } }, "lang": "en", "notes": [ { "category": "summary", "text": "SIMATIC RF160B contain multiple vulnerabilities of different types that could allow an attacker to execute arbitrary code within the context of a privileged process.\n\nSiemens has released a new version for SIMATIC RF160B and recommends to update to the latest version.", "title": "Summary" }, { "category": "general", "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "title": "General Recommendations" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "productcert@siemens.com", "name": "Siemens ProductCERT", "namespace": "https://www.siemens.com" }, "references": [ { "category": "self", "summary": "SSA-770721: Multiple Vulnerabilities in SIMATIC RF160B before V2.2 - HTML Version", "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" }, { "category": "self", "summary": "SSA-770721: Multiple Vulnerabilities in SIMATIC RF160B before V2.2 - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-770721.json" }, { "category": "self", "summary": "SSA-770721: Multiple Vulnerabilities in SIMATIC RF160B before V2.2 - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-770721.pdf" }, { "category": "self", "summary": "SSA-770721: Multiple Vulnerabilities in SIMATIC RF160B before V2.2 - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-770721.txt" } ], "title": "SSA-770721: Multiple Vulnerabilities in SIMATIC RF160B before V2.2", "tracking": { "current_release_date": "2024-03-12T00:00:00Z", "generator": { "engine": { "name": "Siemens ProductCERT CSAF Generator", "version": "1" } }, "id": "SSA-770721", "initial_release_date": "2024-03-12T00:00:00Z", "revision_history": [ { "date": "2024-03-12T00:00:00Z", "legacy_version": "1.0", "number": "1", "summary": "Publication Date" } ], "status": "interim", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003cV2.2", "product": { "name": "SIMATIC RF160B (6GT2003-0FA00)", "product_id": "1", "product_identification_helper": { "model_numbers": [ "6GT2003-0FA00" ] } } } ], "category": "product_name", "name": "SIMATIC RF160B (6GT2003-0FA00)" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-14491", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "An attacker could cause a crash or potentially execute arbitrary code by sending specially crafted DNS responses to the DNSmasq process. In order to exploit this vulnerability, an attacker must be able to trigger DNS requests from the device, and must be in a privileged position to inject malicious DNS responses.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2017-14491" }, { "cve": "CVE-2017-18509", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "An issue was discovered in net/ipv6/ip6mr.c in the Linux kernel before 4.11. By setting a specific socket option, an attacker can control a pointer in kernel land and cause an inet_csk_listen_stop general protection fault, or potentially execute arbitrary code under certain circumstances. The issue can be triggered as root (e.g., inside a default LXC container or with the CAP_NET_ADMIN capability) or after namespace unsharing. This occurs because sk_type and protocol are not checked in the appropriate part of the ip6_mroute_* functions. NOTE: this affects Linux distributions that use 4.9.x longterm kernels before 4.9.187.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2017-18509" }, { "cve": "CVE-2020-0338", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In checkKeyIntent of AccountManagerService.java, there is a possible permission bypass. This could lead to local information disclosure with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-9Android ID: A-123700107", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2020-0338" }, { "cve": "CVE-2020-0417", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "notes": [ { "category": "summary", "text": "In setNiNotification of GpsNetInitiatedHandler.java, there is a possible permissions bypass due to an empty mutable PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-8.1 Android-9Android ID: A-154319182", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2020-0417" }, { "cve": "CVE-2020-10768", "cwe": { "id": "CWE-440", "name": "Expected Behavior Violation" }, "notes": [ { "category": "summary", "text": "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2020-10768" }, { "cve": "CVE-2020-11301", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "Improper authentication of un-encrypted plaintext Wi-Fi frames in an encrypted network can lead to information disclosure in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice \u0026 Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2020-11301" }, { "cve": "CVE-2020-14305", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An out-of-bounds memory write flaw was found in how the Linux kernel\u2019s Voice Over IP H.323 connection tracking functionality handled connections on ipv6 port 1720. This flaw allows an unauthenticated remote user to crash the system, causing a denial of service. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2020-14305" }, { "cve": "CVE-2020-14381", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A flaw was found in the Linux kernel\u2019s futex implementation. This flaw allows a local attacker to corrupt system memory or escalate their privileges when creating a futex on a filesystem that is about to be unmounted. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2020-14381" }, { "cve": "CVE-2020-15436", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "Use-after-free vulnerability in fs/block_dev.c in the Linux kernel before 5.8 allows local users to gain privileges or cause a denial of service by leveraging improper access to a certain error field.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2020-15436" }, { "cve": "CVE-2020-24587", "cwe": { "id": "CWE-326", "name": "Inadequate Encryption Strength" }, "notes": [ { "category": "summary", "text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:U/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2020-24587" }, { "cve": "CVE-2020-25705", "cwe": { "id": "CWE-330", "name": "Use of Insufficiently Random Values" }, "notes": [ { "category": "summary", "text": "A flaw in ICMP packets in the Linux kernel was found to allow to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypass source port UDP randomization. Software that relies on UDP source port randomization are indirectly affected as well. Kernel versions before 5.10 may be vulnerable to this issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2020-25705" }, { "cve": "CVE-2020-26555", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "notes": [ { "category": "summary", "text": "Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B through 5.2 may permit an unauthenticated nearby device to spoof the BD_ADDR of the peer device to complete pairing without knowledge of the PIN.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2020-26555" }, { "cve": "CVE-2020-26558", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2020-26558" }, { "cve": "CVE-2020-29660", "cwe": { "id": "CWE-667", "name": "Improper Locking" }, "notes": [ { "category": "summary", "text": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2020-29660" }, { "cve": "CVE-2020-29661", "cwe": { "id": "CWE-667", "name": "Improper Locking" }, "notes": [ { "category": "summary", "text": "A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2020-29661" }, { "cve": "CVE-2021-0302", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "notes": [ { "category": "summary", "text": "In PackageInstaller, there is a possible tapjacking attack due to an insecure default value. This could lead to local escalation of privilege and permissions with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10Android ID: A-155287782", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0302" }, { "cve": "CVE-2021-0305", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "notes": [ { "category": "summary", "text": "In PackageInstaller, there is a possible tapjacking attack due to an insecure default value. This could lead to local escalation of privilege and permissions with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10Android ID: A-154015447", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0305" }, { "cve": "CVE-2021-0325", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In ih264d_parse_pslice of ih264d_parse_pslice.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-174238784", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0325" }, { "cve": "CVE-2021-0326", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In p2p_copy_client_info of p2p.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution if the target device is performing a Wi-Fi Direct search, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-172937525", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0326" }, { "cve": "CVE-2021-0327", "cwe": { "id": "CWE-269", "name": "Improper Privilege Management" }, "notes": [ { "category": "summary", "text": "In getContentProviderImpl of ActivityManagerService.java, there is a possible permission bypass due to non-restored binder identities. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-172935267", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0327" }, { "cve": "CVE-2021-0328", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "In onBatchScanReports and deliverBatchScan of GattService.java, there is a possible way to retrieve Bluetooth scan results without permissions due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-172670415", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0328" }, { "cve": "CVE-2021-0329", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In several native functions called by AdvertiseManager.java, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege in the Bluetooth server with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-171400004", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0329" }, { "cve": "CVE-2021-0330", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In add_user_ce and remove_user_ce of storaged.cpp, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in storaged with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11Android ID: A-170732441", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0330" }, { "cve": "CVE-2021-0331", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "notes": [ { "category": "summary", "text": "In onCreate of NotificationAccessConfirmationActivity.java, there is a possible overlay attack due to an insecure default value. This could lead to local escalation of privilege and notification access with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-170731783", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0331" }, { "cve": "CVE-2021-0333", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "notes": [ { "category": "summary", "text": "In onCreate of BluetoothPermissionActivity.java, there is a possible permissions bypass due to a tapjacking overlay that obscures the phonebook permissions dialog when a Bluetooth device is connecting. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-168504491", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0333" }, { "cve": "CVE-2021-0334", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "notes": [ { "category": "summary", "text": "In onTargetSelected of ResolverActivity.java, there is a possible settings bypass allowing an app to become the default handler for arbitrary domains. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-163358811", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0334" }, { "cve": "CVE-2021-0336", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "notes": [ { "category": "summary", "text": "In onReceive of BluetoothPermissionRequest.java, there is a possible permissions bypass due to a mutable PendingIntent. This could lead to local escalation of privilege that bypasses a permission check, with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-158219161", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0336" }, { "cve": "CVE-2021-0337", "cwe": { "id": "CWE-312", "name": "Cleartext Storage of Sensitive Information" }, "notes": [ { "category": "summary", "text": "In moveInMediaStore of FileSystemProvider.java, there is a possible file exposure due to stale metadata. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-157474195", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0337" }, { "cve": "CVE-2021-0339", "cwe": { "id": "CWE-754", "name": "Improper Check for Unusual or Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "In loadAnimation of WindowContainer.java, there is a possible way to keep displaying a malicious app while a target app is brought to the foreground. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-8.1 Android-9Android ID: A-145728687", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0339" }, { "cve": "CVE-2021-0341", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "In verifyHostName of OkHostnameVerifier.java, there is a possible way to accept a certificate for the wrong domain due to improperly used crypto. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-171980069", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0341" }, { "cve": "CVE-2021-0390", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "In various methods of WifiNetworkSuggestionsManager.java, there is a possible modification of suggested networks due to a missing permission check. This could lead to local escalation of privilege by a background user on the same device with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-174749461", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0390" }, { "cve": "CVE-2021-0391", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "notes": [ { "category": "summary", "text": "In onCreate() of ChooseTypeAndAccountActivity.java, there is a possible way to learn the existence of an account, without permissions, due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-172841550", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0391" }, { "cve": "CVE-2021-0392", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "In main of main.cpp, there is a possible memory corruption due to a double free. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-9Android ID: A-175124730", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0392" }, { "cve": "CVE-2021-0393", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "In Scanner::LiteralBuffer::NewCapacity of scanner.cc, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution if an attacker can supply a malicious PAC file, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-168041375", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0393" }, { "cve": "CVE-2021-0394", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In android_os_Parcel_readString8 of android_os_Parcel.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-172655291", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0394" }, { "cve": "CVE-2021-0396", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In Builtins::Generate_ArgumentsAdaptorTrampoline of builtins-arm.cc and related files, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote code execution in an unprivileged process with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-160610106", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0396" }, { "cve": "CVE-2021-0397", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "In sdp_copy_raw_data of sdp_discovery.cc, there is a possible system compromise due to a double free. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-174052148", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0397" }, { "cve": "CVE-2021-0399", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In qtaguid_untag of xt_qtaguid.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-176919394References: Upstream kernel", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0399" }, { "cve": "CVE-2021-0400", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "In injectBestLocation and handleUpdateLocation of GnssLocationProvider.java, there is a possible incorrect reporting of location data to emergency services due to improper input validation. This could lead to incorrect reporting of location data to emergency services with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11Android ID: A-177561690", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0400" }, { "cve": "CVE-2021-0429", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In pollOnce of ALooper.cpp, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-175074139", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0429" }, { "cve": "CVE-2021-0431", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In avrc_msg_cback of avrc_api.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure to a paired device with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-174149901", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0431" }, { "cve": "CVE-2021-0433", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "notes": [ { "category": "summary", "text": "In onCreate of DeviceChooserActivity.java, there is a possible way to bypass user consent when pairing a Bluetooth device due to a tapjacking/overlay attack. This could lead to local escalation of privilege and pairing malicious devices with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-171221090", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0433" }, { "cve": "CVE-2021-0434", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In onReceive of BluetoothPermissionRequest.java, there is a possible phishing attack allowing a malicious Bluetooth device to acquire permissions based on insufficient information presented to the user in the consent dialog. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-9Android ID: A-167403112", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0434" }, { "cve": "CVE-2021-0435", "cwe": { "id": "CWE-665", "name": "Improper Initialization" }, "notes": [ { "category": "summary", "text": "In avrc_proc_vendor_command of avrc_api.cc, there is a possible leak of heap data due to uninitialized data. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-174150451", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0435" }, { "cve": "CVE-2021-0436", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "In CryptoPlugin::decrypt of CryptoPlugin.cpp, there is a possible out of bounds read due to integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-176496160", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0436" }, { "cve": "CVE-2021-0437", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "In setPlayPolicy of DrmPlugin.cpp, there is a possible double free. This could lead to local escalation of privilege in a privileged process with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-176168330", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0437" }, { "cve": "CVE-2021-0438", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "notes": [ { "category": "summary", "text": "In several functions of InputDispatcher.cpp, WindowManagerService.java, and related files, there is a possible tapjacking attack due to an incorrect FLAG_OBSCURED value. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10Android ID: A-152064592", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0438" }, { "cve": "CVE-2021-0443", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "In several functions of ScreenshotHelper.java and related files, there is a possible incorrectly saved screenshot due to a race condition. This could lead to local information disclosure across user profiles with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-170474245", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0443" }, { "cve": "CVE-2021-0444", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In onActivityResult of QuickContactActivity.java, there is an unnecessary return of an intent. This could lead to local information disclosure of contact data with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-178825358", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0444" }, { "cve": "CVE-2021-0471", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "In decrypt_1_2 of CryptoPlugin.cpp, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-176444786", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0471" }, { "cve": "CVE-2021-0473", "cwe": { "id": "CWE-908", "name": "Use of Uninitialized Resource" }, "notes": [ { "category": "summary", "text": "In rw_t3t_process_error of rw_t3t.cc, there is a possible double free due to uninitialized data. This could lead to remote code execution over NFC with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-179687208", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0473" }, { "cve": "CVE-2021-0474", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In avrc_msg_cback of avrc_api.cc, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-177611958", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0474" }, { "cve": "CVE-2021-0476", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "In FindOrCreatePeer of btif_av.cc, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-9 Android-10Android ID: A-169252501", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0476" }, { "cve": "CVE-2021-0478", "cwe": { "id": "CWE-755", "name": "Improper Handling of Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "In updateDrawable of StatusBarIconView.java, there is a possible permission bypass due to an uncaught exception. This could lead to local escalation of privilege by running foreground services without notifying the user, with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-169255797", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0478" }, { "cve": "CVE-2021-0480", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In createPendingIntent of SnoozeHelper.java, there is a possible broadcast intent containing a sensitive identifier. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-174493336", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0480" }, { "cve": "CVE-2021-0481", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "In onActivityResult of EditUserPhotoController.java, there is a possible access of unauthorized files due to an unexpected URI handler. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-172939189", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0481" }, { "cve": "CVE-2021-0484", "cwe": { "id": "CWE-909", "name": "Missing Initialization of Resource" }, "notes": [ { "category": "summary", "text": "In readVector of IMediaPlayer.cpp, there is a possible read of uninitialized heap data due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-173720767", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0484" }, { "cve": "CVE-2021-0506", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "notes": [ { "category": "summary", "text": "In ActivityPicker.java, there is a possible bypass of user interaction in intent resolution due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-181962311", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0506" }, { "cve": "CVE-2021-0507", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In handle_rc_metamsg_cmd of btif_rc.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-181860042", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0507" }, { "cve": "CVE-2021-0508", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In various functions of DrmPlugin.cpp, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-176444154", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0508" }, { "cve": "CVE-2021-0509", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In various functions of CryptoPlugin.cpp, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-176444161", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0509" }, { "cve": "CVE-2021-0510", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "In decrypt_1_2 of CryptoPlugin.cpp, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-176444622", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0510" }, { "cve": "CVE-2021-0511", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "In Dex2oat of dex2oat.cc, there is a possible way to inject bytecode into an app due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11Android ID: A-178055795", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0511" }, { "cve": "CVE-2021-0512", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-173843328References: Upstream kernel", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0512" }, { "cve": "CVE-2021-0513", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "In deleteNotificationChannel and related functions of NotificationManagerService.java, there is a possible permission bypass due to improper state validation. This could lead to local escalation of privilege via hidden services with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-156090809", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0513" }, { "cve": "CVE-2021-0514", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "In several functions of the V8 library, there is a possible use after free due to a race condition. This could lead to remote code execution in an unprivileged process with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-9 Android-11 Android-8.1Android ID: A-162604069", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0514" }, { "cve": "CVE-2021-0515", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In Factory::CreateStrictFunctionMap of factory.cc, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote code execution in an unprivileged process with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-167389063", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0515" }, { "cve": "CVE-2021-0516", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In p2p_process_prov_disc_req of p2p_pd.c, there is a possible out of bounds read and write due to a use after free. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-181660448", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0516" }, { "cve": "CVE-2021-0519", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In BITSTREAM_FLUSH of ih264e_bitstream.h, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-176533109", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0519" }, { "cve": "CVE-2021-0520", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In several functions of MemoryFileSystem.cpp and related files, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-10Android ID: A-176237595", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0520" }, { "cve": "CVE-2021-0521", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "In getAllPackages of PackageManagerService, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure of cross-user permissions with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-174661955", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0521" }, { "cve": "CVE-2021-0522", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In ConnectionHandler::SdpCb of connection_handler.cc, there is a possible out of bounds read due to a use after free. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-9 Android-10Android ID: A-174182139", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0522" }, { "cve": "CVE-2021-0584", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In verifyBufferObject of Parcel.cpp, there is a possible out of bounds read due to an improper input validation. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-179289794", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0584" }, { "cve": "CVE-2021-0585", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In beginWrite and beginRead of MessageQueueBase.h, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-184963385", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0585" }, { "cve": "CVE-2021-0586", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "notes": [ { "category": "summary", "text": "In onCreate of DevicePickerFragment.java, there is a possible way to trick the user to select an unwanted bluetooth device due to a tapjacking/overlay attack. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-182584940", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0586" }, { "cve": "CVE-2021-0587", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In StreamOut::prepareForWriting of StreamOut.cpp, there is a possible out of bounds write due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-185259758", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0587" }, { "cve": "CVE-2021-0588", "cwe": { "id": "CWE-668", "name": "Exposure of Resource to Wrong Sphere" }, "notes": [ { "category": "summary", "text": "In processInboundMessage of MceStateMachine.java, there is a possible SMS disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9Android ID: A-177238342", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0588" }, { "cve": "CVE-2021-0589", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In BTM_TryAllocateSCN of btm_scn.cc, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-180939982", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0589" }, { "cve": "CVE-2021-0591", "cwe": { "id": "CWE-610", "name": "Externally Controlled Reference to a Resource in Another Sphere" }, "notes": [ { "category": "summary", "text": "In sendReplyIntentToReceiver of BluetoothPermissionActivity.java, there is a possible way to invoke privileged broadcast receivers due to a confused deputy. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-179386960", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0591" }, { "cve": "CVE-2021-0593", "cwe": { "id": "CWE-610", "name": "Externally Controlled Reference to a Resource in Another Sphere" }, "notes": [ { "category": "summary", "text": "In sendDevicePickedIntent of DevicePickerFragment.java, there is a possible way to invoke a privileged broadcast receiver due to a confused deputy. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-179386068", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0593" }, { "cve": "CVE-2021-0594", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "summary", "text": "In onCreate of ConfirmConnectActivity, there is a possible remote bypass of user consent due to improper input validation. This could lead to remote (proximal, NFC) escalation of privilege allowing an attacker to deceive a user into allowing a Bluetooth connection with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-176445224", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0594" }, { "cve": "CVE-2021-0596", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In phNciNfc_RecvMfResp of phNxpExtns_MifareStd.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure over NFC with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-181346550", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0596" }, { "cve": "CVE-2021-0597", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "In notifyProfileAdded and notifyProfileRemoved of SipService.java, there is a possible way to retrieve SIP account names due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-176496502", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0597" }, { "cve": "CVE-2021-0598", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "notes": [ { "category": "summary", "text": "In onCreate of ConfirmConnectActivity.java, there is a possible pairing of untrusted Bluetooth devices due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-180422108", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0598" }, { "cve": "CVE-2021-0599", "cwe": { "id": "CWE-610", "name": "Externally Controlled Reference to a Resource in Another Sphere" }, "notes": [ { "category": "summary", "text": "In scheduleTimeoutLocked of NotificationRecord.java, there is a possible disclosure of a sensitive identifier via broadcasted intent due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-175614289", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0599" }, { "cve": "CVE-2021-0600", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "In onCreate of DeviceAdminAdd.java, there is a possible way to mislead a user to activate a device admin app due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-179042963", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0600" }, { "cve": "CVE-2021-0601", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "In encodeFrames of avc_enc_fuzzer.cpp, there is a possible out of bounds write due to a double free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-180643802", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0601" }, { "cve": "CVE-2021-0604", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In generateFileInfo of BluetoothOppSendFileInfo.java, there is a possible way to share private files over Bluetooth due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-179910660", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0604" }, { "cve": "CVE-2021-0640", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In noteAtomLogged of StatsdStats.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-9Android ID: A-187957589", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0640" }, { "cve": "CVE-2021-0641", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "In getAvailableSubscriptionInfoList of SubscriptionController.java, there is a possible disclosure of unique identifiers due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-185235454", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0641" }, { "cve": "CVE-2021-0642", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "In onResume of VoicemailSettingsFragment.java, there is a possible way to retrieve a trackable identifier without permissions due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-185126149", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0642" }, { "cve": "CVE-2021-0646", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In sqlite3_str_vappendf of sqlite3.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege if the user can also inject a printf into a privileged process\u0027s SQL with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-153352319", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0646" }, { "cve": "CVE-2021-0650", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In WT_InterpolateNoLoop of eas_wtengine.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-9Android ID: A-190286685", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0650" }, { "cve": "CVE-2021-0651", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "In loadLabel of PackageItemInfo.java, there is a possible way to DoS a device by having a long label in an app due to incorrect input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11 Android-9 Android-10Android ID: A-67013844", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0651" }, { "cve": "CVE-2021-0652", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "In VectorDrawable::VectorDrawable of VectorDrawable.java, there is a possible way to introduce a memory corruption due to sharing of not thread-safe objects. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-185178568", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0652" }, { "cve": "CVE-2021-0653", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "In enqueueNotification of NetworkPolicyManagerService.java, there is a possible way to retrieve a trackable identifier due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-9Android ID: A-177931370", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0653" }, { "cve": "CVE-2021-0682", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "In sendAccessibilityEvent of NotificationManagerService.java, there is a possible disclosure of notification data due to a missing permission check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-159624555", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0682" }, { "cve": "CVE-2021-0683", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In runTraceIpcStop of ActivityManagerShellCommand.java, there is a possible deletion of system files due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-185398942", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0683" }, { "cve": "CVE-2021-0684", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In TouchInputMapper::sync of TouchInputMapper.cpp, there is a possible out of bounds write due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-179839665", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0684" }, { "cve": "CVE-2021-0687", "cwe": { "id": "CWE-834", "name": "Excessive Iteration" }, "notes": [ { "category": "summary", "text": "In ellipsize of Layout.java, there is a possible ANR due to improper input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-188913943", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0687" }, { "cve": "CVE-2021-0688", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "In lockNow of PhoneWindowManager.java, there is a possible lock screen bypass due to a race condition. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-161149543", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0688" }, { "cve": "CVE-2021-0689", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In RGB_to_BGR1_portable of SkSwizzler_opts.h, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-190188264", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0689" }, { "cve": "CVE-2021-0690", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In ih264d_mark_err_slice_skip of ih264d_parse_pslice.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-182152757", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0690" }, { "cve": "CVE-2021-0692", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "notes": [ { "category": "summary", "text": "In sendBroadcastToInstaller of FirstScreenBroadcast.java, there is a possible activity launch due to an unsafe PendingIntent. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-9 Android-10Android ID: A-179289753", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0692" }, { "cve": "CVE-2021-0695", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In get_sock_stat of xt_qtaguid.c, there is a possible out of bounds read due to a use after free. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-184018316References: Upstream kernel", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0695" }, { "cve": "CVE-2021-0704", "cwe": { "id": "CWE-281", "name": "Improper Preservation of Permissions" }, "notes": [ { "category": "summary", "text": "In createNoCredentialsPermissionNotification and related functions of AccountManagerService.java, there is a possible way to retrieve accounts from the device without permissions due to a permissions bypass. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-9Android ID: A-179338675", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0704" }, { "cve": "CVE-2021-0706", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "In startListening of PluginManagerImpl.java, there is a possible way to disable arbitrary app components due to a missing permission check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11Android ID: A-193444889", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0706" }, { "cve": "CVE-2021-0708", "cwe": { "id": "CWE-610", "name": "Externally Controlled Reference to a Resource in Another Sphere" }, "notes": [ { "category": "summary", "text": "In runDumpHeap of ActivityManagerShellCommand.java, there is a possible deletion of system files due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-183262161", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0708" }, { "cve": "CVE-2021-0870", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "In RW_SetActivatedTagType of rw_main.cc, there is possible memory corruption due to a race condition. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-192472262", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0870" }, { "cve": "CVE-2021-0919", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "In getService of IServiceManager.cpp, there is a possible unhandled exception due to an integer overflow. This could lead to local denial of service making the lockscreen unusable with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-9Android ID: A-197336441", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0919" }, { "cve": "CVE-2021-0920", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In unix_scm_to_skb of af_unix.c, there is a possible use after free bug due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-196926917References: Upstream kernel", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0920" }, { "cve": "CVE-2021-0926", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "In onCreate of NfcImportVCardActivity.java, there is a possible way to add a contact without user\u0027s consent due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-191053931", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0926" }, { "cve": "CVE-2021-0928", "cwe": { "id": "CWE-755", "name": "Improper Handling of Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "In createFromParcel of OutputConfiguration.java, there is a possible parcel serialization/deserialization mismatch due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-9Android ID: A-188675581", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0928" }, { "cve": "CVE-2021-0929", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In ion_dma_buf_end_cpu_access and related functions of ion.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-187527909References: Upstream kernel", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0929" }, { "cve": "CVE-2021-0930", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In phNxpNciHal_process_ext_rsp of phNxpNciHal_ext.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution over NFC with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-181660091", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0930" }, { "cve": "CVE-2021-0931", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In getAlias of BluetoothDevice.java, there is a possible way to create misleading permission dialogs due to missing data filtering. This could lead to local information disclosure with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-180747689", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0931" }, { "cve": "CVE-2021-0933", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "notes": [ { "category": "summary", "text": "In onCreate of CompanionDeviceActivity.java or DeviceChooserActivity.java, there is a possible way for HTML tags to interfere with a consent dialog due to improper input validation. This could lead to remote escalation of privilege, confusing the user into accepting pairing of a malicious Bluetooth device, with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-172251622", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0933" }, { "cve": "CVE-2021-0952", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In doCropPhoto of PhotoSelectionHandler.java, there is a possible permission bypass due to a confused deputy. This could lead to local information disclosure of user\u0027s contacts with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-195748381", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0952" }, { "cve": "CVE-2021-0953", "cwe": { "id": "CWE-281", "name": "Improper Preservation of Permissions" }, "notes": [ { "category": "summary", "text": "In setOnClickActivityIntent of SearchWidgetProvider.java, there is a possible way to access contacts and history bookmarks without permission due to an unsafe PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-184046278", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0953" }, { "cve": "CVE-2021-0961", "cwe": { "id": "CWE-909", "name": "Missing Initialization of Resource" }, "notes": [ { "category": "summary", "text": "In quota_proc_write of xt_quota2.c, there is a possible way to read kernel memory due to uninitialized data. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-196046570References: Upstream kernel", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0961" }, { "cve": "CVE-2021-0963", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "notes": [ { "category": "summary", "text": "In onCreate of KeyChainActivity.java, there is a possible way to use an app certificate stored in keychain due to a tapjacking/overlay attack. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-199754277", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0963" }, { "cve": "CVE-2021-0964", "cwe": { "id": "CWE-681", "name": "Incorrect Conversion between Numeric Types" }, "notes": [ { "category": "summary", "text": "In C2SoftMP3::process() of C2SoftMp3Dec.cpp, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-193363621", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0964" }, { "cve": "CVE-2021-0965", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "In AndroidManifest.xml of Settings, there is a possible pairing of a Bluetooth device without user\u0027s consent due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-194300867", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0965" }, { "cve": "CVE-2021-0967", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In vorbis_book_decodev_set of codebook.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-199065614", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0967" }, { "cve": "CVE-2021-0968", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "In osi_malloc and osi_calloc of allocator.cc, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-197868577", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0968" }, { "cve": "CVE-2021-0970", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "notes": [ { "category": "summary", "text": "In createFromParcel of GpsNavigationMessage.java, there is a possible Parcel serialization/deserialization mismatch. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-196970023", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0970" }, { "cve": "CVE-2021-1972", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "Possible buffer overflow due to improper validation of device types during P2P search in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice \u0026 Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-1972" }, { "cve": "CVE-2021-1976", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use after free can occur due to improper validation of P2P device address in PD Request frame in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice \u0026 Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-1976" }, { "cve": "CVE-2021-29647", "cwe": { "id": "CWE-909", "name": "Missing Initialization of Resource" }, "notes": [ { "category": "summary", "text": "An issue was discovered in the Linux kernel before 5.11.11. qrtr_recvmsg in net/qrtr/qrtr.c allows attackers to obtain sensitive information from kernel memory because of a partially uninitialized data structure, aka CID-50535249f624.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-29647" }, { "cve": "CVE-2021-33909", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-33909" }, { "cve": "CVE-2021-38204", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "drivers/usb/host/max3421-hcd.c in the Linux kernel before 5.13.6 allows physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a MAX-3421 USB device in certain situations.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-38204" }, { "cve": "CVE-2021-39621", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "notes": [ { "category": "summary", "text": "In sendLegacyVoicemailNotification of LegacyModeSmsHandler.java, there is a possible permissions bypass due to an unsafe PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-185126319", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-39621" }, { "cve": "CVE-2021-39623", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In doRead of SimpleDecodingSource.cpp, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-194105348", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-39623" }, { "cve": "CVE-2021-39626", "cwe": { "id": "CWE-610", "name": "Externally Controlled Reference to a Resource in Another Sphere" }, "notes": [ { "category": "summary", "text": "In onAttach of ConnectedDeviceDashboardFragment.java, there is a possible permission bypass due to a confused deputy. This could lead to local escalation of privilege in Bluetooth settings with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-194695497", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-39626" }, { "cve": "CVE-2021-39627", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "notes": [ { "category": "summary", "text": "In sendLegacyVoicemailNotification of LegacyModeSmsHandler.java, there is a possible permissions bypass due to an unsafe PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-185126549", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-39627" }, { "cve": "CVE-2021-39629", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In phTmlNfc_Init and phTmlNfc_CleanUp of phTmlNfc.cc, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-197353344", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-39629" }, { "cve": "CVE-2021-39633", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "In gre_handle_offloads of ip_gre.c, there is a possible page fault due to an invalid memory access. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-150694665References: Upstream kernel", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-39633" }, { "cve": "CVE-2021-39634", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In fs/eventpoll.c, there is a possible use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-204450605References: Upstream kernel", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-39634" }, { "cve": "CVE-2022-20127", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "In ce_t4t_data_cback of ce_t4t.cc, there is a possible out of bounds write due to a double free. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-221862119", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20127" }, { "cve": "CVE-2022-20130", "cwe": { "id": "CWE-754", "name": "Improper Check for Unusual or Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "In transportDec_OutOfBandConfig of tpdec_lib.cpp, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-224314979", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20130" }, { "cve": "CVE-2022-20227", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In USB driver, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-216825460References: Upstream kernel", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20227" }, { "cve": "CVE-2022-20229", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In bta_hf_client_handle_cind_list_item of bta_hf_client_at.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-224536184", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20229" }, { "cve": "CVE-2022-20355", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "In get of PacProxyService.java, there is a possible system service crash due to improper input validation. This could lead to local denial of service with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-219498290", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20355" }, { "cve": "CVE-2022-20411", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In avdt_msg_asmbl of avdt_msg.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-232023771", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20411" }, { "cve": "CVE-2022-20421", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In binder_inc_ref_for_node of binder.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239630375References: Upstream kernel", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20421" }, { "cve": "CVE-2022-20422", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "In emulation_proc_handler of armv8_deprecated.c, there is a possible way to corrupt memory due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-237540956References: Upstream kernel", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20422" }, { "cve": "CVE-2022-20423", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "In rndis_set_response of rndis.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege if a malicious USB device is attached with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239842288References: Upstream kernel", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20423" }, { "cve": "CVE-2022-20462", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In phNxpNciHal_write_unlocked of phNxpNciHal.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-230356196", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20462" }, { "cve": "CVE-2022-20466", "cwe": { "id": "CWE-1188", "name": "Initialization of a Resource with an Insecure Default" }, "notes": [ { "category": "summary", "text": "In applyKeyguardFlags of NotificationShadeWindowControllerImpl.java, there is a possible way to observe the user\u0027s password on a secondary display due to an insecure default value. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-179725730", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20466" }, { "cve": "CVE-2022-20468", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In BNEP_ConnectResp of bnep_api.cc, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-228450451", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20468" }, { "cve": "CVE-2022-20469", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In avct_lcb_msg_asmbl of avct_lcb_act.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-230867224", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20469" }, { "cve": "CVE-2022-20472", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In toLanguageTag of LocaleListCache.cpp, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-239210579", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20472" }, { "cve": "CVE-2022-20473", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In toLanguageTag of LocaleListCache.cpp, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-239267173", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20473" }, { "cve": "CVE-2022-20476", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "In setEnabledSetting of PackageManager.java, there is a possible way to get the device into an infinite reboot loop due to resource exhaustion. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-240936919", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20476" }, { "cve": "CVE-2022-20483", "cwe": { "id": "CWE-191", "name": "Integer Underflow (Wrap or Wraparound)" }, "notes": [ { "category": "summary", "text": "In several functions that parse avrc response in avrc_pars_ct.cc and related files, there are possible out of bounds reads due to integer overflows. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-242459126", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20483" }, { "cve": "CVE-2022-20498", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In fdt_path_offset_namelen of fdt_ro.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-246465319", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20498" }, { "cve": "CVE-2022-20500", "cwe": { "id": "CWE-755", "name": "Improper Handling of Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "In loadFromXml of ShortcutPackage.java, there is a possible crash on boot due to an uncaught exception. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-246540168", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20500" } ] }
ghsa-5hg9-992p-865c
Vulnerability from github
Published
2022-05-24 17:28
Modified
2022-05-24 17:28
VLAI Severity ?
Details
A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being 'force disabled' when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.
{ "affected": [], "aliases": [ "CVE-2020-10768" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2020-09-16T00:15:00Z", "severity": "MODERATE" }, "details": "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.", "id": "GHSA-5hg9-992p-865c", "modified": "2022-05-24T17:28:22Z", "published": "2022-05-24T17:28:22Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10768" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10768" }, { "type": "WEB", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4d8df8cbb9156b0a0ab3f802b80cb5db57acc0bf" } ], "schema_version": "1.4.0", "severity": [] }
gsd-2020-10768
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being 'force disabled' when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2020-10768", "description": "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.", "id": "GSD-2020-10768", "references": [ "https://www.suse.com/security/cve/CVE-2020-10768.html", "https://access.redhat.com/errata/RHSA-2020:3297", "https://access.redhat.com/errata/RHSA-2020:3222", "https://access.redhat.com/errata/RHSA-2020:3073", "https://access.redhat.com/errata/RHSA-2020:3041", "https://access.redhat.com/errata/RHSA-2020:3016", "https://access.redhat.com/errata/RHSA-2020:3010", "https://ubuntu.com/security/CVE-2020-10768", "https://advisories.mageia.org/CVE-2020-10768.html", "https://alas.aws.amazon.com/cve/html/CVE-2020-10768.html", "https://linux.oracle.com/cve/CVE-2020-10768.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2020-10768" ], "details": "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.", "id": "GSD-2020-10768", "modified": "2023-12-13T01:22:04.807356Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2020-10768", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "kernel", "version": { "version_data": [ { "version_value": "before 5.8-rc1" } ] } } ] }, "vendor_name": "Linux Kernel" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality." } ] }, "impact": { "cvss": [ [ { "vectorString": "5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-440" } ] } ] }, "references": { "reference_data": [ { "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4d8df8cbb9156b0a0ab3f802b80cb5db57acc0bf", "refsource": "MISC", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4d8df8cbb9156b0a0ab3f802b80cb5db57acc0bf" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10768", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10768" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "5.8.0", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2020-10768" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10768", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10768" }, { "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4d8df8cbb9156b0a0ab3f802b80cb5db57acc0bf", "refsource": "MISC", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4d8df8cbb9156b0a0ab3f802b80cb5db57acc0bf" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6 } }, "lastModifiedDate": "2020-09-22T19:10Z", "publishedDate": "2020-09-16T00:15Z" } } }
rhsa-2020:3297
Vulnerability from csaf_redhat
Published
2020-08-04 07:39
Modified
2025-08-02 13:34
Summary
Red Hat Security Advisory: kpatch-patch security update
Notes
Topic
An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
Security Fix(es):
* kernel: Rogue cross-process SSBD shutdown. Linux scheduler logical bug allows an attacker to turn off the SSBD protection. (CVE-2020-10766)
* kernel: Indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available. (CVE-2020-10767)
* kernel: Indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command. (CVE-2020-10768)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: Rogue cross-process SSBD shutdown. Linux scheduler logical bug allows an attacker to turn off the SSBD protection. (CVE-2020-10766)\n\n* kernel: Indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available. (CVE-2020-10767)\n\n* kernel: Indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command. (CVE-2020-10768)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:3297", "url": "https://access.redhat.com/errata/RHSA-2020:3297" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1845840", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845840" }, { "category": "external", "summary": "1845867", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845867" }, { "category": "external", "summary": "1845868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845868" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_3297.json" } ], "title": "Red Hat Security Advisory: kpatch-patch security update", "tracking": { "current_release_date": "2025-08-02T13:34:02+00:00", "generator": { "date": "2025-08-02T13:34:02+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2020:3297", "initial_release_date": "2020-08-04T07:39:15+00:00", "revision_history": [ { "date": "2020-08-04T07:39:15+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-08-04T07:39:15+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T13:34:02+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product": { "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:8.1::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kpatch-patch-4_18_0-147-0:1-16.el8.x86_64", "product": { "name": "kpatch-patch-4_18_0-147-0:1-16.el8.x86_64", "product_id": "kpatch-patch-4_18_0-147-0:1-16.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147@1-16.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147-debugsource-0:1-16.el8.x86_64", "product": { "name": "kpatch-patch-4_18_0-147-debugsource-0:1-16.el8.x86_64", "product_id": "kpatch-patch-4_18_0-147-debugsource-0:1-16.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147-debugsource@1-16.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147-debuginfo-0:1-16.el8.x86_64", "product": { "name": "kpatch-patch-4_18_0-147-debuginfo-0:1-16.el8.x86_64", "product_id": "kpatch-patch-4_18_0-147-debuginfo-0:1-16.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147-debuginfo@1-16.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_0_2-0:1-12.el8.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_0_2-0:1-12.el8.x86_64", "product_id": "kpatch-patch-4_18_0-147_0_2-0:1-12.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_0_2@1-12.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_0_2-debugsource-0:1-12.el8.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_0_2-debugsource-0:1-12.el8.x86_64", "product_id": "kpatch-patch-4_18_0-147_0_2-debugsource-0:1-12.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_0_2-debugsource@1-12.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_0_2-debuginfo-0:1-12.el8.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_0_2-debuginfo-0:1-12.el8.x86_64", "product_id": "kpatch-patch-4_18_0-147_0_2-debuginfo-0:1-12.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_0_2-debuginfo@1-12.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_3_1-0:1-12.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_3_1-0:1-12.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_3_1-0:1-12.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_3_1@1-12.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_5_1-0:1-7.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_5_1-0:1-7.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_5_1-0:1-7.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_5_1@1-7.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_8_1-0:1-5.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_8_1-0:1-5.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_8_1-0:1-5.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_8_1@1-5.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_13_2-0:1-3.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_13_2-0:1-3.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_13_2-0:1-3.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_13_2@1-3.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_13_2-debugsource-0:1-3.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_13_2-debugsource-0:1-3.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_13_2-debugsource-0:1-3.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_13_2-debugsource@1-3.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_13_2-debuginfo-0:1-3.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_13_2-debuginfo-0:1-3.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_13_2-debuginfo-0:1-3.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_13_2-debuginfo@1-3.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_20_1-0:1-2.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_20_1-0:1-2.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_20_1-0:1-2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_20_1@1-2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_20_1-debugsource-0:1-2.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_20_1-debugsource-0:1-2.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_20_1-debugsource-0:1-2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_20_1-debugsource@1-2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-2.el8_1.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-2.el8_1.x86_64", "product_id": "kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_20_1-debuginfo@1-2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_0_3-0:1-12.el8.x86_64", "product": { "name": "kpatch-patch-4_18_0-147_0_3-0:1-12.el8.x86_64", "product_id": "kpatch-patch-4_18_0-147_0_3-0:1-12.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_0_3@1-12.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kpatch-patch-4_18_0-147-0:1-16.el8.src", "product": { "name": "kpatch-patch-4_18_0-147-0:1-16.el8.src", "product_id": "kpatch-patch-4_18_0-147-0:1-16.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147@1-16.el8?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_0_2-0:1-12.el8.src", "product": { "name": "kpatch-patch-4_18_0-147_0_2-0:1-12.el8.src", "product_id": "kpatch-patch-4_18_0-147_0_2-0:1-12.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_0_2@1-12.el8?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_3_1-0:1-12.el8_1.src", "product": { "name": "kpatch-patch-4_18_0-147_3_1-0:1-12.el8_1.src", "product_id": "kpatch-patch-4_18_0-147_3_1-0:1-12.el8_1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_3_1@1-12.el8_1?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_5_1-0:1-7.el8_1.src", "product": { "name": "kpatch-patch-4_18_0-147_5_1-0:1-7.el8_1.src", "product_id": "kpatch-patch-4_18_0-147_5_1-0:1-7.el8_1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_5_1@1-7.el8_1?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_8_1-0:1-5.el8_1.src", "product": { "name": "kpatch-patch-4_18_0-147_8_1-0:1-5.el8_1.src", "product_id": "kpatch-patch-4_18_0-147_8_1-0:1-5.el8_1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_8_1@1-5.el8_1?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_13_2-0:1-3.el8_1.src", "product": { "name": "kpatch-patch-4_18_0-147_13_2-0:1-3.el8_1.src", "product_id": "kpatch-patch-4_18_0-147_13_2-0:1-3.el8_1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_13_2@1-3.el8_1?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_20_1-0:1-2.el8_1.src", "product": { "name": "kpatch-patch-4_18_0-147_20_1-0:1-2.el8_1.src", "product_id": "kpatch-patch-4_18_0-147_20_1-0:1-2.el8_1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_20_1@1-2.el8_1?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-147_0_3-0:1-12.el8.src", "product": { "name": "kpatch-patch-4_18_0-147_0_3-0:1-12.el8.src", "product_id": "kpatch-patch-4_18_0-147_0_3-0:1-12.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147_0_3@1-12.el8?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147-0:1-16.el8.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147-0:1-16.el8.src" }, "product_reference": "kpatch-patch-4_18_0-147-0:1-16.el8.src", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147-0:1-16.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147-0:1-16.el8.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147-0:1-16.el8.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147-debuginfo-0:1-16.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147-debuginfo-0:1-16.el8.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147-debuginfo-0:1-16.el8.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147-debugsource-0:1-16.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147-debugsource-0:1-16.el8.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147-debugsource-0:1-16.el8.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_0_2-0:1-12.el8.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_2-0:1-12.el8.src" }, "product_reference": "kpatch-patch-4_18_0-147_0_2-0:1-12.el8.src", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_0_2-0:1-12.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_2-0:1-12.el8.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_0_2-0:1-12.el8.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_0_2-debuginfo-0:1-12.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_2-debuginfo-0:1-12.el8.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_0_2-debuginfo-0:1-12.el8.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_0_2-debugsource-0:1-12.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_2-debugsource-0:1-12.el8.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_0_2-debugsource-0:1-12.el8.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_0_3-0:1-12.el8.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_3-0:1-12.el8.src" }, "product_reference": "kpatch-patch-4_18_0-147_0_3-0:1-12.el8.src", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_0_3-0:1-12.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_3-0:1-12.el8.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_0_3-0:1-12.el8.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_13_2-0:1-3.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-0:1-3.el8_1.src" }, "product_reference": "kpatch-patch-4_18_0-147_13_2-0:1-3.el8_1.src", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_13_2-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-0:1-3.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_13_2-0:1-3.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_13_2-debuginfo-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-debuginfo-0:1-3.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_13_2-debuginfo-0:1-3.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_13_2-debugsource-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-debugsource-0:1-3.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_13_2-debugsource-0:1-3.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_20_1-0:1-2.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-2.el8_1.src" }, "product_reference": "kpatch-patch-4_18_0-147_20_1-0:1-2.el8_1.src", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_20_1-0:1-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-2.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_20_1-0:1-2.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-2.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-2.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_20_1-debugsource-0:1-2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debugsource-0:1-2.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_20_1-debugsource-0:1-2.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_3_1-0:1-12.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_3_1-0:1-12.el8_1.src" }, "product_reference": "kpatch-patch-4_18_0-147_3_1-0:1-12.el8_1.src", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_3_1-0:1-12.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_3_1-0:1-12.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_3_1-0:1-12.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_5_1-0:1-7.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_5_1-0:1-7.el8_1.src" }, "product_reference": "kpatch-patch-4_18_0-147_5_1-0:1-7.el8_1.src", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_5_1-0:1-7.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_5_1-0:1-7.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_5_1-0:1-7.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_8_1-0:1-5.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_8_1-0:1-5.el8_1.src" }, "product_reference": "kpatch-patch-4_18_0-147_8_1-0:1-5.el8_1.src", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-147_8_1-0:1-5.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_8_1-0:1-5.el8_1.x86_64" }, "product_reference": "kpatch-patch-4_18_0-147_8_1-0:1-5.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-10766", "cwe": { "id": "CWE-440", "name": "Expected Behavior Violation" }, "discovery_date": "2020-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1845840" } ], "notes": [ { "category": "description", "text": "A logic bug flaw was found in the Linux kernel\u2019s implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Rogue cross-process SSBD shutdown. Linux scheduler logical bug allows an attacker to turn off the SSBD protection.", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having Important impact because it can be used to disable Spectre v4, which has a rating of Important.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147-0:1-16.el8.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147-0:1-16.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147-debuginfo-0:1-16.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147-debugsource-0:1-16.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_2-0:1-12.el8.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_2-0:1-12.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_2-debuginfo-0:1-12.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_2-debugsource-0:1-12.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_3-0:1-12.el8.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_3-0:1-12.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-0:1-3.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-debuginfo-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-debugsource-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-2.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debugsource-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_3_1-0:1-12.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_3_1-0:1-12.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_5_1-0:1-7.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_5_1-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_8_1-0:1-5.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_8_1-0:1-5.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10766" }, { "category": "external", "summary": "RHBZ#1845840", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845840" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10766", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10766" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10766", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10766" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dbbe2ad02e9df26e372f38cc3e70dab9222c832e", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dbbe2ad02e9df26e372f38cc3e70dab9222c832e" } ], "release_date": "2020-06-09T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-08-04T07:39:15+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147-0:1-16.el8.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147-0:1-16.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147-debuginfo-0:1-16.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147-debugsource-0:1-16.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_2-0:1-12.el8.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_2-0:1-12.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_2-debuginfo-0:1-12.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_2-debugsource-0:1-12.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_3-0:1-12.el8.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_3-0:1-12.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-0:1-3.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-debuginfo-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-debugsource-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-2.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debugsource-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_3_1-0:1-12.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_3_1-0:1-12.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_5_1-0:1-7.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_5_1-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_8_1-0:1-5.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_8_1-0:1-5.el8_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3297" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.", "product_ids": [ "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147-0:1-16.el8.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147-0:1-16.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147-debuginfo-0:1-16.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147-debugsource-0:1-16.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_2-0:1-12.el8.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_2-0:1-12.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_2-debuginfo-0:1-12.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_2-debugsource-0:1-12.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_3-0:1-12.el8.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_3-0:1-12.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-0:1-3.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-debuginfo-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-debugsource-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-2.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debugsource-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_3_1-0:1-12.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_3_1-0:1-12.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_5_1-0:1-7.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_5_1-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_8_1-0:1-5.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_8_1-0:1-5.el8_1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147-0:1-16.el8.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147-0:1-16.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147-debuginfo-0:1-16.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147-debugsource-0:1-16.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_2-0:1-12.el8.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_2-0:1-12.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_2-debuginfo-0:1-12.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_2-debugsource-0:1-12.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_3-0:1-12.el8.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_3-0:1-12.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-0:1-3.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-debuginfo-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-debugsource-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-2.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debugsource-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_3_1-0:1-12.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_3_1-0:1-12.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_5_1-0:1-7.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_5_1-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_8_1-0:1-5.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_8_1-0:1-5.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Rogue cross-process SSBD shutdown. Linux scheduler logical bug allows an attacker to turn off the SSBD protection." }, { "cve": "CVE-2020-10767", "cwe": { "id": "CWE-440", "name": "Expected Behavior Violation" }, "discovery_date": "2020-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1845867" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available.", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having Important impact, because it enables exploitation of the previous Spectre v2 attack, which has a rating of Important.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147-0:1-16.el8.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147-0:1-16.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147-debuginfo-0:1-16.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147-debugsource-0:1-16.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_2-0:1-12.el8.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_2-0:1-12.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_2-debuginfo-0:1-12.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_2-debugsource-0:1-12.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_3-0:1-12.el8.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_3-0:1-12.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-0:1-3.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-debuginfo-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-debugsource-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-2.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debugsource-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_3_1-0:1-12.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_3_1-0:1-12.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_5_1-0:1-7.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_5_1-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_8_1-0:1-5.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_8_1-0:1-5.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10767" }, { "category": "external", "summary": "RHBZ#1845867", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845867" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10767", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10767" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10767", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10767" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=21998a351512eba4ed5969006f0c55882d995ada", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=21998a351512eba4ed5969006f0c55882d995ada" } ], "release_date": "2020-06-09T14:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-08-04T07:39:15+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147-0:1-16.el8.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147-0:1-16.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147-debuginfo-0:1-16.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147-debugsource-0:1-16.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_2-0:1-12.el8.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_2-0:1-12.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_2-debuginfo-0:1-12.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_2-debugsource-0:1-12.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_3-0:1-12.el8.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_3-0:1-12.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-0:1-3.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-debuginfo-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-debugsource-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-2.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debugsource-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_3_1-0:1-12.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_3_1-0:1-12.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_5_1-0:1-7.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_5_1-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_8_1-0:1-5.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_8_1-0:1-5.el8_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3297" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.", "product_ids": [ "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147-0:1-16.el8.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147-0:1-16.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147-debuginfo-0:1-16.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147-debugsource-0:1-16.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_2-0:1-12.el8.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_2-0:1-12.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_2-debuginfo-0:1-12.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_2-debugsource-0:1-12.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_3-0:1-12.el8.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_3-0:1-12.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-0:1-3.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-debuginfo-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-debugsource-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-2.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debugsource-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_3_1-0:1-12.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_3_1-0:1-12.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_5_1-0:1-7.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_5_1-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_8_1-0:1-5.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_8_1-0:1-5.el8_1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147-0:1-16.el8.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147-0:1-16.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147-debuginfo-0:1-16.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147-debugsource-0:1-16.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_2-0:1-12.el8.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_2-0:1-12.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_2-debuginfo-0:1-12.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_2-debugsource-0:1-12.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_3-0:1-12.el8.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_3-0:1-12.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-0:1-3.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-debuginfo-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-debugsource-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-2.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debugsource-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_3_1-0:1-12.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_3_1-0:1-12.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_5_1-0:1-7.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_5_1-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_8_1-0:1-5.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_8_1-0:1-5.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available." }, { "cve": "CVE-2020-10768", "cwe": { "id": "CWE-440", "name": "Expected Behavior Violation" }, "discovery_date": "2020-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1845868" } ], "notes": [ { "category": "description", "text": "A flaw was found in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command.", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having Important impact, because it enables exploitation of the previous Spectre v2 attack, which has a rating of Important.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147-0:1-16.el8.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147-0:1-16.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147-debuginfo-0:1-16.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147-debugsource-0:1-16.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_2-0:1-12.el8.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_2-0:1-12.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_2-debuginfo-0:1-12.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_2-debugsource-0:1-12.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_3-0:1-12.el8.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_3-0:1-12.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-0:1-3.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-debuginfo-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-debugsource-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-2.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debugsource-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_3_1-0:1-12.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_3_1-0:1-12.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_5_1-0:1-7.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_5_1-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_8_1-0:1-5.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_8_1-0:1-5.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10768" }, { "category": "external", "summary": "RHBZ#1845868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845868" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10768", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10768" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10768", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10768" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4d8df8cbb9156b0a0ab3f802b80cb5db57acc0bf", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4d8df8cbb9156b0a0ab3f802b80cb5db57acc0bf" } ], "release_date": "2020-06-09T14:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-08-04T07:39:15+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147-0:1-16.el8.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147-0:1-16.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147-debuginfo-0:1-16.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147-debugsource-0:1-16.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_2-0:1-12.el8.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_2-0:1-12.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_2-debuginfo-0:1-12.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_2-debugsource-0:1-12.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_3-0:1-12.el8.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_3-0:1-12.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-0:1-3.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-debuginfo-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-debugsource-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-2.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debugsource-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_3_1-0:1-12.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_3_1-0:1-12.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_5_1-0:1-7.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_5_1-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_8_1-0:1-5.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_8_1-0:1-5.el8_1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3297" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.", "product_ids": [ "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147-0:1-16.el8.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147-0:1-16.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147-debuginfo-0:1-16.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147-debugsource-0:1-16.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_2-0:1-12.el8.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_2-0:1-12.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_2-debuginfo-0:1-12.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_2-debugsource-0:1-12.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_3-0:1-12.el8.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_3-0:1-12.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-0:1-3.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-debuginfo-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-debugsource-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-2.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debugsource-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_3_1-0:1-12.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_3_1-0:1-12.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_5_1-0:1-7.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_5_1-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_8_1-0:1-5.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_8_1-0:1-5.el8_1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147-0:1-16.el8.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147-0:1-16.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147-debuginfo-0:1-16.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147-debugsource-0:1-16.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_2-0:1-12.el8.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_2-0:1-12.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_2-debuginfo-0:1-12.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_2-debugsource-0:1-12.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_3-0:1-12.el8.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_0_3-0:1-12.el8.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-0:1-3.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-debuginfo-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_13_2-debugsource-0:1-3.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-2.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debuginfo-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_20_1-debugsource-0:1-2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_3_1-0:1-12.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_3_1-0:1-12.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_5_1-0:1-7.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_5_1-0:1-7.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_8_1-0:1-5.el8_1.src", "BaseOS-8.1.0.Z.EUS:kpatch-patch-4_18_0-147_8_1-0:1-5.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command." } ] }
rhsa-2020:3010
Vulnerability from csaf_redhat
Published
2020-07-21 11:09
Modified
2025-08-04 12:06
Summary
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: use-after-free in sound/core/timer.c (CVE-2019-19807)
* kernel: kernel: DAX hugepages not considered during mremap (CVE-2020-10757)
* kernel: Rogue cross-process SSBD shutdown. Linux scheduler logical bug allows an attacker to turn off the SSBD protection. (CVE-2020-10766)
* kernel: Indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available. (CVE-2020-10767)
* kernel: Indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command. (CVE-2020-10768)
* kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c (CVE-2020-12653)
* kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c (CVE-2020-12654)
* Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario (CVE-2020-12888)
* kernel: kvm: Information leak within a KVM guest (CVE-2019-3016)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* [FJ8.2 Bug]: kernel: retrieving process core dump of the init process (PID 1) fails (BZ#1821378)
* [FJ8.0 Bug]: System hungs up after setting parameters for hugepages (BZ#1835789)
* RHEL8.2 Alpha - ISST-LTE:PowerVM: vNIC DLPAR crashes the LPAR (ibmvnic) (BZ#1836229)
* "[sig-network] Services should be rejected when no endpoints exist" test fails frequently on RHEL8 nodes (BZ#1836302)
* RHEL8.2 Beta - RHEL8.2 reports EEH errors on internal SAS adapter during HTX run on PMEM (SCM/pmem) (BZ#1842406)
* RHEL8.1 - s390/cio: fix virtio-ccw DMA without PV (BZ#1842620)
* deadlock between modprobe and netns exit (BZ#1845164)
* exit_boot failed when install RHEL8.1 (BZ#1846180)
* http request is taking more time for endpoint running on different host via nodeport service (BZ#1847128)
* RHEL8.1 - zEDC problems on z14 (genwqe/pci) (BZ#1847453)
* WARNING: CPU: 1 PID: 0 at arch/x86/kernel/apic/vector.c:846 free_moved_vector+0x141/0x150 (BZ#1848545)
* Backport conntrack race condition fixes (BZ#1851003)
* nf_conntrack module unload fail and refcount become to negative (BZ#1851005)
* OVS: backport performance patches from upstream to 8.2z (BZ#1851235)
* RHEL8.3: backport "smp: Allow smp_call_function_single_async() to insert locked csd" (BZ#1851406)
* [DELL EMC 8.2 BUG] NVMe drive is not detected after multiple hotplug (hot add + surprise remove) operations (BZ#1852045)
Enhancement(s):
* [Mellanox 8.3 FEAT] mlx5: drivers update upto Linux v5.5 (BZ#1843544)
* [IBM 8.3 FEAT] Update nvme driver to latest level for POWER (BZ#1846405)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: use-after-free in sound/core/timer.c (CVE-2019-19807)\n\n* kernel: kernel: DAX hugepages not considered during mremap (CVE-2020-10757)\n\n* kernel: Rogue cross-process SSBD shutdown. Linux scheduler logical bug allows an attacker to turn off the SSBD protection. (CVE-2020-10766)\n\n* kernel: Indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available. (CVE-2020-10767)\n\n* kernel: Indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command. (CVE-2020-10768)\n\n* kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c (CVE-2020-12653)\n\n* kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c (CVE-2020-12654)\n\n* Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario (CVE-2020-12888)\n\n* kernel: kvm: Information leak within a KVM guest (CVE-2019-3016)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [FJ8.2 Bug]: kernel: retrieving process core dump of the init process (PID 1) fails (BZ#1821378)\n\n* [FJ8.0 Bug]: System hungs up after setting parameters for hugepages (BZ#1835789)\n\n* RHEL8.2 Alpha - ISST-LTE:PowerVM: vNIC DLPAR crashes the LPAR (ibmvnic) (BZ#1836229)\n\n* \"[sig-network] Services should be rejected when no endpoints exist\" test fails frequently on RHEL8 nodes (BZ#1836302)\n\n* RHEL8.2 Beta - RHEL8.2 reports EEH errors on internal SAS adapter during HTX run on PMEM (SCM/pmem) (BZ#1842406)\n\n* RHEL8.1 - s390/cio: fix virtio-ccw DMA without PV (BZ#1842620)\n\n* deadlock between modprobe and netns exit (BZ#1845164)\n\n* exit_boot failed when install RHEL8.1 (BZ#1846180)\n\n* http request is taking more time for endpoint running on different host via nodeport service (BZ#1847128)\n\n* RHEL8.1 - zEDC problems on z14 (genwqe/pci) (BZ#1847453)\n\n* WARNING: CPU: 1 PID: 0 at arch/x86/kernel/apic/vector.c:846 free_moved_vector+0x141/0x150 (BZ#1848545)\n\n* Backport conntrack race condition fixes (BZ#1851003)\n\n* nf_conntrack module unload fail and refcount become to negative (BZ#1851005)\n\n* OVS: backport performance patches from upstream to 8.2z (BZ#1851235)\n\n* RHEL8.3: backport \"smp: Allow smp_call_function_single_async() to insert locked csd\" (BZ#1851406)\n\n* [DELL EMC 8.2 BUG] NVMe drive is not detected after multiple hotplug (hot add + surprise remove) operations (BZ#1852045)\n\nEnhancement(s):\n\n* [Mellanox 8.3 FEAT] mlx5: drivers update upto Linux v5.5 (BZ#1843544)\n\n* [IBM 8.3 FEAT] Update nvme driver to latest level for POWER (BZ#1846405)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:3010", "url": "https://access.redhat.com/errata/RHSA-2020:3010" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1786078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786078" }, { "category": "external", "summary": "1792167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1792167" }, { "category": "external", "summary": "1831868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831868" }, { "category": "external", "summary": "1832530", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1832530" }, { "category": "external", "summary": "1836244", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1836244" }, { "category": "external", "summary": "1842525", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1842525" }, { "category": "external", "summary": "1845840", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845840" }, { "category": "external", "summary": "1845867", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845867" }, { "category": "external", "summary": "1845868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845868" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_3010.json" } ], "title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update", "tracking": { "current_release_date": "2025-08-04T12:06:00+00:00", "generator": { "date": "2025-08-04T12:06:00+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2020:3010", "initial_release_date": "2020-07-21T11:09:05+00:00", "revision_history": [ { "date": "2020-07-21T11:09:05+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-07-21T11:09:05+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-04T12:06:00+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat CodeReady Linux Builder (v. 8)", "product": { "name": "Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::crb" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product": { "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "product_id": "kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.13.2.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "product": { "name": "bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "product_id": "bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.13.2.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "product_id": "kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.13.2.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "product": { "name": "kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "product_id": "kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.13.2.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "product": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-193.13.2.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "product_id": "kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.13.2.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "product": { "name": "perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "product_id": "perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.13.2.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "product": { "name": "python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "product_id": "python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.13.2.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "product": { "name": "bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "product_id": "bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-193.13.2.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-193.13.2.el8_2.aarch64", "product": { "name": "kernel-0:4.18.0-193.13.2.el8_2.aarch64", "product_id": "kernel-0:4.18.0-193.13.2.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-193.13.2.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "product": { "name": "kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "product_id": "kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.13.2.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "product": { "name": "kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "product_id": "kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.13.2.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "product": { "name": "kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "product_id": "kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.13.2.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "product": { "name": "kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "product_id": "kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.13.2.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "product": { "name": "kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "product_id": "kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.13.2.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "product": { "name": "kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "product_id": "kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.13.2.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "product_id": "kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.13.2.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "product": { "name": "kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "product_id": "kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.13.2.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "product": { "name": "kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "product_id": "kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.13.2.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "product": { "name": "kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "product_id": "kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.13.2.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "product": { "name": "kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "product_id": "kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.13.2.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "product": { "name": "kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "product_id": "kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.13.2.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "product": { "name": "kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "product_id": "kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.13.2.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "perf-0:4.18.0-193.13.2.el8_2.aarch64", "product": { "name": "perf-0:4.18.0-193.13.2.el8_2.aarch64", "product_id": "perf-0:4.18.0-193.13.2.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-193.13.2.el8_2?arch=aarch64" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "product": { "name": "python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "product_id": "python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.13.2.el8_2?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "product_id": "kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.13.2.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "product": { "name": "bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "product_id": "bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.13.2.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "product_id": "kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.13.2.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "product": { "name": "kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "product_id": "kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.13.2.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-193.13.2.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "product_id": "kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.13.2.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "product": { "name": "perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "product_id": "perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.13.2.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "product": { "name": "python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "product_id": "python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.13.2.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "product": { "name": "bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "product_id": "bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-193.13.2.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "product": { "name": "kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "product_id": "kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-193.13.2.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "product": { "name": "kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "product_id": "kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.13.2.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "product": { "name": "kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "product_id": "kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.13.2.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "product": { "name": "kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "product_id": "kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.13.2.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "product": { "name": "kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "product_id": "kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.13.2.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "product": { "name": "kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "product_id": "kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.13.2.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "product": { "name": "kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "product_id": "kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.13.2.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "product_id": "kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.13.2.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "product": { "name": "kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "product_id": "kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.13.2.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "product": { "name": "kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "product_id": "kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.13.2.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "product": { "name": "kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "product_id": "kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.13.2.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "product": { "name": "kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "product_id": "kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.13.2.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "product": { "name": "kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "product_id": "kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.13.2.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "product": { "name": "kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "product_id": "kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.13.2.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:4.18.0-193.13.2.el8_2.ppc64le", "product": { "name": "perf-0:4.18.0-193.13.2.el8_2.ppc64le", "product_id": "perf-0:4.18.0-193.13.2.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-193.13.2.el8_2?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "product": { "name": "python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "product_id": "python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.13.2.el8_2?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "product_id": "kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-193.13.2.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "product": { "name": "bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "product_id": "bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.13.2.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "product_id": "kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.13.2.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "product": { "name": "kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "product_id": "kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.13.2.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-193.13.2.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "product_id": "kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.13.2.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "product": { "name": "perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "product_id": "perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.13.2.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "product": { "name": "python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "product_id": "python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.13.2.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "product": { "name": "bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "product_id": "bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-193.13.2.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-193.13.2.el8_2.x86_64", "product": { "name": "kernel-0:4.18.0-193.13.2.el8_2.x86_64", "product_id": "kernel-0:4.18.0-193.13.2.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-193.13.2.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "product": { "name": "kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "product_id": "kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.13.2.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "product": { "name": "kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "product_id": "kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.13.2.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "product": { "name": "kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "product_id": "kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.13.2.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "product": { "name": "kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "product_id": "kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.13.2.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "product": { "name": "kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "product_id": "kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.13.2.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "product": { "name": "kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "product_id": "kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.13.2.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "product_id": "kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.13.2.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "product": { "name": "kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "product_id": "kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.13.2.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "product": { "name": "kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "product_id": "kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.13.2.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "product": { "name": "kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "product_id": "kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.13.2.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "product": { "name": "kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "product_id": "kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.13.2.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "product": { "name": "kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "product_id": "kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.13.2.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "product": { "name": "kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "product_id": "kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-193.13.2.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:4.18.0-193.13.2.el8_2.x86_64", "product": { "name": "perf-0:4.18.0-193.13.2.el8_2.x86_64", "product_id": "perf-0:4.18.0-193.13.2.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-193.13.2.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "product": { "name": "python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "product_id": "python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.13.2.el8_2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-193.13.2.el8_2.s390x", "product": { "name": "bpftool-0:4.18.0-193.13.2.el8_2.s390x", "product_id": "bpftool-0:4.18.0-193.13.2.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-193.13.2.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-193.13.2.el8_2.s390x", "product": { "name": "kernel-0:4.18.0-193.13.2.el8_2.s390x", "product_id": "kernel-0:4.18.0-193.13.2.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-193.13.2.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "product": { "name": "kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "product_id": "kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-193.13.2.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "product": { "name": "kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "product_id": "kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-193.13.2.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "product": { "name": "kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "product_id": "kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-193.13.2.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "product": { "name": "kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "product_id": "kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-193.13.2.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "product": { "name": "kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "product_id": "kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-193.13.2.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "product": { "name": "kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "product_id": "kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-193.13.2.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "product_id": "kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-193.13.2.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "product": { "name": "kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "product_id": "kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-193.13.2.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "product": { "name": "kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "product_id": "kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-193.13.2.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "product": { "name": "kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "product_id": "kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-193.13.2.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "product": { "name": "kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "product_id": "kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-193.13.2.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "product": { "name": "kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "product_id": "kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-193.13.2.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "product": { "name": "kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "product_id": "kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-193.13.2.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "product": { "name": "kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "product_id": "kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-193.13.2.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "product": { "name": "kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "product_id": "kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-193.13.2.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "product": { "name": "kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "product_id": "kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-193.13.2.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "product": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-193.13.2.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:4.18.0-193.13.2.el8_2.s390x", "product": { "name": "perf-0:4.18.0-193.13.2.el8_2.s390x", "product_id": "perf-0:4.18.0-193.13.2.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-193.13.2.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "product": { "name": "python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "product_id": "python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-193.13.2.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "product": { "name": "bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "product_id": "bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-193.13.2.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "product_id": "kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-193.13.2.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "product": { "name": "kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "product_id": "kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-193.13.2.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "product_id": "kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-193.13.2.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "product_id": "kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-193.13.2.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "product": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-193.13.2.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "product": { "name": "perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "product_id": "perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-193.13.2.el8_2?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "product": { "name": "python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "product_id": "python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-193.13.2.el8_2?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-0:4.18.0-193.13.2.el8_2.src", "product": { "name": "kernel-0:4.18.0-193.13.2.el8_2.src", "product_id": "kernel-0:4.18.0-193.13.2.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-193.13.2.el8_2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "product": { "name": "kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "product_id": "kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-193.13.2.el8_2?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "product": { "name": "kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "product_id": "kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@4.18.0-193.13.2.el8_2?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.13.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64" }, "product_reference": "bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.13.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le" }, "product_reference": "bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.13.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x" }, "product_reference": "bpftool-0:4.18.0-193.13.2.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.13.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64" }, "product_reference": "bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.13.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64" }, "product_reference": "kernel-0:4.18.0-193.13.2.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.13.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le" }, "product_reference": "kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.13.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x" }, "product_reference": "kernel-0:4.18.0-193.13.2.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.13.2.el8_2.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src" }, "product_reference": "kernel-0:4.18.0-193.13.2.el8_2.src", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.13.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64" }, "product_reference": "kernel-0:4.18.0-193.13.2.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.13.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64" }, "product_reference": "kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le" }, "product_reference": "kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.13.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x" }, "product_reference": "kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.13.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64" }, "product_reference": "kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64" }, "product_reference": "kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le" }, "product_reference": "kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.13.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x" }, "product_reference": "kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64" }, "product_reference": "kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le" }, "product_reference": "kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x" }, "product_reference": "kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64" }, "product_reference": "kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le" }, "product_reference": "kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.13.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x" }, "product_reference": "kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-193.13.2.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch" }, "product_reference": "kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64" }, "product_reference": "kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le" }, "product_reference": "kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.13.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x" }, "product_reference": "kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64" }, "product_reference": "kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le" }, "product_reference": "kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.13.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x" }, "product_reference": "kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64" }, "product_reference": "kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le" }, "product_reference": "kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.13.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x" }, "product_reference": "kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64" }, "product_reference": "kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x" }, "product_reference": "kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x" }, "product_reference": "kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.13.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64" }, "product_reference": "perf-0:4.18.0-193.13.2.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.13.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le" }, "product_reference": "perf-0:4.18.0-193.13.2.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.13.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x" }, "product_reference": "perf-0:4.18.0-193.13.2.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.13.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64" }, "product_reference": "perf-0:4.18.0-193.13.2.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64" }, "product_reference": "perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le" }, "product_reference": "perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x" }, "product_reference": "perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.13.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64" }, "product_reference": "python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le" }, "product_reference": "python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.13.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x" }, "product_reference": "python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.13.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64" }, "product_reference": "python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.13.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64" }, "product_reference": "bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.13.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le" }, "product_reference": "bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.13.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x" }, "product_reference": "bpftool-0:4.18.0-193.13.2.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-193.13.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64" }, "product_reference": "bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.13.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64" }, "product_reference": "kernel-0:4.18.0-193.13.2.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.13.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le" }, "product_reference": "kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.13.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x" }, "product_reference": "kernel-0:4.18.0-193.13.2.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.13.2.el8_2.src as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src" }, "product_reference": "kernel-0:4.18.0-193.13.2.el8_2.src", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-193.13.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64" }, "product_reference": "kernel-0:4.18.0-193.13.2.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.13.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64" }, "product_reference": "kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le" }, "product_reference": "kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.13.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x" }, "product_reference": "kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-193.13.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64" }, "product_reference": "kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64" }, "product_reference": "kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le" }, "product_reference": "kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.13.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x" }, "product_reference": "kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64" }, "product_reference": "kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le" }, "product_reference": "kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x" }, "product_reference": "kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64" }, "product_reference": "kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le" }, "product_reference": "kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.13.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x" }, "product_reference": "kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-193.13.2.el8_2.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch" }, "product_reference": "kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64" }, "product_reference": "kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le" }, "product_reference": "kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.13.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x" }, "product_reference": "kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64" }, "product_reference": "kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le" }, "product_reference": "kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.13.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x" }, "product_reference": "kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64" }, "product_reference": "kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le" }, "product_reference": "kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.13.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x" }, "product_reference": "kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64" }, "product_reference": "kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x" }, "product_reference": "kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x" }, "product_reference": "kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.13.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64" }, "product_reference": "perf-0:4.18.0-193.13.2.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.13.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le" }, "product_reference": "perf-0:4.18.0-193.13.2.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.13.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x" }, "product_reference": "perf-0:4.18.0-193.13.2.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-193.13.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64" }, "product_reference": "perf-0:4.18.0-193.13.2.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64" }, "product_reference": "perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le" }, "product_reference": "perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x" }, "product_reference": "perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.13.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64" }, "product_reference": "python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le" }, "product_reference": "python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.13.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x" }, "product_reference": "python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-193.13.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64" }, "product_reference": "python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "relates_to_product_reference": "CRB-8.2.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-3016", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-01-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1792167" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way Linux kernel\u0027s KVM hypervisor handled deferred TLB flush requests from guest. A race condition may occur between the guest issuing a deferred TLB flush request to KVM, and then KVM handling and acknowledging it. This may result in invalid address translations from TLB being used to access guest memory, leading to a potential information leakage issue. An attacker may use this flaw to access guest memory locations that it should not have access to.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: kvm: Information leak within a KVM guest", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-3016" }, { "category": "external", "summary": "RHBZ#1792167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1792167" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3016", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3016" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3016", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3016" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2020/01/30/4", "url": "https://www.openwall.com/lists/oss-security/2020/01/30/4" } ], "release_date": "2020-01-30T18:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-21T11:09:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:3010" }, { "category": "workaround", "details": "This issue can only be resolved by applying updates.\n\nMitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: kvm: Information leak within a KVM guest" }, { "cve": "CVE-2019-19807", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2019-12-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1786078" } ], "notes": [ { "category": "description", "text": "A memory flaw was found in the ALSA subsystem of the Linux kernel. The struct snd_timer_instance function fails the timer-\u003emax_instances check leading to an invalid address. This could lead to a use-after-free vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in sound/core/timer.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affected Linux kernel versions as shipped with Red Hat Enterprise Linux 8 starting with RHEL-8.1.0, that is Red Hat Enterprise Linux 8.1 GA kernel version.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19807" }, { "category": "external", "summary": "RHBZ#1786078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786078" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19807", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19807" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19807", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19807" } ], "release_date": "2019-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-21T11:09:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:3010" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.", "product_ids": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: use-after-free in sound/core/timer.c" }, { "acknowledgments": [ { "names": [ "Fan Yang" ] } ], "cve": "CVE-2020-10757", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2020-05-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1842525" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: kernel: DAX hugepages not considered during mremap", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue requires access to a DAX enabled storage.\n\nThis issue affects Red Hat Enterprise Linux 7 kernels starting with kernel-3.10.0-862, that is Red Hat Enterprise Linux 7.5 GA kernel. Red Hat Enterprise Linux 7 kernels prior to that version are not affected as they did not include the functionality that enabled this issue to be exploited.\n\nRed Hat Product Security is aware of this issue. Updates will be released as they become available.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10757" }, { "category": "external", "summary": "RHBZ#1842525", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1842525" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10757", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10757" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10757", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10757" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5bfea2d9b17f1034a68147a8b03b9789af5700f9", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5bfea2d9b17f1034a68147a8b03b9789af5700f9" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2020/06/04/4", "url": "https://www.openwall.com/lists/oss-security/2020/06/04/4" } ], "release_date": "2020-06-04T09:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-21T11:09:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:3010" }, { "category": "workaround", "details": "Do not use DAX enabled storage.", "product_ids": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: kernel: DAX hugepages not considered during mremap" }, { "cve": "CVE-2020-10766", "cwe": { "id": "CWE-440", "name": "Expected Behavior Violation" }, "discovery_date": "2020-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1845840" } ], "notes": [ { "category": "description", "text": "A logic bug flaw was found in the Linux kernel\u2019s implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Rogue cross-process SSBD shutdown. Linux scheduler logical bug allows an attacker to turn off the SSBD protection.", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having Important impact because it can be used to disable Spectre v4, which has a rating of Important.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10766" }, { "category": "external", "summary": "RHBZ#1845840", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845840" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10766", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10766" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10766", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10766" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dbbe2ad02e9df26e372f38cc3e70dab9222c832e", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dbbe2ad02e9df26e372f38cc3e70dab9222c832e" } ], "release_date": "2020-06-09T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-21T11:09:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:3010" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.", "product_ids": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Rogue cross-process SSBD shutdown. Linux scheduler logical bug allows an attacker to turn off the SSBD protection." }, { "cve": "CVE-2020-10767", "cwe": { "id": "CWE-440", "name": "Expected Behavior Violation" }, "discovery_date": "2020-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1845867" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available.", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having Important impact, because it enables exploitation of the previous Spectre v2 attack, which has a rating of Important.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10767" }, { "category": "external", "summary": "RHBZ#1845867", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845867" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10767", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10767" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10767", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10767" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=21998a351512eba4ed5969006f0c55882d995ada", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=21998a351512eba4ed5969006f0c55882d995ada" } ], "release_date": "2020-06-09T14:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-21T11:09:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:3010" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.", "product_ids": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available." }, { "cve": "CVE-2020-10768", "cwe": { "id": "CWE-440", "name": "Expected Behavior Violation" }, "discovery_date": "2020-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1845868" } ], "notes": [ { "category": "description", "text": "A flaw was found in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command.", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having Important impact, because it enables exploitation of the previous Spectre v2 attack, which has a rating of Important.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10768" }, { "category": "external", "summary": "RHBZ#1845868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845868" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10768", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10768" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10768", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10768" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4d8df8cbb9156b0a0ab3f802b80cb5db57acc0bf", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4d8df8cbb9156b0a0ab3f802b80cb5db57acc0bf" } ], "release_date": "2020-06-09T14:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-21T11:09:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:3010" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.", "product_ids": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command." }, { "cve": "CVE-2020-12653", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2020-05-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1831868" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the mwifiex_cmd_append_vsie_tlv() in Linux kernel\u0027s Marvell WiFi-Ex driver handled vendor specific information elements. A local user could use this flaw to escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12653" }, { "category": "external", "summary": "RHBZ#1831868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831868" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12653", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12653" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12653", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12653" } ], "release_date": "2020-01-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-21T11:09:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:3010" }, { "category": "workaround", "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module mwifiex. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278", "product_ids": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c" }, { "cve": "CVE-2020-12654", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2020-05-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1832530" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. The Marvell mwifiex driver allows a remote WiFi access point to trigger a heap-based memory buffer overflow due to an incorrect memcpy operation. The highest threat from this vulnerability is to data integrity and system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12654" }, { "category": "external", "summary": "RHBZ#1832530", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1832530" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12654", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12654" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12654", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12654" } ], "release_date": "2020-01-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-21T11:09:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:3010" }, { "category": "workaround", "details": "In order to mitigate this issue, it is possible to prevent the affected code from being loaded by blacklisting the kernel module mwifiex. For instructions relating to how to blacklist a kernel module, refer to: https://access.redhat.com/solutions/41278", "product_ids": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c" }, { "cve": "CVE-2020-12888", "cwe": { "id": "CWE-248", "name": "Uncaught Exception" }, "discovery_date": "2020-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1836244" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel, where it allows userspace processes, for example, a guest VM, to directly access h/w devices via its VFIO driver modules. The VFIO modules allow users to enable or disable access to the devices\u0027 MMIO memory address spaces. If a user attempts to access the read/write devices\u0027 MMIO address space when it is disabled, some h/w devices issue an interrupt to the CPU to indicate a fatal error condition, crashing the system. This flaw allows a guest user or process to crash the host system resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of the kernel package as shipped with Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG 2.\nThis issue affects the versions of the kernel package as shipped with Red Hat Enterprise Linux 7 and 8. Future kernel updates for Red Hat Enterprise Linux 7 and 8 may address this issue.\n\nA regression of CVE-2020-12888 has been reintroduced in RHEL 9.4\u20139.6 due to the backport of the fork: defer linking file vma patch (related to CVE-2024-27022). This flaw allows a privileged VFIO userspace process to retain stale MMIO mappings after a fork(), leading to host crashes if the child process accesses the device after MMIO has been disabled. While the bug was transient in upstream (v6.9 only), it remains present in multiple RHEL9 releases. Only users with high privileges and access to a VFIO-assigned device can exploit this, and no impact is observed in standard QEMU or DPDK configurations. Regarding this regression, the status of RHEL-9 fixes (fixed for 9.7 and 9.6 for the 21 Jul 2025 and pending for 9.4):\nRHEL-9.7: RHEL-73613 (kernel-5.14.0-578.el9)\nRHEL-9.6.z: RHEL-85623 (kernel-5.14.0-570.26.1.el9_6)\nRHEL-9.5.z: N/A\nRHEL-9.4.z: RHEL-85621 (under development)\nThe 9.7 and 9.6.z fixes backport the upstream solution while the 9.4.z\nfix is pursuing a RHEL specific fix to reduce the scope and risk.\nRHEL-10 is not affected, because branched at 6.12.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12888" }, { "category": "external", "summary": "RHBZ#1836244", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1836244" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12888", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12888" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12888", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12888" } ], "release_date": "2020-05-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-21T11:09:05+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:3010" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "BaseOS-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.src", "CRB-8.2.0.Z.MAIN.EUS:kernel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-193.13.2.el8_2.noarch", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-0:4.18.0-193.13.2.el8_2.x86_64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.aarch64", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.ppc64le", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.s390x", "CRB-8.2.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-193.13.2.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario" } ] }
rhsa-2020:3016
Vulnerability from csaf_redhat
Published
2020-07-21 11:24
Modified
2025-08-04 12:06
Summary
Red Hat Security Advisory: kernel-rt security and bug fix update
Notes
Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* kernel: use-after-free in sound/core/timer.c (CVE-2019-19807)
* kernel: kernel: DAX hugepages not considered during mremap (CVE-2020-10757)
* kernel: Rogue cross-process SSBD shutdown. Linux scheduler logical bug allows an attacker to turn off the SSBD protection. (CVE-2020-10766)
* kernel: Indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available. (CVE-2020-10767)
* kernel: Indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command. (CVE-2020-10768)
* kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c (CVE-2020-12653)
* kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c (CVE-2020-12654)
* Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario (CVE-2020-12888)
* kernel: kvm: Information leak within a KVM guest (CVE-2019-3016)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* kernel-rt: update RT source tree to the RHEL-8.2.z2 source tree (BZ#1829582)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: use-after-free in sound/core/timer.c (CVE-2019-19807)\n\n* kernel: kernel: DAX hugepages not considered during mremap (CVE-2020-10757)\n\n* kernel: Rogue cross-process SSBD shutdown. Linux scheduler logical bug allows an attacker to turn off the SSBD protection. (CVE-2020-10766)\n\n* kernel: Indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available. (CVE-2020-10767)\n\n* kernel: Indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command. (CVE-2020-10768)\n\n* kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c (CVE-2020-12653)\n\n* kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c (CVE-2020-12654)\n\n* Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario (CVE-2020-12888)\n\n* kernel: kvm: Information leak within a KVM guest (CVE-2019-3016)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the RHEL-8.2.z2 source tree (BZ#1829582)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:3016", "url": "https://access.redhat.com/errata/RHSA-2020:3016" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1786078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786078" }, { "category": "external", "summary": "1792167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1792167" }, { "category": "external", "summary": "1831868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831868" }, { "category": "external", "summary": "1832530", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1832530" }, { "category": "external", "summary": "1836244", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1836244" }, { "category": "external", "summary": "1842525", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1842525" }, { "category": "external", "summary": "1845840", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845840" }, { "category": "external", "summary": "1845867", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845867" }, { "category": "external", "summary": "1845868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845868" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_3016.json" } ], "title": "Red Hat Security Advisory: kernel-rt security and bug fix update", "tracking": { "current_release_date": "2025-08-04T12:06:09+00:00", "generator": { "date": "2025-08-04T12:06:09+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2020:3016", "initial_release_date": "2020-07-21T11:24:46+00:00", "revision_history": [ { "date": "2020-07-21T11:24:46+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-07-21T11:24:46+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-04T12:06:09+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product": { "name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::nfv" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Real Time (v. 8)", "product": { "name": "Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::realtime" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "product": { "name": "kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "product_id": "kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.13.2.rt13.65.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "product": { "name": "kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "product_id": "kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-193.13.2.rt13.65.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "product": { "name": "kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "product_id": "kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-193.13.2.rt13.65.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "product": { "name": "kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "product_id": "kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-193.13.2.rt13.65.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "product": { "name": "kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "product_id": "kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-193.13.2.rt13.65.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "product": { "name": "kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "product_id": "kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-193.13.2.rt13.65.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "product": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "product_id": "kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-193.13.2.rt13.65.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "product": { "name": "kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "product_id": "kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-193.13.2.rt13.65.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "product": { "name": "kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "product_id": "kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-193.13.2.rt13.65.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "product": { "name": "kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "product_id": "kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-193.13.2.rt13.65.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "product_id": "kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-193.13.2.rt13.65.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "product": { "name": "kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "product_id": "kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-193.13.2.rt13.65.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "product": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-193.13.2.rt13.65.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "product": { "name": "kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "product_id": "kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-193.13.2.rt13.65.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "product": { "name": "kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "product_id": "kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-193.13.2.rt13.65.el8_2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "product": { "name": "kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "product_id": "kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.13.2.rt13.65.el8_2?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src" }, "product_reference": "kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "relates_to_product_reference": "NFV-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" }, "product_reference": "kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" }, "product_reference": "kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" }, "product_reference": "kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" }, "product_reference": "kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" }, "product_reference": "kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "relates_to_product_reference": "NFV-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src" }, "product_reference": "kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "relates_to_product_reference": "RT-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" }, "product_reference": "kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" }, "product_reference": "kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" }, "product_reference": "kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" }, "product_reference": "kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" }, "product_reference": "kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "relates_to_product_reference": "RT-8.2.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-3016", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-01-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1792167" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way Linux kernel\u0027s KVM hypervisor handled deferred TLB flush requests from guest. A race condition may occur between the guest issuing a deferred TLB flush request to KVM, and then KVM handling and acknowledging it. This may result in invalid address translations from TLB being used to access guest memory, leading to a potential information leakage issue. An attacker may use this flaw to access guest memory locations that it should not have access to.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: kvm: Information leak within a KVM guest", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-3016" }, { "category": "external", "summary": "RHBZ#1792167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1792167" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3016", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3016" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3016", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3016" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2020/01/30/4", "url": "https://www.openwall.com/lists/oss-security/2020/01/30/4" } ], "release_date": "2020-01-30T18:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-21T11:24:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3016" }, { "category": "workaround", "details": "This issue can only be resolved by applying updates.\n\nMitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: kvm: Information leak within a KVM guest" }, { "cve": "CVE-2019-19807", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2019-12-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1786078" } ], "notes": [ { "category": "description", "text": "A memory flaw was found in the ALSA subsystem of the Linux kernel. The struct snd_timer_instance function fails the timer-\u003emax_instances check leading to an invalid address. This could lead to a use-after-free vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in sound/core/timer.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affected Linux kernel versions as shipped with Red Hat Enterprise Linux 8 starting with RHEL-8.1.0, that is Red Hat Enterprise Linux 8.1 GA kernel version.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19807" }, { "category": "external", "summary": "RHBZ#1786078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786078" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19807", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19807" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19807", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19807" } ], "release_date": "2019-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-21T11:24:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3016" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.", "product_ids": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: use-after-free in sound/core/timer.c" }, { "acknowledgments": [ { "names": [ "Fan Yang" ] } ], "cve": "CVE-2020-10757", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2020-05-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1842525" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: kernel: DAX hugepages not considered during mremap", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue requires access to a DAX enabled storage.\n\nThis issue affects Red Hat Enterprise Linux 7 kernels starting with kernel-3.10.0-862, that is Red Hat Enterprise Linux 7.5 GA kernel. Red Hat Enterprise Linux 7 kernels prior to that version are not affected as they did not include the functionality that enabled this issue to be exploited.\n\nRed Hat Product Security is aware of this issue. Updates will be released as they become available.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10757" }, { "category": "external", "summary": "RHBZ#1842525", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1842525" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10757", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10757" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10757", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10757" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5bfea2d9b17f1034a68147a8b03b9789af5700f9", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5bfea2d9b17f1034a68147a8b03b9789af5700f9" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2020/06/04/4", "url": "https://www.openwall.com/lists/oss-security/2020/06/04/4" } ], "release_date": "2020-06-04T09:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-21T11:24:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3016" }, { "category": "workaround", "details": "Do not use DAX enabled storage.", "product_ids": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: kernel: DAX hugepages not considered during mremap" }, { "cve": "CVE-2020-10766", "cwe": { "id": "CWE-440", "name": "Expected Behavior Violation" }, "discovery_date": "2020-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1845840" } ], "notes": [ { "category": "description", "text": "A logic bug flaw was found in the Linux kernel\u2019s implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Rogue cross-process SSBD shutdown. Linux scheduler logical bug allows an attacker to turn off the SSBD protection.", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having Important impact because it can be used to disable Spectre v4, which has a rating of Important.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10766" }, { "category": "external", "summary": "RHBZ#1845840", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845840" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10766", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10766" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10766", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10766" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dbbe2ad02e9df26e372f38cc3e70dab9222c832e", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dbbe2ad02e9df26e372f38cc3e70dab9222c832e" } ], "release_date": "2020-06-09T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-21T11:24:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3016" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.", "product_ids": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Rogue cross-process SSBD shutdown. Linux scheduler logical bug allows an attacker to turn off the SSBD protection." }, { "cve": "CVE-2020-10767", "cwe": { "id": "CWE-440", "name": "Expected Behavior Violation" }, "discovery_date": "2020-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1845867" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available.", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having Important impact, because it enables exploitation of the previous Spectre v2 attack, which has a rating of Important.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10767" }, { "category": "external", "summary": "RHBZ#1845867", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845867" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10767", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10767" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10767", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10767" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=21998a351512eba4ed5969006f0c55882d995ada", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=21998a351512eba4ed5969006f0c55882d995ada" } ], "release_date": "2020-06-09T14:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-21T11:24:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3016" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.", "product_ids": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available." }, { "cve": "CVE-2020-10768", "cwe": { "id": "CWE-440", "name": "Expected Behavior Violation" }, "discovery_date": "2020-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1845868" } ], "notes": [ { "category": "description", "text": "A flaw was found in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command.", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having Important impact, because it enables exploitation of the previous Spectre v2 attack, which has a rating of Important.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10768" }, { "category": "external", "summary": "RHBZ#1845868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845868" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10768", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10768" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10768", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10768" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4d8df8cbb9156b0a0ab3f802b80cb5db57acc0bf", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4d8df8cbb9156b0a0ab3f802b80cb5db57acc0bf" } ], "release_date": "2020-06-09T14:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-21T11:24:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3016" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.", "product_ids": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command." }, { "cve": "CVE-2020-12653", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2020-05-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1831868" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the mwifiex_cmd_append_vsie_tlv() in Linux kernel\u0027s Marvell WiFi-Ex driver handled vendor specific information elements. A local user could use this flaw to escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12653" }, { "category": "external", "summary": "RHBZ#1831868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831868" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12653", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12653" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12653", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12653" } ], "release_date": "2020-01-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-21T11:24:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3016" }, { "category": "workaround", "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module mwifiex. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278", "product_ids": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c" }, { "cve": "CVE-2020-12654", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2020-05-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1832530" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. The Marvell mwifiex driver allows a remote WiFi access point to trigger a heap-based memory buffer overflow due to an incorrect memcpy operation. The highest threat from this vulnerability is to data integrity and system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12654" }, { "category": "external", "summary": "RHBZ#1832530", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1832530" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12654", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12654" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12654", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12654" } ], "release_date": "2020-01-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-21T11:24:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3016" }, { "category": "workaround", "details": "In order to mitigate this issue, it is possible to prevent the affected code from being loaded by blacklisting the kernel module mwifiex. For instructions relating to how to blacklist a kernel module, refer to: https://access.redhat.com/solutions/41278", "product_ids": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c" }, { "cve": "CVE-2020-12888", "cwe": { "id": "CWE-248", "name": "Uncaught Exception" }, "discovery_date": "2020-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1836244" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel, where it allows userspace processes, for example, a guest VM, to directly access h/w devices via its VFIO driver modules. The VFIO modules allow users to enable or disable access to the devices\u0027 MMIO memory address spaces. If a user attempts to access the read/write devices\u0027 MMIO address space when it is disabled, some h/w devices issue an interrupt to the CPU to indicate a fatal error condition, crashing the system. This flaw allows a guest user or process to crash the host system resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of the kernel package as shipped with Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG 2.\nThis issue affects the versions of the kernel package as shipped with Red Hat Enterprise Linux 7 and 8. Future kernel updates for Red Hat Enterprise Linux 7 and 8 may address this issue.\n\nA regression of CVE-2020-12888 has been reintroduced in RHEL 9.4\u20139.6 due to the backport of the fork: defer linking file vma patch (related to CVE-2024-27022). This flaw allows a privileged VFIO userspace process to retain stale MMIO mappings after a fork(), leading to host crashes if the child process accesses the device after MMIO has been disabled. While the bug was transient in upstream (v6.9 only), it remains present in multiple RHEL9 releases. Only users with high privileges and access to a VFIO-assigned device can exploit this, and no impact is observed in standard QEMU or DPDK configurations. Regarding this regression, the status of RHEL-9 fixes (fixed for 9.7 and 9.6 for the 21 Jul 2025 and pending for 9.4):\nRHEL-9.7: RHEL-73613 (kernel-5.14.0-578.el9)\nRHEL-9.6.z: RHEL-85623 (kernel-5.14.0-570.26.1.el9_6)\nRHEL-9.5.z: N/A\nRHEL-9.4.z: RHEL-85621 (under development)\nThe 9.7 and 9.6.z fixes backport the upstream solution while the 9.4.z\nfix is pursuing a RHEL specific fix to reduce the scope and risk.\nRHEL-10 is not affected, because branched at 6.12.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12888" }, { "category": "external", "summary": "RHBZ#1836244", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1836244" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12888", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12888" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12888", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12888" } ], "release_date": "2020-05-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-21T11:24:46+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3016" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "NFV-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.src", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64", "RT-8.2.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-193.13.2.rt13.65.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario" } ] }
rhsa-2020:3041
Vulnerability from csaf_redhat
Published
2020-07-21 14:33
Modified
2025-08-02 13:32
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: kernel: DAX hugepages not considered during mremap (CVE-2020-10757)
* kernel: Rogue cross-process SSBD shutdown. Linux scheduler logical bug allows an attacker to turn off the SSBD protection. (CVE-2020-10766)
* kernel: Indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available. (CVE-2020-10767)
* kernel: Indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command. (CVE-2020-10768)
* kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c (CVE-2020-12653)
* kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c (CVE-2020-12654)
* Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario (CVE-2020-12888)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* [ESXi][RHEL8.1.0] scsi driver SG list incompatibility (vmw_pvscsi) (BZ#1839359)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: kernel: DAX hugepages not considered during mremap (CVE-2020-10757)\n\n* kernel: Rogue cross-process SSBD shutdown. Linux scheduler logical bug allows an attacker to turn off the SSBD protection. (CVE-2020-10766)\n\n* kernel: Indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available. (CVE-2020-10767)\n\n* kernel: Indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command. (CVE-2020-10768)\n\n* kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c (CVE-2020-12653)\n\n* kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c (CVE-2020-12654)\n\n* Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario (CVE-2020-12888)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [ESXi][RHEL8.1.0] scsi driver SG list incompatibility (vmw_pvscsi) (BZ#1839359)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:3041", "url": "https://access.redhat.com/errata/RHSA-2020:3041" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1831868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831868" }, { "category": "external", "summary": "1832530", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1832530" }, { "category": "external", "summary": "1836244", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1836244" }, { "category": "external", "summary": "1842525", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1842525" }, { "category": "external", "summary": "1845840", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845840" }, { "category": "external", "summary": "1845867", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845867" }, { "category": "external", "summary": "1845868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845868" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_3041.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2025-08-02T13:32:13+00:00", "generator": { "date": "2025-08-02T13:32:13+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2020:3041", "initial_release_date": "2020-07-21T14:33:53+00:00", "revision_history": [ { "date": "2020-07-21T14:33:53+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-07-21T14:33:53+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T13:32:13+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product": { "name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:8.0::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-80.27.1.el8_0.ppc64le", "product": { "name": "bpftool-0:4.18.0-80.27.1.el8_0.ppc64le", "product_id": "bpftool-0:4.18.0-80.27.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-80.27.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-80.27.1.el8_0.ppc64le", "product": { "name": "kernel-0:4.18.0-80.27.1.el8_0.ppc64le", "product_id": "kernel-0:4.18.0-80.27.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-80.27.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-80.27.1.el8_0.ppc64le", "product": { "name": "kernel-core-0:4.18.0-80.27.1.el8_0.ppc64le", "product_id": "kernel-core-0:4.18.0-80.27.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-80.27.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-80.27.1.el8_0.ppc64le", "product": { "name": "kernel-cross-headers-0:4.18.0-80.27.1.el8_0.ppc64le", "product_id": "kernel-cross-headers-0:4.18.0-80.27.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-80.27.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-80.27.1.el8_0.ppc64le", "product": { "name": "kernel-debug-0:4.18.0-80.27.1.el8_0.ppc64le", "product_id": "kernel-debug-0:4.18.0-80.27.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-80.27.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-80.27.1.el8_0.ppc64le", "product": { "name": "kernel-debug-core-0:4.18.0-80.27.1.el8_0.ppc64le", "product_id": "kernel-debug-core-0:4.18.0-80.27.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-80.27.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-80.27.1.el8_0.ppc64le", "product": { "name": "kernel-debug-devel-0:4.18.0-80.27.1.el8_0.ppc64le", "product_id": "kernel-debug-devel-0:4.18.0-80.27.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-80.27.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-80.27.1.el8_0.ppc64le", "product": { "name": "kernel-debug-modules-0:4.18.0-80.27.1.el8_0.ppc64le", "product_id": "kernel-debug-modules-0:4.18.0-80.27.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-80.27.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le", "product_id": "kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-80.27.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-80.27.1.el8_0.ppc64le", "product": { "name": "kernel-devel-0:4.18.0-80.27.1.el8_0.ppc64le", "product_id": "kernel-devel-0:4.18.0-80.27.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-80.27.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-80.27.1.el8_0.ppc64le", "product": { "name": "kernel-headers-0:4.18.0-80.27.1.el8_0.ppc64le", "product_id": "kernel-headers-0:4.18.0-80.27.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-80.27.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-80.27.1.el8_0.ppc64le", "product": { "name": "kernel-modules-0:4.18.0-80.27.1.el8_0.ppc64le", "product_id": "kernel-modules-0:4.18.0-80.27.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-80.27.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le", "product": { "name": "kernel-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le", "product_id": "kernel-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-80.27.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-80.27.1.el8_0.ppc64le", "product": { "name": "kernel-tools-0:4.18.0-80.27.1.el8_0.ppc64le", "product_id": "kernel-tools-0:4.18.0-80.27.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-80.27.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-80.27.1.el8_0.ppc64le", "product": { "name": "kernel-tools-libs-0:4.18.0-80.27.1.el8_0.ppc64le", "product_id": "kernel-tools-libs-0:4.18.0-80.27.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-80.27.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:4.18.0-80.27.1.el8_0.ppc64le", "product": { "name": "perf-0:4.18.0-80.27.1.el8_0.ppc64le", "product_id": "perf-0:4.18.0-80.27.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-80.27.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-80.27.1.el8_0.ppc64le", "product": { "name": "python3-perf-0:4.18.0-80.27.1.el8_0.ppc64le", "product_id": "python3-perf-0:4.18.0-80.27.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-80.27.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "product": { "name": "bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "product_id": "bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-80.27.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "product_id": "kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-80.27.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "product": { "name": "kernel-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "product_id": "kernel-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-80.27.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-80.27.1.el8_0.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-80.27.1.el8_0.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-80.27.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-80.27.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "product_id": "kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-80.27.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "product": { "name": "perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "product_id": "perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-80.27.1.el8_0?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "product": { "name": "python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "product_id": "python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-80.27.1.el8_0?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-80.27.1.el8_0.x86_64", "product": { "name": "bpftool-0:4.18.0-80.27.1.el8_0.x86_64", "product_id": "bpftool-0:4.18.0-80.27.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-80.27.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-80.27.1.el8_0.x86_64", "product": { "name": "kernel-0:4.18.0-80.27.1.el8_0.x86_64", "product_id": "kernel-0:4.18.0-80.27.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-80.27.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-80.27.1.el8_0.x86_64", "product": { "name": "kernel-core-0:4.18.0-80.27.1.el8_0.x86_64", "product_id": "kernel-core-0:4.18.0-80.27.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-80.27.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-80.27.1.el8_0.x86_64", "product": { "name": "kernel-cross-headers-0:4.18.0-80.27.1.el8_0.x86_64", "product_id": "kernel-cross-headers-0:4.18.0-80.27.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-80.27.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-80.27.1.el8_0.x86_64", "product": { "name": "kernel-debug-0:4.18.0-80.27.1.el8_0.x86_64", "product_id": "kernel-debug-0:4.18.0-80.27.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-80.27.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-80.27.1.el8_0.x86_64", "product": { "name": "kernel-debug-core-0:4.18.0-80.27.1.el8_0.x86_64", "product_id": "kernel-debug-core-0:4.18.0-80.27.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-80.27.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-80.27.1.el8_0.x86_64", "product": { "name": "kernel-debug-devel-0:4.18.0-80.27.1.el8_0.x86_64", "product_id": "kernel-debug-devel-0:4.18.0-80.27.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-80.27.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-80.27.1.el8_0.x86_64", "product": { "name": "kernel-debug-modules-0:4.18.0-80.27.1.el8_0.x86_64", "product_id": "kernel-debug-modules-0:4.18.0-80.27.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-80.27.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64", "product_id": "kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-80.27.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-80.27.1.el8_0.x86_64", "product": { "name": "kernel-devel-0:4.18.0-80.27.1.el8_0.x86_64", "product_id": "kernel-devel-0:4.18.0-80.27.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-80.27.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-80.27.1.el8_0.x86_64", "product": { "name": "kernel-headers-0:4.18.0-80.27.1.el8_0.x86_64", "product_id": "kernel-headers-0:4.18.0-80.27.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-80.27.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-80.27.1.el8_0.x86_64", "product": { "name": "kernel-modules-0:4.18.0-80.27.1.el8_0.x86_64", "product_id": "kernel-modules-0:4.18.0-80.27.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-80.27.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64", "product": { "name": "kernel-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64", "product_id": "kernel-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-80.27.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-80.27.1.el8_0.x86_64", "product": { "name": "kernel-tools-0:4.18.0-80.27.1.el8_0.x86_64", "product_id": "kernel-tools-0:4.18.0-80.27.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-80.27.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-80.27.1.el8_0.x86_64", "product": { "name": "kernel-tools-libs-0:4.18.0-80.27.1.el8_0.x86_64", "product_id": "kernel-tools-libs-0:4.18.0-80.27.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-80.27.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:4.18.0-80.27.1.el8_0.x86_64", "product": { "name": "perf-0:4.18.0-80.27.1.el8_0.x86_64", "product_id": "perf-0:4.18.0-80.27.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-80.27.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-80.27.1.el8_0.x86_64", "product": { "name": "python3-perf-0:4.18.0-80.27.1.el8_0.x86_64", "product_id": "python3-perf-0:4.18.0-80.27.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-80.27.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "product": { "name": "bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "product_id": "bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-80.27.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "product_id": "kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-80.27.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "product": { "name": "kernel-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "product_id": "kernel-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-80.27.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:4.18.0-80.27.1.el8_0.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-80.27.1.el8_0.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-80.27.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-80.27.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "product_id": "kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-80.27.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "product": { "name": "perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "product_id": "perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-80.27.1.el8_0?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "product": { "name": "python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "product_id": "python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-80.27.1.el8_0?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:4.18.0-80.27.1.el8_0.src", "product": { "name": "kernel-0:4.18.0-80.27.1.el8_0.src", "product_id": "kernel-0:4.18.0-80.27.1.el8_0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-80.27.1.el8_0?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:4.18.0-80.27.1.el8_0.noarch", "product": { "name": "kernel-abi-whitelists-0:4.18.0-80.27.1.el8_0.noarch", "product_id": "kernel-abi-whitelists-0:4.18.0-80.27.1.el8_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-80.27.1.el8_0?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:4.18.0-80.27.1.el8_0.noarch", "product": { "name": "kernel-doc-0:4.18.0-80.27.1.el8_0.noarch", "product_id": "kernel-doc-0:4.18.0-80.27.1.el8_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@4.18.0-80.27.1.el8_0?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-80.27.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.27.1.el8_0.ppc64le" }, "product_reference": "bpftool-0:4.18.0-80.27.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-80.27.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.27.1.el8_0.x86_64" }, "product_reference": "bpftool-0:4.18.0-80.27.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le" }, "product_reference": "bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-80.27.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.ppc64le" }, "product_reference": "kernel-0:4.18.0-80.27.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-80.27.1.el8_0.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.src" }, "product_reference": "kernel-0:4.18.0-80.27.1.el8_0.src", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-80.27.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.x86_64" }, "product_reference": "kernel-0:4.18.0-80.27.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.18.0-80.27.1.el8_0.noarch as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.27.1.el8_0.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.18.0-80.27.1.el8_0.noarch", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-80.27.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.27.1.el8_0.ppc64le" }, "product_reference": "kernel-core-0:4.18.0-80.27.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-80.27.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.27.1.el8_0.x86_64" }, "product_reference": "kernel-core-0:4.18.0-80.27.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-80.27.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.27.1.el8_0.ppc64le" }, "product_reference": "kernel-cross-headers-0:4.18.0-80.27.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-80.27.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.27.1.el8_0.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-80.27.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-80.27.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.27.1.el8_0.ppc64le" }, "product_reference": "kernel-debug-0:4.18.0-80.27.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-80.27.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.27.1.el8_0.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-80.27.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-80.27.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.27.1.el8_0.ppc64le" }, "product_reference": "kernel-debug-core-0:4.18.0-80.27.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-80.27.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.27.1.el8_0.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-80.27.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-80.27.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.27.1.el8_0.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.18.0-80.27.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-80.27.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.27.1.el8_0.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-80.27.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-80.27.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.27.1.el8_0.ppc64le" }, "product_reference": "kernel-debug-modules-0:4.18.0-80.27.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-80.27.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.27.1.el8_0.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-80.27.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-80.27.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.27.1.el8_0.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-80.27.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-80.27.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.27.1.el8_0.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-80.27.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-80.27.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.27.1.el8_0.ppc64le" }, "product_reference": "kernel-devel-0:4.18.0-80.27.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-80.27.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.27.1.el8_0.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-80.27.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-80.27.1.el8_0.noarch as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.27.1.el8_0.noarch" }, "product_reference": "kernel-doc-0:4.18.0-80.27.1.el8_0.noarch", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-80.27.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.27.1.el8_0.ppc64le" }, "product_reference": "kernel-headers-0:4.18.0-80.27.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-80.27.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.27.1.el8_0.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-80.27.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-80.27.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.27.1.el8_0.ppc64le" }, "product_reference": "kernel-modules-0:4.18.0-80.27.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-80.27.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.27.1.el8_0.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-80.27.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le" }, "product_reference": "kernel-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-80.27.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.27.1.el8_0.ppc64le" }, "product_reference": "kernel-tools-0:4.18.0-80.27.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-80.27.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.27.1.el8_0.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-80.27.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-80.27.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.27.1.el8_0.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.18.0-80.27.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-80.27.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.27.1.el8_0.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-80.27.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-80.27.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.27.1.el8_0.ppc64le" }, "product_reference": "perf-0:4.18.0-80.27.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-80.27.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.27.1.el8_0.x86_64" }, "product_reference": "perf-0:4.18.0-80.27.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le" }, "product_reference": "perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-80.27.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.27.1.el8_0.ppc64le" }, "product_reference": "python3-perf-0:4.18.0-80.27.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-80.27.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.27.1.el8_0.x86_64" }, "product_reference": "python3-perf-0:4.18.0-80.27.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)", "product_id": "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "relates_to_product_reference": "BaseOS-8.0.0.Z.E4S" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Fan Yang" ] } ], "cve": "CVE-2020-10757", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2020-05-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1842525" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: kernel: DAX hugepages not considered during mremap", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue requires access to a DAX enabled storage.\n\nThis issue affects Red Hat Enterprise Linux 7 kernels starting with kernel-3.10.0-862, that is Red Hat Enterprise Linux 7.5 GA kernel. Red Hat Enterprise Linux 7 kernels prior to that version are not affected as they did not include the functionality that enabled this issue to be exploited.\n\nRed Hat Product Security is aware of this issue. Updates will be released as they become available.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.src", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.27.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.27.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10757" }, { "category": "external", "summary": "RHBZ#1842525", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1842525" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10757", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10757" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10757", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10757" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5bfea2d9b17f1034a68147a8b03b9789af5700f9", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5bfea2d9b17f1034a68147a8b03b9789af5700f9" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2020/06/04/4", "url": "https://www.openwall.com/lists/oss-security/2020/06/04/4" } ], "release_date": "2020-06-04T09:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-21T14:33:53+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.src", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.27.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.27.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:3041" }, { "category": "workaround", "details": "Do not use DAX enabled storage.", "product_ids": [ "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.src", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.27.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.27.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.src", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.27.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.27.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: kernel: DAX hugepages not considered during mremap" }, { "cve": "CVE-2020-10766", "cwe": { "id": "CWE-440", "name": "Expected Behavior Violation" }, "discovery_date": "2020-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1845840" } ], "notes": [ { "category": "description", "text": "A logic bug flaw was found in the Linux kernel\u2019s implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Rogue cross-process SSBD shutdown. Linux scheduler logical bug allows an attacker to turn off the SSBD protection.", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having Important impact because it can be used to disable Spectre v4, which has a rating of Important.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.src", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.27.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.27.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10766" }, { "category": "external", "summary": "RHBZ#1845840", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845840" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10766", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10766" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10766", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10766" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dbbe2ad02e9df26e372f38cc3e70dab9222c832e", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dbbe2ad02e9df26e372f38cc3e70dab9222c832e" } ], "release_date": "2020-06-09T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-21T14:33:53+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.src", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.27.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.27.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:3041" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.", "product_ids": [ "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.src", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.27.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.27.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.src", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.27.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.27.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Rogue cross-process SSBD shutdown. Linux scheduler logical bug allows an attacker to turn off the SSBD protection." }, { "cve": "CVE-2020-10767", "cwe": { "id": "CWE-440", "name": "Expected Behavior Violation" }, "discovery_date": "2020-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1845867" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available.", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having Important impact, because it enables exploitation of the previous Spectre v2 attack, which has a rating of Important.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.src", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.27.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.27.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10767" }, { "category": "external", "summary": "RHBZ#1845867", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845867" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10767", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10767" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10767", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10767" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=21998a351512eba4ed5969006f0c55882d995ada", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=21998a351512eba4ed5969006f0c55882d995ada" } ], "release_date": "2020-06-09T14:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-21T14:33:53+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.src", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.27.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.27.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:3041" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.", "product_ids": [ "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.src", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.27.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.27.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.src", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.27.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.27.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available." }, { "cve": "CVE-2020-10768", "cwe": { "id": "CWE-440", "name": "Expected Behavior Violation" }, "discovery_date": "2020-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1845868" } ], "notes": [ { "category": "description", "text": "A flaw was found in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command.", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having Important impact, because it enables exploitation of the previous Spectre v2 attack, which has a rating of Important.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.src", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.27.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.27.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10768" }, { "category": "external", "summary": "RHBZ#1845868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845868" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10768", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10768" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10768", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10768" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4d8df8cbb9156b0a0ab3f802b80cb5db57acc0bf", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4d8df8cbb9156b0a0ab3f802b80cb5db57acc0bf" } ], "release_date": "2020-06-09T14:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-21T14:33:53+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.src", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.27.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.27.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:3041" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.", "product_ids": [ "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.src", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.27.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.27.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.src", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.27.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.27.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command." }, { "cve": "CVE-2020-12653", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2020-05-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1831868" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the mwifiex_cmd_append_vsie_tlv() in Linux kernel\u0027s Marvell WiFi-Ex driver handled vendor specific information elements. A local user could use this flaw to escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.src", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.27.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.27.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12653" }, { "category": "external", "summary": "RHBZ#1831868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831868" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12653", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12653" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12653", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12653" } ], "release_date": "2020-01-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-21T14:33:53+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.src", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.27.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.27.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:3041" }, { "category": "workaround", "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module mwifiex. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278", "product_ids": [ "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.src", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.27.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.27.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.src", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.27.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.27.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c" }, { "cve": "CVE-2020-12654", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2020-05-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1832530" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. The Marvell mwifiex driver allows a remote WiFi access point to trigger a heap-based memory buffer overflow due to an incorrect memcpy operation. The highest threat from this vulnerability is to data integrity and system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.src", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.27.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.27.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12654" }, { "category": "external", "summary": "RHBZ#1832530", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1832530" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12654", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12654" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12654", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12654" } ], "release_date": "2020-01-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-21T14:33:53+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.src", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.27.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.27.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:3041" }, { "category": "workaround", "details": "In order to mitigate this issue, it is possible to prevent the affected code from being loaded by blacklisting the kernel module mwifiex. For instructions relating to how to blacklist a kernel module, refer to: https://access.redhat.com/solutions/41278", "product_ids": [ "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.src", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.27.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.27.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.src", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.27.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.27.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c" }, { "cve": "CVE-2020-12888", "cwe": { "id": "CWE-248", "name": "Uncaught Exception" }, "discovery_date": "2020-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1836244" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel, where it allows userspace processes, for example, a guest VM, to directly access h/w devices via its VFIO driver modules. The VFIO modules allow users to enable or disable access to the devices\u0027 MMIO memory address spaces. If a user attempts to access the read/write devices\u0027 MMIO address space when it is disabled, some h/w devices issue an interrupt to the CPU to indicate a fatal error condition, crashing the system. This flaw allows a guest user or process to crash the host system resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of the kernel package as shipped with Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG 2.\nThis issue affects the versions of the kernel package as shipped with Red Hat Enterprise Linux 7 and 8. Future kernel updates for Red Hat Enterprise Linux 7 and 8 may address this issue.\n\nA regression of CVE-2020-12888 has been reintroduced in RHEL 9.4\u20139.6 due to the backport of the fork: defer linking file vma patch (related to CVE-2024-27022). This flaw allows a privileged VFIO userspace process to retain stale MMIO mappings after a fork(), leading to host crashes if the child process accesses the device after MMIO has been disabled. While the bug was transient in upstream (v6.9 only), it remains present in multiple RHEL9 releases. Only users with high privileges and access to a VFIO-assigned device can exploit this, and no impact is observed in standard QEMU or DPDK configurations. Regarding this regression, the status of RHEL-9 fixes (fixed for 9.7 and 9.6 for the 21 Jul 2025 and pending for 9.4):\nRHEL-9.7: RHEL-73613 (kernel-5.14.0-578.el9)\nRHEL-9.6.z: RHEL-85623 (kernel-5.14.0-570.26.1.el9_6)\nRHEL-9.5.z: N/A\nRHEL-9.4.z: RHEL-85621 (under development)\nThe 9.7 and 9.6.z fixes backport the upstream solution while the 9.4.z\nfix is pursuing a RHEL specific fix to reduce the scope and risk.\nRHEL-10 is not affected, because branched at 6.12.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.src", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.27.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.27.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12888" }, { "category": "external", "summary": "RHBZ#1836244", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1836244" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12888", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12888" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12888", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12888" } ], "release_date": "2020-05-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-21T14:33:53+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.src", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.27.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.27.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:3041" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.src", "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.27.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.27.1.el8_0.noarch", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.27.1.el8_0.x86_64", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.ppc64le", "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.27.1.el8_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario" } ] }
rhsa-2020:3222
Vulnerability from csaf_redhat
Published
2020-07-29 19:40
Modified
2025-08-03 23:04
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: use-after-free in sound/core/timer.c (CVE-2019-19807)
* kernel: kernel: DAX hugepages not considered during mremap (CVE-2020-10757)
* kernel: Rogue cross-process SSBD shutdown. Linux scheduler logical bug allows an attacker to turn off the SSBD protection. (CVE-2020-10766)
* kernel: Indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available. (CVE-2020-10767)
* kernel: Indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command. (CVE-2020-10768)
* kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c (CVE-2020-12653)
* kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c (CVE-2020-12654)
* Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario (CVE-2020-12888)
* kernel: lockdown: bypass through ACPI write via efivar_ssdt (CVE-2019-20908)
* kernel: lockdown: bypass through ACPI write via acpi_configfs (CVE-2020-15780)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* [DELL EMC 8.1 BUG] : Observing Multiple "hw csum failure" while installing RHEL 8.1 on iSCSI LUN (BZ#1821374)
* kernel: provide infrastructure to support dual-signing of the kernel (foundation to help address CVE-2020-10713) (BZ#1837432)
* deadlock between modprobe and netns exit (BZ#1845163)
* exit_boot failed when install RHEL8.1 (BZ#1846179)
* http request is taking more time for endpoint running on different host via nodeport service (BZ#1847127)
* RHEL8.1 - s390/cio: fix virtio-ccw DMA without PV (BZ#1847534)
* RHEL8.1 - zEDC problems on z14 (genwqe/pci) (BZ#1847939)
* NVMe/FC with DM-MP unexpected I/O failure during "transitioning" [EIOP-8345] (BZ#1854678)
* Backport conntrack race condition fixes (BZ#1854953)
* nf_conntrack module unload fail and refcount become to negative (BZ#1854954)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: use-after-free in sound/core/timer.c (CVE-2019-19807)\n\n* kernel: kernel: DAX hugepages not considered during mremap (CVE-2020-10757)\n\n* kernel: Rogue cross-process SSBD shutdown. Linux scheduler logical bug allows an attacker to turn off the SSBD protection. (CVE-2020-10766)\n\n* kernel: Indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available. (CVE-2020-10767)\n\n* kernel: Indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command. (CVE-2020-10768)\n\n* kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c (CVE-2020-12653)\n\n* kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c (CVE-2020-12654)\n\n* Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario (CVE-2020-12888)\n\n* kernel: lockdown: bypass through ACPI write via efivar_ssdt (CVE-2019-20908)\n\n* kernel: lockdown: bypass through ACPI write via acpi_configfs (CVE-2020-15780)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [DELL EMC 8.1 BUG] : Observing Multiple \"hw csum failure\" while installing RHEL 8.1 on iSCSI LUN (BZ#1821374)\n\n* kernel: provide infrastructure to support dual-signing of the kernel (foundation to help address CVE-2020-10713) (BZ#1837432)\n\n* deadlock between modprobe and netns exit (BZ#1845163)\n\n* exit_boot failed when install RHEL8.1 (BZ#1846179)\n\n* http request is taking more time for endpoint running on different host via nodeport service (BZ#1847127)\n\n* RHEL8.1 - s390/cio: fix virtio-ccw DMA without PV (BZ#1847534)\n\n* RHEL8.1 - zEDC problems on z14 (genwqe/pci) (BZ#1847939)\n\n* NVMe/FC with DM-MP unexpected I/O failure during \"transitioning\" [EIOP-8345] (BZ#1854678)\n\n* Backport conntrack race condition fixes (BZ#1854953)\n\n* nf_conntrack module unload fail and refcount become to negative (BZ#1854954)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:3222", "url": "https://access.redhat.com/errata/RHSA-2020:3222" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/grub2bootloader", "url": "https://access.redhat.com/security/vulnerabilities/grub2bootloader" }, { "category": "external", "summary": "1786078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786078" }, { "category": "external", "summary": "1831868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831868" }, { "category": "external", "summary": "1832530", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1832530" }, { "category": "external", "summary": "1836244", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1836244" }, { "category": "external", "summary": "1842525", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1842525" }, { "category": "external", "summary": "1845840", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845840" }, { "category": "external", "summary": "1845867", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845867" }, { "category": "external", "summary": "1845868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845868" }, { "category": "external", "summary": "1852942", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1852942" }, { "category": "external", "summary": "1852962", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1852962" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_3222.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2025-08-03T23:04:47+00:00", "generator": { "date": "2025-08-03T23:04:47+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2020:3222", "initial_release_date": "2020-07-29T19:40:20+00:00", "revision_history": [ { "date": "2020-07-29T19:40:20+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-07-29T19:40:20+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T23:04:47+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product": { "name": "Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.1::crb" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product": { "name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:8.1::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "product_id": "kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.24.2.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "product": { "name": "bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "product_id": "bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.24.2.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "product_id": "kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.24.2.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "product": { "name": "kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "product_id": "kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.24.2.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "product": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-147.24.2.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "product_id": "kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.24.2.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "product": { "name": "perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "product_id": "perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.24.2.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "product": { "name": "python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "product_id": "python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.24.2.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "product": { "name": "bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "product_id": "bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-147.24.2.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-147.24.2.el8_1.aarch64", "product": { "name": "kernel-0:4.18.0-147.24.2.el8_1.aarch64", "product_id": "kernel-0:4.18.0-147.24.2.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-147.24.2.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "product": { "name": "kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "product_id": "kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.24.2.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "product": { "name": "kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "product_id": "kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.24.2.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "product": { "name": "kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "product_id": "kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.24.2.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "product": { "name": "kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "product_id": "kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.24.2.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "product": { "name": "kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "product_id": "kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.24.2.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "product": { "name": "kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "product_id": "kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.24.2.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "product_id": "kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.24.2.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "product": { "name": "kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "product_id": "kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.24.2.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "product": { "name": "kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "product_id": "kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.24.2.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "product": { "name": "kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "product_id": "kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.24.2.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "product": { "name": "kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "product_id": "kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.24.2.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "product": { "name": "kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "product_id": "kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.24.2.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "product": { "name": "kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "product_id": "kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.24.2.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "perf-0:4.18.0-147.24.2.el8_1.aarch64", "product": { "name": "perf-0:4.18.0-147.24.2.el8_1.aarch64", "product_id": "perf-0:4.18.0-147.24.2.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-147.24.2.el8_1?arch=aarch64" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "product": { "name": "python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "product_id": "python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.24.2.el8_1?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "product_id": "kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.24.2.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "product": { "name": "bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "product_id": "bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.24.2.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "product_id": "kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.24.2.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "product": { "name": "kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "product_id": "kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.24.2.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-147.24.2.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "product_id": "kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.24.2.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "product": { "name": "perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "product_id": "perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.24.2.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "product": { "name": "python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "product_id": "python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.24.2.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "product": { "name": "bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "product_id": "bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-147.24.2.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "product": { "name": "kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "product_id": "kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-147.24.2.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "product": { "name": "kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "product_id": "kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.24.2.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "product": { "name": "kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "product_id": "kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.24.2.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "product": { "name": "kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "product_id": "kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.24.2.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "product": { "name": "kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "product_id": "kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.24.2.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "product": { "name": "kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "product_id": "kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.24.2.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "product": { "name": "kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "product_id": "kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.24.2.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "product_id": "kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.24.2.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "product": { "name": "kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "product_id": "kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.24.2.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "product": { "name": "kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "product_id": "kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.24.2.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "product": { "name": "kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "product_id": "kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.24.2.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "product": { "name": "kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "product_id": "kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.24.2.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "product": { "name": "kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "product_id": "kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.24.2.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "product": { "name": "kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "product_id": "kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.24.2.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:4.18.0-147.24.2.el8_1.ppc64le", "product": { "name": "perf-0:4.18.0-147.24.2.el8_1.ppc64le", "product_id": "perf-0:4.18.0-147.24.2.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-147.24.2.el8_1?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "product": { "name": "python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "product_id": "python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.24.2.el8_1?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "product_id": "kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.24.2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "product": { "name": "bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "product_id": "bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.24.2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "product_id": "kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.24.2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "product": { "name": "kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "product_id": "kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.24.2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-147.24.2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "product_id": "kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.24.2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "product": { "name": "perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "product_id": "perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.24.2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "product": { "name": "python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "product_id": "python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.24.2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "product": { "name": "bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "product_id": "bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-147.24.2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-147.24.2.el8_1.x86_64", "product": { "name": "kernel-0:4.18.0-147.24.2.el8_1.x86_64", "product_id": "kernel-0:4.18.0-147.24.2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-147.24.2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "product": { "name": "kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "product_id": "kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.24.2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "product": { "name": "kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "product_id": "kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.24.2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "product": { "name": "kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "product_id": "kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.24.2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "product": { "name": "kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "product_id": "kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.24.2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "product": { "name": "kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "product_id": "kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.24.2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "product": { "name": "kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "product_id": "kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.24.2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "product_id": "kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.24.2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "product": { "name": "kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "product_id": "kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.24.2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "product": { "name": "kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "product_id": "kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.24.2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "product": { "name": "kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "product_id": "kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.24.2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "product": { "name": "kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "product_id": "kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.24.2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "product": { "name": "kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "product_id": "kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.24.2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "product": { "name": "kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "product_id": "kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.24.2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:4.18.0-147.24.2.el8_1.x86_64", "product": { "name": "perf-0:4.18.0-147.24.2.el8_1.x86_64", "product_id": "perf-0:4.18.0-147.24.2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-147.24.2.el8_1?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "product": { "name": "python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "product_id": "python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.24.2.el8_1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-147.24.2.el8_1.s390x", "product": { "name": "bpftool-0:4.18.0-147.24.2.el8_1.s390x", "product_id": "bpftool-0:4.18.0-147.24.2.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-147.24.2.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-147.24.2.el8_1.s390x", "product": { "name": "kernel-0:4.18.0-147.24.2.el8_1.s390x", "product_id": "kernel-0:4.18.0-147.24.2.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-147.24.2.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "product": { "name": "kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "product_id": "kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.24.2.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "product": { "name": "kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "product_id": "kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.24.2.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "product": { "name": "kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "product_id": "kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.24.2.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "product": { "name": "kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "product_id": "kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.24.2.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "product": { "name": "kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "product_id": "kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.24.2.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "product": { "name": "kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "product_id": "kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.24.2.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "product_id": "kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.24.2.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "product": { "name": "kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "product_id": "kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.24.2.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "product": { "name": "kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "product_id": "kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.24.2.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "product": { "name": "kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "product_id": "kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.24.2.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "product": { "name": "kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "product_id": "kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.24.2.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "product": { "name": "kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "product_id": "kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.24.2.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "product": { "name": "kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "product_id": "kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-147.24.2.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "product": { "name": "kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "product_id": "kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-147.24.2.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "product": { "name": "kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "product_id": "kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-147.24.2.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "product": { "name": "kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "product_id": "kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-147.24.2.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "product": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-147.24.2.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:4.18.0-147.24.2.el8_1.s390x", "product": { "name": "perf-0:4.18.0-147.24.2.el8_1.s390x", "product_id": "perf-0:4.18.0-147.24.2.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-147.24.2.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "product": { "name": "python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "product_id": "python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.24.2.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "product": { "name": "bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "product_id": "bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.24.2.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "product_id": "kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.24.2.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "product": { "name": "kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "product_id": "kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.24.2.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "product_id": "kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-147.24.2.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "product_id": "kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.24.2.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "product": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-147.24.2.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "product": { "name": "perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "product_id": "perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.24.2.el8_1?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "product": { "name": "python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "product_id": "python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.24.2.el8_1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-0:4.18.0-147.24.2.el8_1.src", "product": { "name": "kernel-0:4.18.0-147.24.2.el8_1.src", "product_id": "kernel-0:4.18.0-147.24.2.el8_1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-147.24.2.el8_1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "product": { "name": "kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "product_id": "kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-147.24.2.el8_1?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "product": { "name": "kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "product_id": "kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@4.18.0-147.24.2.el8_1?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-147.24.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64" }, "product_reference": "bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-147.24.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le" }, "product_reference": "bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-147.24.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x" }, "product_reference": "bpftool-0:4.18.0-147.24.2.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-147.24.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64" }, "product_reference": "bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le" }, "product_reference": "bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x" }, "product_reference": "bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-147.24.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64" }, "product_reference": "kernel-0:4.18.0-147.24.2.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-147.24.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le" }, "product_reference": "kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-147.24.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x" }, "product_reference": "kernel-0:4.18.0-147.24.2.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-147.24.2.el8_1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src" }, "product_reference": "kernel-0:4.18.0-147.24.2.el8_1.src", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-147.24.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64" }, "product_reference": "kernel-0:4.18.0-147.24.2.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-147.24.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64" }, "product_reference": "kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le" }, "product_reference": "kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-147.24.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x" }, "product_reference": "kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-147.24.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64" }, "product_reference": "kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64" }, "product_reference": "kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le" }, "product_reference": "kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x" }, "product_reference": "kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64" }, "product_reference": "kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le" }, "product_reference": "kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-147.24.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x" }, "product_reference": "kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64" }, "product_reference": "kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le" }, "product_reference": "kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x" }, "product_reference": "kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64" }, "product_reference": "kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x" }, "product_reference": "kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64" }, "product_reference": "kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le" }, "product_reference": "kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x" }, "product_reference": "kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64" }, "product_reference": "kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x" }, "product_reference": "kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64" }, "product_reference": "kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le" }, "product_reference": "kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-147.24.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x" }, "product_reference": "kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-147.24.2.el8_1.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch" }, "product_reference": "kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64" }, "product_reference": "kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le" }, "product_reference": "kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-147.24.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x" }, "product_reference": "kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64" }, "product_reference": "kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le" }, "product_reference": "kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-147.24.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x" }, "product_reference": "kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64" }, "product_reference": "kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le" }, "product_reference": "kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x" }, "product_reference": "kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64" }, "product_reference": "kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le" }, "product_reference": "kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-147.24.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x" }, "product_reference": "kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64" }, "product_reference": "kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x" }, "product_reference": "kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x" }, "product_reference": "kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-147.24.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64" }, "product_reference": "perf-0:4.18.0-147.24.2.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-147.24.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le" }, "product_reference": "perf-0:4.18.0-147.24.2.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-147.24.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x" }, "product_reference": "perf-0:4.18.0-147.24.2.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-147.24.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64" }, "product_reference": "perf-0:4.18.0-147.24.2.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64" }, "product_reference": "perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le" }, "product_reference": "perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x" }, "product_reference": "perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-147.24.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64" }, "product_reference": "python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le" }, "product_reference": "python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-147.24.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x" }, "product_reference": "python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-147.24.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64" }, "product_reference": "python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.1)", "product_id": "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "relates_to_product_reference": "BaseOS-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-147.24.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64" }, "product_reference": "bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-147.24.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le" }, "product_reference": "bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-147.24.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x" }, "product_reference": "bpftool-0:4.18.0-147.24.2.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-147.24.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64" }, "product_reference": "bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le" }, "product_reference": "bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x" }, "product_reference": "bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-147.24.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64" }, "product_reference": "kernel-0:4.18.0-147.24.2.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-147.24.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le" }, "product_reference": "kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-147.24.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x" }, "product_reference": "kernel-0:4.18.0-147.24.2.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-147.24.2.el8_1.src as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src" }, "product_reference": "kernel-0:4.18.0-147.24.2.el8_1.src", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-147.24.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64" }, "product_reference": "kernel-0:4.18.0-147.24.2.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-147.24.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64" }, "product_reference": "kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le" }, "product_reference": "kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-147.24.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x" }, "product_reference": "kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-147.24.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64" }, "product_reference": "kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64" }, "product_reference": "kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le" }, "product_reference": "kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x" }, "product_reference": "kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64" }, "product_reference": "kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le" }, "product_reference": "kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-147.24.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x" }, "product_reference": "kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64" }, "product_reference": "kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le" }, "product_reference": "kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x" }, "product_reference": "kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64" }, "product_reference": "kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x" }, "product_reference": "kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64" }, "product_reference": "kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le" }, "product_reference": "kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x" }, "product_reference": "kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64" }, "product_reference": "kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x" }, "product_reference": "kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64" }, "product_reference": "kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le" }, "product_reference": "kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-147.24.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x" }, "product_reference": "kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-147.24.2.el8_1.noarch as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch" }, "product_reference": "kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64" }, "product_reference": "kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le" }, "product_reference": "kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-147.24.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x" }, "product_reference": "kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64" }, "product_reference": "kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le" }, "product_reference": "kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-147.24.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x" }, "product_reference": "kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64" }, "product_reference": "kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le" }, "product_reference": "kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x" }, "product_reference": "kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64" }, "product_reference": "kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le" }, "product_reference": "kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-147.24.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x" }, "product_reference": "kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64" }, "product_reference": "kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x" }, "product_reference": "kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x" }, "product_reference": "kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-147.24.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64" }, "product_reference": "perf-0:4.18.0-147.24.2.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-147.24.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le" }, "product_reference": "perf-0:4.18.0-147.24.2.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-147.24.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x" }, "product_reference": "perf-0:4.18.0-147.24.2.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-147.24.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64" }, "product_reference": "perf-0:4.18.0-147.24.2.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64" }, "product_reference": "perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le" }, "product_reference": "perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x" }, "product_reference": "perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-147.24.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64" }, "product_reference": "python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le" }, "product_reference": "python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-147.24.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x" }, "product_reference": "python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-147.24.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64" }, "product_reference": "python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v. 8.1)", "product_id": "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "relates_to_product_reference": "CRB-8.1.0.Z.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-19807", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2019-12-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1786078" } ], "notes": [ { "category": "description", "text": "A memory flaw was found in the ALSA subsystem of the Linux kernel. The struct snd_timer_instance function fails the timer-\u003emax_instances check leading to an invalid address. This could lead to a use-after-free vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in sound/core/timer.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affected Linux kernel versions as shipped with Red Hat Enterprise Linux 8 starting with RHEL-8.1.0, that is Red Hat Enterprise Linux 8.1 GA kernel version.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-19807" }, { "category": "external", "summary": "RHBZ#1786078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1786078" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-19807", "url": "https://www.cve.org/CVERecord?id=CVE-2019-19807" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-19807", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19807" } ], "release_date": "2019-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T19:40:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:3222" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.", "product_ids": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: use-after-free in sound/core/timer.c" }, { "cve": "CVE-2019-20908", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2020-06-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1852942" } ], "notes": [ { "category": "description", "text": "A flaw was found in how the ACPI table loading through the EFI variable (and the related efivar_ssdt boot option) was handled when the Linux kernel was locked down. This flaw allows a (root) privileged local user to circumvent the kernel lockdown restrictions. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: lockdown: bypass through ACPI write via efivar_ssdt", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Moderate impact because of the privileges required for exploitation.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-20908" }, { "category": "external", "summary": "RHBZ#1852942", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1852942" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-20908", "url": "https://www.cve.org/CVERecord?id=CVE-2019-20908" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-20908", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-20908" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1957a85b0032a81e6482ca4aab883643b8dae06e", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1957a85b0032a81e6482ca4aab883643b8dae06e" }, { "category": "external", "summary": "https://git.zx2c4.com/american-unsigned-language/tree/american-unsigned-language.sh", "url": "https://git.zx2c4.com/american-unsigned-language/tree/american-unsigned-language.sh" }, { "category": "external", "summary": "https://lore.kernel.org/linux-efi/20200615202408.2242614-1-pjones@redhat.com/", "url": "https://lore.kernel.org/linux-efi/20200615202408.2242614-1-pjones@redhat.com/" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2020/06/14/1", "url": "https://www.openwall.com/lists/oss-security/2020/06/14/1" } ], "release_date": "2019-08-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T19:40:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:3222" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: lockdown: bypass through ACPI write via efivar_ssdt" }, { "acknowledgments": [ { "names": [ "Fan Yang" ] } ], "cve": "CVE-2020-10757", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2020-05-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1842525" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: kernel: DAX hugepages not considered during mremap", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue requires access to a DAX enabled storage.\n\nThis issue affects Red Hat Enterprise Linux 7 kernels starting with kernel-3.10.0-862, that is Red Hat Enterprise Linux 7.5 GA kernel. Red Hat Enterprise Linux 7 kernels prior to that version are not affected as they did not include the functionality that enabled this issue to be exploited.\n\nRed Hat Product Security is aware of this issue. Updates will be released as they become available.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10757" }, { "category": "external", "summary": "RHBZ#1842525", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1842525" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10757", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10757" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10757", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10757" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5bfea2d9b17f1034a68147a8b03b9789af5700f9", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5bfea2d9b17f1034a68147a8b03b9789af5700f9" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2020/06/04/4", "url": "https://www.openwall.com/lists/oss-security/2020/06/04/4" } ], "release_date": "2020-06-04T09:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T19:40:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:3222" }, { "category": "workaround", "details": "Do not use DAX enabled storage.", "product_ids": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: kernel: DAX hugepages not considered during mremap" }, { "cve": "CVE-2020-10766", "cwe": { "id": "CWE-440", "name": "Expected Behavior Violation" }, "discovery_date": "2020-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1845840" } ], "notes": [ { "category": "description", "text": "A logic bug flaw was found in the Linux kernel\u2019s implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Rogue cross-process SSBD shutdown. Linux scheduler logical bug allows an attacker to turn off the SSBD protection.", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having Important impact because it can be used to disable Spectre v4, which has a rating of Important.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10766" }, { "category": "external", "summary": "RHBZ#1845840", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845840" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10766", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10766" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10766", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10766" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dbbe2ad02e9df26e372f38cc3e70dab9222c832e", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dbbe2ad02e9df26e372f38cc3e70dab9222c832e" } ], "release_date": "2020-06-09T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T19:40:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:3222" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.", "product_ids": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Rogue cross-process SSBD shutdown. Linux scheduler logical bug allows an attacker to turn off the SSBD protection." }, { "cve": "CVE-2020-10767", "cwe": { "id": "CWE-440", "name": "Expected Behavior Violation" }, "discovery_date": "2020-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1845867" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available.", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having Important impact, because it enables exploitation of the previous Spectre v2 attack, which has a rating of Important.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10767" }, { "category": "external", "summary": "RHBZ#1845867", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845867" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10767", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10767" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10767", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10767" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=21998a351512eba4ed5969006f0c55882d995ada", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=21998a351512eba4ed5969006f0c55882d995ada" } ], "release_date": "2020-06-09T14:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T19:40:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:3222" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.", "product_ids": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available." }, { "cve": "CVE-2020-10768", "cwe": { "id": "CWE-440", "name": "Expected Behavior Violation" }, "discovery_date": "2020-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1845868" } ], "notes": [ { "category": "description", "text": "A flaw was found in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command.", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having Important impact, because it enables exploitation of the previous Spectre v2 attack, which has a rating of Important.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10768" }, { "category": "external", "summary": "RHBZ#1845868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845868" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10768", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10768" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10768", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10768" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4d8df8cbb9156b0a0ab3f802b80cb5db57acc0bf", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4d8df8cbb9156b0a0ab3f802b80cb5db57acc0bf" } ], "release_date": "2020-06-09T14:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T19:40:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:3222" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.", "product_ids": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command." }, { "cve": "CVE-2020-12653", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2020-05-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1831868" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the mwifiex_cmd_append_vsie_tlv() in Linux kernel\u0027s Marvell WiFi-Ex driver handled vendor specific information elements. A local user could use this flaw to escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12653" }, { "category": "external", "summary": "RHBZ#1831868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831868" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12653", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12653" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12653", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12653" } ], "release_date": "2020-01-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T19:40:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:3222" }, { "category": "workaround", "details": "In order to mitigate this issue it is possible to prevent the affected code from being loaded by blacklisting the kernel module mwifiex. For instructions relating to how to blacklist a kernel module refer to: https://access.redhat.com/solutions/41278", "product_ids": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c" }, { "cve": "CVE-2020-12654", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2020-05-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1832530" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. The Marvell mwifiex driver allows a remote WiFi access point to trigger a heap-based memory buffer overflow due to an incorrect memcpy operation. The highest threat from this vulnerability is to data integrity and system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12654" }, { "category": "external", "summary": "RHBZ#1832530", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1832530" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12654", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12654" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12654", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12654" } ], "release_date": "2020-01-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T19:40:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:3222" }, { "category": "workaround", "details": "In order to mitigate this issue, it is possible to prevent the affected code from being loaded by blacklisting the kernel module mwifiex. For instructions relating to how to blacklist a kernel module, refer to: https://access.redhat.com/solutions/41278", "product_ids": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c" }, { "cve": "CVE-2020-12888", "cwe": { "id": "CWE-248", "name": "Uncaught Exception" }, "discovery_date": "2020-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1836244" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel, where it allows userspace processes, for example, a guest VM, to directly access h/w devices via its VFIO driver modules. The VFIO modules allow users to enable or disable access to the devices\u0027 MMIO memory address spaces. If a user attempts to access the read/write devices\u0027 MMIO address space when it is disabled, some h/w devices issue an interrupt to the CPU to indicate a fatal error condition, crashing the system. This flaw allows a guest user or process to crash the host system resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of the kernel package as shipped with Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG 2.\nThis issue affects the versions of the kernel package as shipped with Red Hat Enterprise Linux 7 and 8. Future kernel updates for Red Hat Enterprise Linux 7 and 8 may address this issue.\n\nA regression of CVE-2020-12888 has been reintroduced in RHEL 9.4\u20139.6 due to the backport of the fork: defer linking file vma patch (related to CVE-2024-27022). This flaw allows a privileged VFIO userspace process to retain stale MMIO mappings after a fork(), leading to host crashes if the child process accesses the device after MMIO has been disabled. While the bug was transient in upstream (v6.9 only), it remains present in multiple RHEL9 releases. Only users with high privileges and access to a VFIO-assigned device can exploit this, and no impact is observed in standard QEMU or DPDK configurations. Regarding this regression, the status of RHEL-9 fixes (fixed for 9.7 and 9.6 for the 21 Jul 2025 and pending for 9.4):\nRHEL-9.7: RHEL-73613 (kernel-5.14.0-578.el9)\nRHEL-9.6.z: RHEL-85623 (kernel-5.14.0-570.26.1.el9_6)\nRHEL-9.5.z: N/A\nRHEL-9.4.z: RHEL-85621 (under development)\nThe 9.7 and 9.6.z fixes backport the upstream solution while the 9.4.z\nfix is pursuing a RHEL specific fix to reduce the scope and risk.\nRHEL-10 is not affected, because branched at 6.12.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-12888" }, { "category": "external", "summary": "RHBZ#1836244", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1836244" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-12888", "url": "https://www.cve.org/CVERecord?id=CVE-2020-12888" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-12888", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12888" } ], "release_date": "2020-05-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T19:40:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:3222" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario" }, { "cve": "CVE-2020-15780", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2020-06-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1852962" } ], "notes": [ { "category": "description", "text": "A flaw was found in how the ACPI table loading through acpi_configfs was handled when the kernel was locked down. This flaw allows a (root) privileged local user to circumvent the kernel lockdown restrictions. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: lockdown: bypass through ACPI write via acpi_configfs", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Moderate impact because of the privileges required for exploitation.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15780" }, { "category": "external", "summary": "RHBZ#1852962", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1852962" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15780", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15780" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15780", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15780" }, { "category": "external", "summary": "https://git.zx2c4.com/american-unsigned-language/tree/american-unsigned-language-2.sh", "url": "https://git.zx2c4.com/american-unsigned-language/tree/american-unsigned-language-2.sh" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2020/06/15/3", "url": "https://www.openwall.com/lists/oss-security/2020/06/15/3" } ], "release_date": "2020-06-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-29T19:40:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2020:3222" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "BaseOS-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "BaseOS-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:bpftool-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.src", "CRB-8.1.0.Z.EUS:kernel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-abi-whitelists-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-cross-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-core-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debug-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-doc-0:4.18.0-147.24.2.el8_1.noarch", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-headers-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-modules-extra-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-tools-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:kernel-tools-libs-devel-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-core-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-devel-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-0:4.18.0-147.24.2.el8_1.x86_64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.aarch64", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.ppc64le", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.s390x", "CRB-8.1.0.Z.EUS:python3-perf-debuginfo-0:4.18.0-147.24.2.el8_1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: lockdown: bypass through ACPI write via acpi_configfs" } ] }
rhsa-2020:3073
Vulnerability from csaf_redhat
Published
2020-07-21 16:26
Modified
2025-08-02 13:32
Summary
Red Hat Security Advisory: kpatch-patch security update
Notes
Topic
An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.
Security Fix(es):
* kernel: Rogue cross-process SSBD shutdown. Linux scheduler logical bug allows an attacker to turn off the SSBD protection. (CVE-2020-10766)
* kernel: Indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available. (CVE-2020-10767)
* kernel: Indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command. (CVE-2020-10768)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* kernel: Rogue cross-process SSBD shutdown. Linux scheduler logical bug allows an attacker to turn off the SSBD protection. (CVE-2020-10766)\n\n* kernel: Indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available. (CVE-2020-10767)\n\n* kernel: Indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command. (CVE-2020-10768)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:3073", "url": "https://access.redhat.com/errata/RHSA-2020:3073" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1845840", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845840" }, { "category": "external", "summary": "1845867", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845867" }, { "category": "external", "summary": "1845868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845868" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_3073.json" } ], "title": "Red Hat Security Advisory: kpatch-patch security update", "tracking": { "current_release_date": "2025-08-02T13:32:28+00:00", "generator": { "date": "2025-08-02T13:32:28+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2020:3073", "initial_release_date": "2020-07-21T16:26:56+00:00", "revision_history": [ { "date": "2020-07-21T16:26:56+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-07-21T16:26:56+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T13:32:28+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product": { "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kpatch-patch-4_18_0-193-0:1-5.el8.x86_64", "product": { "name": "kpatch-patch-4_18_0-193-0:1-5.el8.x86_64", "product_id": "kpatch-patch-4_18_0-193-0:1-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193@1-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193-debugsource-0:1-5.el8.x86_64", "product": { "name": "kpatch-patch-4_18_0-193-debugsource-0:1-5.el8.x86_64", "product_id": "kpatch-patch-4_18_0-193-debugsource-0:1-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193-debugsource@1-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193-debuginfo-0:1-5.el8.x86_64", "product": { "name": "kpatch-patch-4_18_0-193-debuginfo-0:1-5.el8.x86_64", "product_id": "kpatch-patch-4_18_0-193-debuginfo-0:1-5.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193-debuginfo@1-5.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_1_2-0:1-3.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_1_2-0:1-3.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_1_2-0:1-3.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_1_2@1-3.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_1_2-debugsource-0:1-3.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_1_2-debugsource-0:1-3.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_1_2-debugsource-0:1-3.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_1_2-debugsource@1-3.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_1_2-debuginfo-0:1-3.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_1_2-debuginfo-0:1-3.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_1_2-debuginfo-0:1-3.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_1_2-debuginfo@1-3.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_6_3-0:1-2.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_6_3-0:1-2.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_6_3-0:1-2.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_6_3@1-2.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_6_3-debugsource-0:1-2.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_6_3-debugsource-0:1-2.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_6_3-debugsource-0:1-2.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_6_3-debugsource@1-2.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-2.el8_2.x86_64", "product": { "name": "kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-2.el8_2.x86_64", "product_id": "kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-2.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_6_3-debuginfo@1-2.el8_2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kpatch-patch-4_18_0-193-0:1-5.el8.src", "product": { "name": "kpatch-patch-4_18_0-193-0:1-5.el8.src", "product_id": "kpatch-patch-4_18_0-193-0:1-5.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193@1-5.el8?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_1_2-0:1-3.el8_2.src", "product": { "name": "kpatch-patch-4_18_0-193_1_2-0:1-3.el8_2.src", "product_id": "kpatch-patch-4_18_0-193_1_2-0:1-3.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_1_2@1-3.el8_2?arch=src" } } }, { "category": "product_version", "name": "kpatch-patch-4_18_0-193_6_3-0:1-2.el8_2.src", "product": { "name": "kpatch-patch-4_18_0-193_6_3-0:1-2.el8_2.src", "product_id": "kpatch-patch-4_18_0-193_6_3-0:1-2.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-193_6_3@1-2.el8_2?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193-0:1-5.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193-0:1-5.el8.src" }, "product_reference": "kpatch-patch-4_18_0-193-0:1-5.el8.src", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193-0:1-5.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193-0:1-5.el8.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193-0:1-5.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193-debuginfo-0:1-5.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193-debuginfo-0:1-5.el8.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193-debuginfo-0:1-5.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193-debugsource-0:1-5.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193-debugsource-0:1-5.el8.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193-debugsource-0:1-5.el8.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_1_2-0:1-3.el8_2.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_1_2-0:1-3.el8_2.src" }, "product_reference": "kpatch-patch-4_18_0-193_1_2-0:1-3.el8_2.src", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_1_2-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_1_2-0:1-3.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_1_2-0:1-3.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_1_2-debuginfo-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_1_2-debuginfo-0:1-3.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_1_2-debuginfo-0:1-3.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_1_2-debugsource-0:1-3.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_1_2-debugsource-0:1-3.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_1_2-debugsource-0:1-3.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_6_3-0:1-2.el8_2.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_6_3-0:1-2.el8_2.src" }, "product_reference": "kpatch-patch-4_18_0-193_6_3-0:1-2.el8_2.src", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_6_3-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_6_3-0:1-2.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_6_3-0:1-2.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-2.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-2.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kpatch-patch-4_18_0-193_6_3-debugsource-0:1-2.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_6_3-debugsource-0:1-2.el8_2.x86_64" }, "product_reference": "kpatch-patch-4_18_0-193_6_3-debugsource-0:1-2.el8_2.x86_64", "relates_to_product_reference": "BaseOS-8.2.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-10766", "cwe": { "id": "CWE-440", "name": "Expected Behavior Violation" }, "discovery_date": "2020-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1845840" } ], "notes": [ { "category": "description", "text": "A logic bug flaw was found in the Linux kernel\u2019s implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Rogue cross-process SSBD shutdown. Linux scheduler logical bug allows an attacker to turn off the SSBD protection.", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having Important impact because it can be used to disable Spectre v4, which has a rating of Important.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193-0:1-5.el8.src", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193-0:1-5.el8.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193-debuginfo-0:1-5.el8.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193-debugsource-0:1-5.el8.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_1_2-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_1_2-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_1_2-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_1_2-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_6_3-0:1-2.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_6_3-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_6_3-debugsource-0:1-2.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10766" }, { "category": "external", "summary": "RHBZ#1845840", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845840" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10766", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10766" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10766", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10766" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dbbe2ad02e9df26e372f38cc3e70dab9222c832e", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dbbe2ad02e9df26e372f38cc3e70dab9222c832e" } ], "release_date": "2020-06-09T17:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-21T16:26:56+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193-0:1-5.el8.src", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193-0:1-5.el8.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193-debuginfo-0:1-5.el8.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193-debugsource-0:1-5.el8.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_1_2-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_1_2-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_1_2-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_1_2-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_6_3-0:1-2.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_6_3-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_6_3-debugsource-0:1-2.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3073" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.", "product_ids": [ "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193-0:1-5.el8.src", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193-0:1-5.el8.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193-debuginfo-0:1-5.el8.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193-debugsource-0:1-5.el8.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_1_2-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_1_2-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_1_2-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_1_2-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_6_3-0:1-2.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_6_3-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_6_3-debugsource-0:1-2.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193-0:1-5.el8.src", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193-0:1-5.el8.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193-debuginfo-0:1-5.el8.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193-debugsource-0:1-5.el8.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_1_2-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_1_2-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_1_2-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_1_2-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_6_3-0:1-2.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_6_3-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_6_3-debugsource-0:1-2.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Rogue cross-process SSBD shutdown. Linux scheduler logical bug allows an attacker to turn off the SSBD protection." }, { "cve": "CVE-2020-10767", "cwe": { "id": "CWE-440", "name": "Expected Behavior Violation" }, "discovery_date": "2020-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1845867" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available.", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having Important impact, because it enables exploitation of the previous Spectre v2 attack, which has a rating of Important.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193-0:1-5.el8.src", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193-0:1-5.el8.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193-debuginfo-0:1-5.el8.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193-debugsource-0:1-5.el8.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_1_2-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_1_2-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_1_2-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_1_2-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_6_3-0:1-2.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_6_3-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_6_3-debugsource-0:1-2.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10767" }, { "category": "external", "summary": "RHBZ#1845867", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845867" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10767", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10767" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10767", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10767" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=21998a351512eba4ed5969006f0c55882d995ada", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=21998a351512eba4ed5969006f0c55882d995ada" } ], "release_date": "2020-06-09T14:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-21T16:26:56+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193-0:1-5.el8.src", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193-0:1-5.el8.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193-debuginfo-0:1-5.el8.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193-debugsource-0:1-5.el8.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_1_2-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_1_2-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_1_2-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_1_2-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_6_3-0:1-2.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_6_3-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_6_3-debugsource-0:1-2.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3073" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.", "product_ids": [ "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193-0:1-5.el8.src", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193-0:1-5.el8.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193-debuginfo-0:1-5.el8.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193-debugsource-0:1-5.el8.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_1_2-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_1_2-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_1_2-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_1_2-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_6_3-0:1-2.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_6_3-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_6_3-debugsource-0:1-2.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193-0:1-5.el8.src", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193-0:1-5.el8.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193-debuginfo-0:1-5.el8.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193-debugsource-0:1-5.el8.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_1_2-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_1_2-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_1_2-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_1_2-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_6_3-0:1-2.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_6_3-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_6_3-debugsource-0:1-2.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available." }, { "cve": "CVE-2020-10768", "cwe": { "id": "CWE-440", "name": "Expected Behavior Violation" }, "discovery_date": "2020-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1845868" } ], "notes": [ { "category": "description", "text": "A flaw was found in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command.", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having Important impact, because it enables exploitation of the previous Spectre v2 attack, which has a rating of Important.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193-0:1-5.el8.src", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193-0:1-5.el8.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193-debuginfo-0:1-5.el8.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193-debugsource-0:1-5.el8.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_1_2-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_1_2-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_1_2-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_1_2-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_6_3-0:1-2.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_6_3-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_6_3-debugsource-0:1-2.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-10768" }, { "category": "external", "summary": "RHBZ#1845868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845868" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-10768", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10768" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-10768", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10768" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4d8df8cbb9156b0a0ab3f802b80cb5db57acc0bf", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4d8df8cbb9156b0a0ab3f802b80cb5db57acc0bf" } ], "release_date": "2020-06-09T14:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-07-21T16:26:56+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193-0:1-5.el8.src", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193-0:1-5.el8.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193-debuginfo-0:1-5.el8.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193-debugsource-0:1-5.el8.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_1_2-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_1_2-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_1_2-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_1_2-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_6_3-0:1-2.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_6_3-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_6_3-debugsource-0:1-2.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:3073" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.", "product_ids": [ "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193-0:1-5.el8.src", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193-0:1-5.el8.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193-debuginfo-0:1-5.el8.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193-debugsource-0:1-5.el8.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_1_2-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_1_2-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_1_2-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_1_2-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_6_3-0:1-2.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_6_3-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_6_3-debugsource-0:1-2.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193-0:1-5.el8.src", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193-0:1-5.el8.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193-debuginfo-0:1-5.el8.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193-debugsource-0:1-5.el8.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_1_2-0:1-3.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_1_2-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_1_2-debuginfo-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_1_2-debugsource-0:1-3.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_6_3-0:1-2.el8_2.src", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_6_3-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_6_3-debuginfo-0:1-2.el8_2.x86_64", "BaseOS-8.2.0.Z.MAIN.EUS:kpatch-patch-4_18_0-193_6_3-debugsource-0:1-2.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command." } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…